What is NIST SP 800-207?

NIST Special Publication 800-207 is the official reference document of the US National Institute of Standards and Technology for implementing a Zero Trust Architecture (ZTA). The publication describes the concepts, principles and functional building blocks for organisations seeking to apply Zero Trust in their IT and OT environments.

NIST SP 800-207 is not a technical standard but an architectural guide for those who wish to implement Zero Trust strategically and in a structured way.


🧠 Key principles

  1. No implicit trust – trust is not based on network position or device location
  2. Access control based on identity and context – every access requires verification and a policy check
  3. Continuous evaluation – trust is determined dynamically based on behaviour, risk and status
  4. Visibility and analysis – logging, monitoring and anomaly detection are essential
  5. Securing all communications – between users, applications and systems

πŸ” Fundamental components

Component Function in a Zero Trust Architecture
Policy Enforcement Point (PEP) Enforces access decisions and performs authentication
Policy Decision Point (PDP) Determines whether access is allowed based on rules
Trust Algorithm / Risk Engine Assesses trust based on identity, behaviour, location
Continuous Diagnostics & Monitoring Real-time visibility of users, devices and connections
Resource / Asset The target of access: application, service or OT component

This architecture is applicable to traditional IT environments as well as industrial networks (ICS/OT).


πŸ” Relevance for OT environments

ZTA principle Application in industrial environments
Identity-based access Access to SCADA, HMI or Engineering Stations is strictly governed
Segmentation per asset group Microsegmentation between SCADA, Historian and field components
Continuous verification Sessions of remote engineers are monitored and time-limited
Logging and analysis Every connection and action is recorded for forensic analysis

In OT, applying NIST SP 800-207 depends on stability requirements, network architecture and supplier capability.


πŸ›  Implementation steps according to NIST SP 800-207

  1. Inventory resources – know what systems, applications and users exist
  2. Identify access paths – who has access to what, and how?
  3. Implement authentication and authorisation – for all users and devices
  4. Restrict access via policies – use dynamic rules per risk or role
  5. Monitor behaviour and decisions – detect anomalies or policy violations
  6. Manage trust relationships continuously – not a β€˜set-and-forget’ model

Document Relevance
IEC 62443-3-3 Technical security requirements that align with ZTA principles
ISO 27001 General information security management controls
NIS2 European requirement for access management and segmentation
NIST SP 800-160 Vol. 2 Engineering principles for cyber resilience of industrial systems

πŸ“Œ In summary

NIST SP 800-207 provides a robust framework for thinking and working in line with Zero Trust principles. For OT environments, this model helps to design controlled, transparent and secure access to industrial systems – without relying on the internal network alone.