The U.S. National Security Agency (NSA) has published the first two installments of its Zero Trust Implementation Guidelines (ZIGs), aiming to provide a clear and actionable path for organizations, particularly within the federal government, to transition to a Zero Trust architecture. The new documents, a "Primer" and a guide for the "Discovery Phase," establish the strategic foundation for the series. They are aligned with the Department of War (DoW) CIO's Zero Trust Framework, which mandates that defense agencies implement 91 specific activities. The NSA's guidance focuses on helping organizations build essential visibility into their environments as the critical first step before deploying advanced Zero Trust controls.
The ZIG series represents a strategic effort by the NSA to operationalize high-level Zero Trust concepts into practical, modular guidance.
The "Primer" serves as an introduction to the entire ZIG series. It outlines the core principles and the overall modular approach. This design acknowledges that organizations are at different levels of maturity and allows them to adopt capabilities that fit their specific needs and priorities, rather than enforcing a rigid, linear implementation plan. The NSA intends for this new series to eventually supersede and update its previous Cybersecurity Information Sheet (CSI) publications on Zero Trust.
This document details the critical first phase of any Zero Trust journey: discovery. It emphasizes that before any controls can be implemented, an organization must achieve comprehensive visibility. The key activities outlined include:
This foundational baseline is essential for informed strategic planning, prioritizing implementation efforts, and measuring progress against Zero Trust goals.
While the guidance is primarily aimed at U.S. federal agencies and organizations within the Department of War ecosystem, its principles and recommendations are broadly applicable to any public or private sector entity seeking to implement a Zero Trust architecture. The documents are intended for a wide audience, including:
For DoW agencies, this guidance directly supports the mandate to achieve "target level" Zero Trust maturity by implementing 91 specific activities. The "Discovery Phase" provides the necessary steps to build the foundation required for subsequent phases, which will cover more advanced capabilities. Adherence to this guidance will be crucial for demonstrating compliance with federal cybersecurity directives and maturing an organization's security posture.
The release of the "Primer" and "Discovery Phase" marks the beginning of the NSA's ZIG series. The agency has announced that subsequent documents detailing Phase One and Phase Two implementation steps will be released in the near future. Organizations are advised to begin their discovery phase now to prepare for the more technical guidance to come. The process of discovery is not a one-time project but an ongoing activity that must be maintained as the IT environment evolves.
Organizations should take the following steps to align with the new NSA guidance:
This mitigation directly aligns with the NSA's 'Discovery Phase,' which requires comprehensive logging and auditing to identify assets, users, and data flows.
Properly configuring and auditing Active Directory is a prerequisite for identifying users and entities as prescribed in the guidance.
The discovery of data flows is a precursor to designing and implementing effective network segmentation, a core pillar of Zero Trust.
To fulfill the NSA's 'Discovery Phase' requirement of identifying all users and entities, organizations must implement robust Domain Account Monitoring. This involves configuring detailed audit policies on domain controllers to log all account creation, modification, deletion, and usage events (e.g., Windows Event IDs 4720, 4722, 4738, 4624). These logs should be forwarded to a central SIEM for analysis. By monitoring these events, security teams can create an accurate, up-to-date inventory of all human and non-person entities, identify stale or unauthorized accounts, and establish a baseline of normal authentication patterns. This is the foundational data source for building Zero Trust policies.
A core tenet of the NSA's 'Discovery Phase' is mapping data flows. Network Traffic Analysis is the primary D3FEND technique to achieve this. Deploy NetFlow, sFlow, or IPFIX collectors on all major network segments, routers, and switches. Ingest this flow data into a network detection and response (NDR) tool or SIEM. This will provide comprehensive visibility into which assets are communicating with each other, over which ports and protocols, and the volume of data being transferred. This map of 'who is talking to whom' is essential for identifying implicit trust zones and designing future microsegmentation policies, a key outcome of the Zero Trust journey.
To fully identify and catalog all 'Assets' and 'Applications' as required by the NSA guidance, organizations should leverage System File Analysis. This can be achieved through a combination of tools. A Configuration Management Database (CMDB) provides a starting point, but it must be validated and enriched with data from endpoint agents (EDR, asset inventory tools) that can scan file systems to identify installed software, versions, and configurations. This process helps discover unmanaged or 'shadow IT' applications. Correlating this application data with the network flows from D3-NTA allows an organization to build a complete picture of its 'DAAS' (Data, Applications, Assets, and Services) landscape.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats