Skip to content

feat: add NIST SP 800-207 Zero Trust Architecture skill#42

Open
sjackson0109 wants to merge 1 commit intoSushegaad:mainfrom
sjackson0109:feature/nist-sp-800-207-skill
Open

feat: add NIST SP 800-207 Zero Trust Architecture skill#42
sjackson0109 wants to merge 1 commit intoSushegaad:mainfrom
sjackson0109:feature/nist-sp-800-207-skill

Conversation

@sjackson0109
Copy link
Copy Markdown

NIST SP 800-207 — Zero Trust Architecture

Source: NIST Special Publication 800-207, August 2020
CSRC: https://csrc.nist.gov/publications/detail/sp/800-207/final


Files Added

plugins/nist-sp-800-207/
  .claude-plugin/
    plugin.json
  skills/
    nist-sp-800-207/
      SKILL.md
      references/
        zta-components.md
        deployment-approaches.md
        migration-guide.md

Framework Coverage

  1. Zero trust definition: no implicit trust based on network location, physical location, or asset ownership; all access independently validated
  2. Seven ZTA tenets from SP 800-207 Section 2: all resources treated as resources; all communications secured; per-session access grants; dynamic policy based on observable state; continuous device posture monitoring; dynamic authentication and authorisation; telemetry collection and analytics
  3. ZTA logical components: Policy Engine (PE), Policy Administrator (PA), Policy Enforcement Point (PEP) with full data flow architecture
  4. PE trust algorithm: criteria-based (Boolean policy rules), score/confidence-based, historical behaviour-based (ML) approaches with trust score weighting across 7 input sources
  5. PA functions: session establishment, credential distribution, session maintenance, session termination
  6. PEP types: inline gateway/proxy, split-component (subject-facing/resource-facing), resource-native (service mesh sidecar)
  7. Three deployment approaches: Enhanced Identity Governance (EIG), Microsegmentation, SDN/Software-Defined Perimeter (ZTNA)
  8. EIG implementation: IdP centralisation, phishing-resistant MFA, identity-aware proxy, device posture integration, continuous session revocation
  9. Microsegmentation: workload flow mapping, policy design, enforcement mechanism selection (host-based agent, hypervisor, cloud-native, service mesh), monitor-only to enforce lifecycle
  10. SDN/ZTNA: SDP architecture, ZTNA vs. legacy VPN comparison, agent-based vs. agentless ZTNA, SDN dynamic network segmentation
  11. Four deployment scenarios: employee enterprise resource access, remote/BYOD, service-to-service/workload, third-party/contractor
  12. ZTA threats: credential compromise, DoS against PE/PA, control plane compromise, visibility gaps, insider threat, supply chain attacks on ZTA components
  13. ZTA migration roadmap: four phases (Foundation 0-6mo, First ZTA Controls 6-12mo, Broad Coverage 12-24mo, Optimise 24+mo)
  14. CISA Zero Trust Maturity Model v2.0 alignment: five pillars (Identity, Devices, Networks, Applications/Workloads, Data), four maturity stages per pillar (Traditional, Initial, Advanced, Optimal)
  15. SP 800-53 Rev 5 control alignment: AC-2, AC-3, AC-4, AC-17, AC-20, AU-2, AU-3, IA-2, IA-3, IA-5, SC-3, SC-7, SC-8, SC-39, SI-4

Reference Files

zta-components.md

  • Full ZTA logical architecture: data flow from subject through PEP to resource
  • PE design requirements: high availability, isolation, fail-open/closed policy
  • Trust algorithm input sources: identity provider signals, device health/compliance, network location, resource requested, historical behaviour, threat intelligence, time-of-day factors
  • PA session lifecycle: credential issuance, session keepalive, revocation triggers
  • PEP types and technology examples (identity-aware proxy, microsegmentation platform, service mesh)
  • Supporting components: IdP, CDM system, threat intelligence feeds, SIEM, PKI, UEBA
  • ZTA component inventory template and coverage gap assessment template

