<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Zero Trust</title><link>http://www.sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Zero Trust</description><atom:link href="http://www.sei.cmu.edu/blog/feeds/tag/zero-trust/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 24 Apr 2023 00:00:00 -0400</lastBuildDate><item><title>8 Areas of Future Research in Zero Trust</title><link>https://www.sei.cmu.edu/blog/8-areas-of-future-research-in-zero-trust/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The National Cybersecurity Strategy was released on March 1st, 2023 to improve federal cybersecurity through the implementation of a zero trust architecture.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Matthew Nicolai, Trista Polaski, Timothy Morrow</dc:creator><pubDate>Mon, 24 Apr 2023 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/8-areas-of-future-research-in-zero-trust/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Zero Trust</category></item><item><title>5 Best Practices from Industry for Implementing a Zero Trust Architecture</title><link>https://www.sei.cmu.edu/blog/5-best-practices-from-industry-for-implementing-a-zero-trust-architecture/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post presents 5 best practices from industry on implementing a zero trust architecture and discusses why they are significant.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Matthew Nicolai, Nathaniel Richmond, Timothy Morrow</dc:creator><pubDate>Mon, 06 Mar 2023 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/5-best-practices-from-industry-for-implementing-a-zero-trust-architecture/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Zero Trust</category></item><item><title>The Zero Trust Journey: 4 Phases of Implementation</title><link>https://www.sei.cmu.edu/blog/the-zero-trust-journey-4-phases-of-implementation/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post outlines four phases that organizations should address as they develop and assess their roadmap and associated artifacts against a zero trust maturity model.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Timothy Morrow, Matthew Nicolai</dc:creator><pubDate>Mon, 27 Jun 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-zero-trust-journey-4-phases-of-implementation/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Zero Trust</category></item></channel></rss>