* [Blog](https://www.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www.paloaltonetworks.com/blog/corporate/) * [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/) * The Federal Zero Trust St... # The Federal Zero Trust Strategy [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2022%2F03%2Fthe-federal-zero-trust-strategy%2F) [](https://twitter.com/share?text=The+Federal+Zero+Trust+Strategy&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2022%2F03%2Fthe-federal-zero-trust-strategy%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2022%2F03%2Fthe-federal-zero-trust-strategy%2F&title=The+Federal+Zero+Trust+Strategy&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www.paloaltonetworks.com/blog/2022/03/the-federal-zero-trust-strategy/&ts=markdown) \[\](mailto:?subject=The Federal Zero Trust Strategy) Link copied By [Paul Kaspian](https://www.paloaltonetworks.com/blog/author/paul-kaspian/?ts=markdown "Posts by Paul Kaspian") and [Sean Morgan](https://www.paloaltonetworks.com/blog/author/sean-morgan/?ts=markdown "Posts by Sean Morgan") Mar 02, 2022 4 minutes [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [Federal](https://www.paloaltonetworks.com/blog/tag/federal/?ts=markdown) [Government](https://www.paloaltonetworks.com/blog/tag/government2/?ts=markdown) [NIST](https://www.paloaltonetworks.com/blog/tag/nist/?ts=markdown) [Zero Trust](https://www.paloaltonetworks.com/blog/tag/zero-trust/?ts=markdown) ### Key Ways to Align Your Organization with the Latest Requirements On January 26, 2022, the White House issued the [Federal Zero Trust Strategy](https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf), a continuation of the direction of the [May 2021 Executive Order](https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/) on Improving the Nation's Cybersecurity. The Federal Zero Trust Strategy details a series of specific actions all U.S. federal agencies must take to advance adopting a Zero Trust approach. It is expected to drive federal government cybersecurity activities over the next two years and beyond. Understanding the key takeaways and how to best implement them within your organization is a critical first step to successfully align your Zero Trust efforts with the latest requirements. #### **A Broad Approach: Users, Devices, Applications and Transactions** One theme was clear from the White House strategy: Zero Trust must span the entire infrastructure. The memo explicitly states that agencies should migrate "from verify once at the perimeter to continual verification of each user, device, application and transaction." Taking a holistic approach to Zero Trust is a key aspect of overall success. At Palo Alto Networks, we enable organizations to implement Zero Trust broadly across users, applications and infrastructure. This includes tying strong identity to integrity of devices and workloads, applying least privilege access, and continuously validating all transactions with comprehensive threat protection. #### A Solid Foundation: Visibility of Internet Assets As federal agencies begin or advance their Zero Trust journeys, the Federal Zero Trust Strategy makes it clear that they must start with a foundation of comprehensive visibility. "To effectively implement a zero trust architecture, an organization must have a complete understanding of its internet-accessible assets," the [Federal Zero Trust Strategy](https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf) reads. It is only with comprehensive understanding of critical systems and exposures that agencies can effectively enforce Zero Trust policies in a risk-prioritized manner. This asset mapping capability must be continuous and dynamic as static scanning capabilities will have limited utility in a rapidly evolving threat environment. #### **Strong Identity Meets Least-Privilege Controls and Continuous Monitoring** A significant portion of the recent memo focuses on the importance of implementing strong identity best practices. These should be tightly integrated with your Zero Trust policies and controls in order to ensure the adoption of Zero Trust key tenants, such as least-privileged access. This means that only the minimal amount of access should be granted to a user based on their role and required resources. Once controls and policies are in place, identity and access must be continuously monitored to detect any malicious behavior and evolve the Zero Trust security posture. #### Accelerating Your Journey: Meeting New Deadlines with Increased Urgency While the May 2021 Executive Order laid out a general vision for advancing toward Zero Trust, the recent Federal Zero Trust Strategy provides much more implementation detail, as well as some aggressive timelines. One deadline calls for agencies to submit their updated Zero Trust implementation plan, incorporating all new requirements identified in the Federal Zero Trust Strategy within 60 days. Because transitioning to Zero Trust is a strategic undertaking, most organizations will benefit from engaging a trusted cybersecurity partner to help them create and implement their Zero Trust plan. Palo Alto Networks has been working extensively with our customers on Zero Trust initiatives, utilizing our Professional Services team, which has unparalleled experience helping organizations of all sizes accelerate their [Zero Trust journey](https://www.paloaltonetworks.com/zero-trust?ts=markdown). Palo Alto Networks has also been helping lead partnerships among industry and with the federal government to advance Zero Trust standards and best practices. We were honored to recently serve as a co-chair in leading a study tasked by the White House through the [National Security Telecommunications Advisory Committee (NSTAC)](https://www.cisa.gov/nstac), which provided industry guidance on how the government can most effectively implement the Federal Zero Trust Strategy. In 2021, we were honored to be selected by the U.S. National Institute of Standards and Technology (NIST) as a private-sector collaborator, helping build [NIST Zero Trust Reference Architectures](https://www.nccoe.nist.gov/projects/implementing-zero-trust-architecture) using industry-leading technology capabilities. Learn more about how Palo Alto Networks can help you [become a Zero Trust enterprise](https://www.paloaltonetworks.com/zero-trust?ts=markdown) and meet key requirements of the recent Federal Zero Trust Architecture Strategy. You can also learn more about Palo Alto Networks collaboration with the federal government by visiting the [NIST Zero Trust Architecture Project website](https://www.nccoe.nist.gov/projects/implementing-zero-trust-architecture) and reading the new [NSTAC Report to the President on Zero Trust](https://www.cisa.gov/sites/default/files/publications/Final%20Draft%20NSTAC%20Report%20to%20the%20President%20on%20Zero%20Trust%20and%20Trusted%20Identity%20Management.pdf), which is now published on CISA's website. *** ** * ** *** ## Related Blogs ### [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### Choosing Which Federal Guidelines to Follow for Zero Trust](https://www.paloaltonetworks.com/blog/2022/03/federal-guidelines-for-zero-trust/) ### [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### The Zero Trust Journey for Federal Agencies: The Next Phase](https://www.paloaltonetworks.com/blog/2022/08/the-zero-trust-journey-for-federal-agencies/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### NIST Selects Palo Alto Networks for Zero Trust Architecture Project](https://www.paloaltonetworks.com/blog/2021/07/nist-nccoe-zero-trust-architecture/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Government](https://www.paloaltonetworks.com/blog/category/government/?ts=markdown), [Partner Integrations](https://www.paloaltonetworks.com/blog/sase/category/partner-integrations/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### Google Cloud, Partnered With Palo Alto Networks, Receives US Government Success Memo](https://www.paloaltonetworks.com/blog/2021/07/us-diu-cloud-delivered-security/) ### [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### Palo Alto Networks Zero Trust Platform Featured in New NIST Guidance](https://www.paloaltonetworks.com/blog/2024/08/zero-trust-platform-featured-in-new-nist-guidance/) ### [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### Breaking Down the NASCIO Top 10 for 2023](https://www.paloaltonetworks.com/blog/2023/01/nascio-top-10-for-2023/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language