deployment-approaches.md

  • Approach 1 EIG: step-by-step with technology options at each step
  • Approach 2 Microsegmentation: enforcement mechanism comparison table; monitor-only to enforced lifecycle
  • Approach 3 SDN/ZTNA: ZTNA vs VPN comparison table; agent-based vs. agentless guidance; 7-step ZTNA deployment
  • Hybrid approach matrix mapping environment layer to recommended ZTA approach
  • Recommended adoption sequence for federal agencies

migration-guide.md

  • ZTA current-state assessment checklist across all five ZTMM pillars
  • Four-phase migration roadmap with activities, owners, and success criteria per phase
  • CISA ZTMM v2.0 full five-pillar four-stage alignment matrix with SP 800-207 alignment notes
  • SP 800-53 Rev 5 control alignment table (14 controls across AC, AU, IA, SC, SI families)
  • ZTA threat mitigation mapping (8 threat categories to ZTA controls)
  • ZTA terms and definitions glossary (15 key terms)

Integration Points

  • SP 800-63B: authentication assurance levels (AAL1/2/3) determine identity signal quality for the ZTA trust algorithm
  • SP 800-53 Rev 5: ZTA implements and contributes to AC, IA, SC, SI, AU control families
  • SP 800-37 Rev 2: ZTA architecture decisions are made during the RMF system design phase
  • SP 800-137: continuous monitoring telemetry from ZTA components feeds ISCM programme
  • CISA ZTMM v2.0: five-pillar maturity model for measuring and advancing ZTA implementation
  • EO 14028: federal ZTA mandate; NIST SP 800-207 is the designated primary technical reference

Tests

python -m pytest tests/test_plugin_structure.py -v -k "nist-sp-800-207"

test_plugin_json_exists[nist-sp-800-207] PASSED
test_plugin_json_is_valid[nist-sp-800-207] PASSED
test_plugin_json_required_fields[nist-sp-800-207] PASSED
test_plugin_version_semver[nist-sp-800-207] PASSED
test_skills_directory_exists[nist-sp-800-207] PASSED
test_skills_directory_has_one_skill_folder[nist-sp-800-207] PASSED
test_skill_md_exists[nist-sp-800-207] PASSED
test_skill_md_not_empty[nist-sp-800-207] PASSED
test_no_files_outside_skill_folder[nist-sp-800-207] PASSED
test_references_are_markdown[nist-sp-800-207] PASSED

10 passed, 95 deselected

PLUGIN: nist-sp-800-207
VERSION: 1.0.0
SOURCE: NIST Special Publication 800-207, August 2020
TITLE: Zero Trust Architecture
CSRC: https://csrc.nist.gov/publications/detail/sp/800-207/final

PLUGIN STRUCTURE:
  plugins/nist-sp-800-207/.claude-plugin/plugin.json
  plugins/nist-sp-800-207/skills/nist-sp-800-207/SKILL.md
  plugins/nist-sp-800-207/skills/nist-sp-800-207/references/zta-components.md
  plugins/nist-sp-800-207/skills/nist-sp-800-207/references/deployment-approaches.md
  plugins/nist-sp-800-207/skills/nist-sp-800-207/references/migration-guide.md

