
Compliance

The Department of Defense (DoD) Zero Trust strategy promotes a multi-layered security framework across seven core pillars. These pillars aim to protect data and systems through strict identity verification, granular access controls, and real-time visibility for continuous compliance. The NIST 800-53 framework offers a comprehensive set of controls that closely aligns with these pillars to support alignment with DoD requirements.
Pillar 1: User Identification and Access Management | ||||||
|---|---|---|---|---|---|---|
Aligned NIST 800-53 Control(s) | ID | Teleport Capability | ||||
Account Management, Identity Verification | IA-2, AC-02 |
| ||||
Pillar 2: Device Security | ||||||
|---|---|---|---|---|---|---|
Aligned NIST 800-53 Control(s) | ID | Teleport Capability | ||||
System Monitoring, Continuous Monitoring, Device Authentication | SI-4, CA-7, IA-3 |
| ||||
Pillar 3: Network Security | ||||||
|---|---|---|---|---|---|---|
Aligned NIST 800-53 Control(s) | ID | Teleport Capability | ||||
Remote Access, Boundary Protection | AC-17, SC-7 |
| ||||
Pillar 4: Application Workload Security | ||||||
|---|---|---|---|---|---|---|
Aligned NIST 800-53 Control(s) | ID | Teleport Capability | ||||
Access Enforcement, Least Privilege Enforcement, Software/Information Integrity | AC-3, AC-6, SI-7 |
| ||||
Pillar 5: Data Security | ||||||
|---|---|---|---|---|---|---|
Aligned NIST 800-53 Control(s) | ID | Teleport Capability | ||||
Mobile Device Access, Control Protection of Data at Rest | AC-19, SC-28 |
| ||||
Pillar 6: Visibility and Analytics | ||||||
|---|---|---|---|---|---|---|
Aligned NIST 800-53 Control(s) | ID | Teleport Capability | ||||
Audit Events, Audit Review and Analysis | AU-2, AU-6 |
| ||||
Pillar 7: Automation and Orchestration | ||||||
|---|---|---|---|---|---|---|
Aligned NIST 800-53 Control(s) | ID | Teleport Capability | ||||
Continuous Monitoring, Incident Handling | CA-7, IR-4 |
| ||||
Privileged Access Management (PAM) Modernization | ||||||
|---|---|---|---|---|---|---|
Aligned NIST 800-53 Control(s) | ID | Teleport Capability | ||||
Separation of Duties, Least Privilege | AC-5, AC-6 |
| ||||
Download this white paper to learn how to achieve compliance with the Department of Defense’s (DoD) Zero Trust strategy and the NIST 800-53 controls designed to align organizations with federal requirements.
Discover how Teleport can help secure critical systems, enforce access policies, and support continuous monitoring and reporting to simplify Zero Trust.
