The concept of a trusted internal network is obsolete. NIST Special Publication 800-207, “Zero Trust Architecture,” codifies a new security paradigm for the modern enterprise: never trust, always verify. This framework moves defenses from static, perimeter-based models to one focused on users, assets, and resources. VMware’s vDefend security suite, with its intrinsic, workload-centric approach, provides the foundational tools to build and operate a true Zero Trust Architecture (ZTA). This post will detail how vDefend’s capabilities align directly with the core tenets and logical components of NIST SP 800-207, helping organizations eliminate implicit trust and build a more resilient, modern security posture.
NIST SP 800-207 provides an abstract definition and a roadmap for implementing Zero Trust. The core philosophy is that no actor, system, network, or service operating inside or outside the security perimeter is trusted. Instead, every access request must be thoroughly evaluated and granted on a least-privilege, per-session basis. This approach is designed to protect modern, distributed environments that include remote users, cloud services, and IoT devices.
The framework is built upon seven core tenets that shift the focus from protecting a network to protecting resources. It also defines the core logical components of a ZTA:
VMware vDefend is a suite of security solutions built to protect modern, virtualized data centers and private clouds. By building security directly into the infrastructure, vDefend provides a more effective and operationally simple approach to implementing Zero Trust. Its key components include:
The vDefend suite provides tangible tools to implement the core principles of the NIST Zero Trust Architecture.
| NIST 800-207 Tenet | How vDefend Addresses It |
|---|---|
| 1. All data sources and computing services are considered resources. | Security Intelligence provides the visibility to identify and categorize all workloads, applications, and their communication flows, treating each as a distinct resource to be protected. This is the foundational step before any policy can be created. |
| 2. All communication is secured regardless of network location. | The vDefend Distributed Firewall is location-agnostic. Because it is attached to the virtual network interface of every workload, it secures communication whether the workload is on-premises, in a private cloud, or part of a hybrid environment. It enforces the same policy regardless of the underlying network topology. |
| 3. Access to individual enterprise resources is granted on a per-session basis. | The Distributed Firewall acts as the Policy Enforcement Point (PEP) for every session. It evaluates each new connection request against the defined security policy before allowing the session to be established, ensuring there is no lingering or implicit trust from previous sessions. |
| 4. Access to resources is determined by dynamic policy. | vDefend policies are not limited to static IP addresses. Policies can be based on dynamic attributes like workload names, security tags, user identity, and operating system. The NSX Manager, acting as the Policy Administrator and Policy Engine, uses this rich context to make intelligent access decisions. |
| 5. The enterprise monitors and measures the integrity and security posture of all owned and associated assets. | vDefend Advanced Threat Prevention (ATP) continuously monitors workloads. The NTA and IDS/IPS capabilities provide constant feedback on the security posture of each asset, detecting anomalies or threats. This data serves as a critical input to the Policy Engine, which can use it to alter trust decisions in real time. |
| 6. All resource authentication and authorization are dynamic and strictly enforced before access is allowed. | The Distributed Firewall is the mechanism that strictly enforces the dynamic authorization determined by the policy engine. Access is explicitly verified for every new session, every time, with no exceptions. If a workload’s security posture changes (e.g., malware is detected by ATP), the Policy Engine can instruct the firewall to terminate the session. |
| 7. The enterprise collects as much information as possible… and uses it to improve its security posture. | The entire vDefend suite is a rich source of telemetry. Logs from the firewall, IDS/IPS, NTA, and NDR provide a continuous feedback loop that allows security teams to analyze the effectiveness of their policies, hunt for threats, and refine their Zero Trust posture over time. |
Consider an organization migrating to a Zero Trust Architecture to protect its intellectual property (IP).
Implementing a Zero Trust Architecture as envisioned by NIST SP 800-207 requires a fundamental shift in security strategy and tooling. It demands visibility, granular control, and rich intelligence. VMware’s vDefend suite provides the foundational capabilities to make Zero Trust a reality. By enabling organizations to micro-segment their environments, create dynamic, identity-aware policies, and continuously monitor their security posture, vDefend empowers them to move beyond the legacy perimeter and build a more secure, resilient enterprise for the modern era.