FRAMEWORK COVERAGE:
  1. Zero trust definition: no implicit trust based on network location, physical location, or asset ownership; all access independently validated
  2. Seven ZTA tenets: all resources treated as resources; all communications secured regardless of location; per-session access grants; dynamic policy; device posture monitoring; dynamic continuous auth/authz; telemetry collection
  3. ZTA logical components: Policy Engine (PE), Policy Administrator (PA), Policy Enforcement Point (PEP) with full data flow description
  4. PE design: availability requirements, isolation requirements, trust algorithm inputs (7 input sources), decision outputs (grant/conditional/deny/quarantine)
  5. PA functions: session establishment, session maintenance, session termination with credential lifecycle
  6. PEP types: inline, split-component, resource-native (service mesh sidecar); PEP coverage requirement
  7. Trust algorithm: criteria-based (Boolean policy), score/confidence-based, historical behaviour-based (ML) approaches with trade-offs
  8. Supporting components: IdP, CDM, threat intel, SIEM, PKI, behavioural analytics integration requirements
  9. Three ZTA deployment approaches: Enhanced Identity Governance (EIG), Microsegmentation, SDN/ZTNA
  10. EIG implementation: IdP centralisation, phishing-resistant MFA, identity-aware proxy deployment, device posture integration, session revocation
  11. Microsegmentation implementation: workload communication flow mapping, policy design, enforcement mechanism options (host-based, hypervisor, cloud-native, service mesh), staged enforcement
  12. SDN/ZTNA implementation: SDP architecture, ZTNA product comparison to VPN, SDN dynamic segmentation, agent-based vs. agentless ZTNA
  13. ZTA deployment scenarios: employee access, remote/BYOD, service account/workload-to-workload, third-party/contractor
  14. ZTA threats: credential compromise, DoS on PE/PA, control plane compromise, visibility gaps, insider threat, supply chain attack
  15. Migration roadmap: four-phase migration (Foundation, First ZTA Controls, Broad Coverage, Optimise) with milestones and success criteria
  16. CISA ZTMM alignment: five pillars (Identity, Devices, Networks, Applications/Workloads, Data) with four maturity stages per pillar and SP 800-207 alignment
  17. SP 800-53 Rev 5 control mapping: ZTA contributions to AC-2, AC-3, AC-4, AC-17, AC-20, AU-2/3, IA-2, IA-3, IA-5, SC-3, SC-7, SC-8, SC-39, SI-4
  18. ZTA threat mitigation summary: phishing, lateral movement, privilege escalation, stolen device, insider threat, ransomware

REFERENCE FILES:
  zta-components.md:
    - Full ZTA logical architecture with data flow steps
    - PE design requirements: availability, isolation, scalability
    - Trust algorithm input sources mapped to trust score weighting
    - PA functions: session establishment, maintenance, termination
    - PEP types with technology examples
    - Control plane vs. data plane separation and security implications
    - IdP and device identity implementation requirements
    - Behavioural analytics design requirements
    - ZTA component inventory template
    - ZTA coverage gap assessment template
  deployment-approaches.md:
    - Approach 1 EIG: 6-step implementation with technology options
    - Approach 2 Microsegmentation: 6-step implementation with enforcement mechanism comparison table
    - Approach 3 SDN/ZTNA: SDP architecture explanation, ZTNA vs. VPN comparison table, 7-step ZTNA deployment
    - Hybrid approach guidance mapping each environment layer to recommended approach
    - Recommended sequence for federal agency ZTA adoption
  migration-guide.md:
    - ZTA migration assessment checklist (5 domains: Identity/Devices/Network/Applications/Data/Monitoring)
    - 4-phase migration roadmap with activities, owners, and success criteria
    - CISA ZTMM v2.0 alignment across all five pillars at all four maturity stages
    - SP 800-53 Rev 5 control mapping (14 controls)
    - ZTA threat mitigation summary (8 threats)
    - Key ZTA terms and definitions glossary (15 terms)

INTEGRATION POINTS:
  - SP 800-63B: authentication assurance levels (AAL1/2/3) define the identity signal quality for the ZTA trust algorithm
  - SP 800-53 Rev 5: ZTA implements or contributes to AC, IA, SC, SI, AU control families
  - SP 800-37 Rev 2: ZTA architecture decision is part of the RMF system design phase
  - SP 800-137: continuous monitoring telemetry from ZTA components feeds ISCM
  - CISA ZTMM v2.0: five-pillar framework for measuring ZTA implementation maturity
  - EO 14028: federal ZTA requirements derive from this executive order; NIST SP 800-207 is the primary technical reference

TESTS:
  test_plugin_json_exists[nist-sp-800-207] PASSED
  test_plugin_json_is_valid[nist-sp-800-207] PASSED
  test_plugin_json_required_fields[nist-sp-800-207] PASSED
  test_plugin_version_semver[nist-sp-800-207] PASSED
  test_skills_directory_exists[nist-sp-800-207] PASSED
  test_skills_directory_has_one_skill_folder[nist-sp-800-207] PASSED
  test_skill_md_exists[nist-sp-800-207] PASSED
  test_skill_md_not_empty[nist-sp-800-207] PASSED
  test_no_files_outside_skill_folder[nist-sp-800-207] PASSED
  test_references_are_markdown[nist-sp-800-207] PASSED
  10 passed, 95 deselected
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant