
Compliance

The Department of Defense (DoD) Zero Trust strategy promotes a multi-layered security framework across seven core pillars. These pillars aim to protect data and systems through strict identity verification, granular access controls, and real-time visibility for continuous compliance. The NIST 800-53 framework offers a comprehensive set of controls that closely aligns with these pillars to support alignment with DoD requirements.
Pillar 1: User Identification and Access Management | ||||||
|---|---|---|---|---|---|---|
Aligned NIST 800-53 Control(s) | ID | Teleport Capability | ||||
Account Management, Identity Verification | IA-2, AC-02 |
| ||||
Pillar 2: Device Security | ||||||
|---|---|---|---|---|---|---|
Aligned NIST 800-53 Control(s) | ID | Teleport Capability | ||||
System Monitoring, Continuous Monitoring, Device Authentication | SI-4, CA-7, IA-3 |
| ||||
Pillar 3: Network Security | ||||||
|---|---|---|---|---|---|---|
Aligned NIST 800-53 Control(s) | ID | Teleport Capability | ||||
Remote Access, Boundary Protection | AC-17, SC-7 |
| ||||
Pillar 4: Application Workload Security | ||||||
|---|---|---|---|---|---|---|
Aligned NIST 800-53 Control(s) | ID | Teleport Capability | ||||
Access Enforcement, Least Privilege Enforcement, Software/Information Integrity | AC-3, AC-6, SI-7 |
| ||||
Pillar 5: Data Security | ||||||
|---|---|---|---|---|---|---|
Aligned NIST 800-53 Control(s) | ID | Teleport Capability | ||||
Mobile Device Access, Control Protection of Data at Rest | AC-19, SC-28 |
| ||||
Pillar 6: Visibility and Analytics | ||||||
|---|---|---|---|---|---|---|
Aligned NIST 800-53 Control(s) | ID | Teleport Capability | ||||
Audit Events, Audit Review and Analysis | AU-2, AU-6 |
| ||||
Pillar 7: Automation and Orchestration | ||||||
|---|---|---|---|---|---|---|
Aligned NIST 800-53 Control(s) | ID | Teleport Capability | ||||
Continuous Monitoring, Incident Handling | CA-7, IR-4 |
| ||||
Privileged Access Management (PAM) Modernization | ||||||
|---|---|---|---|---|---|---|
Aligned NIST 800-53 Control(s) | ID | Teleport Capability | ||||
Separation of Duties, Least Privilege | AC-5, AC-6 |
| ||||
Download this white paper to learn how to achieve compliance with the Department of Defense’s (DoD) Zero Trust strategy and the NIST 800-53 controls designed to align organizations with federal requirements.
Discover how Teleport can help secure critical systems, enforce access policies, and support continuous monitoring and reporting to simplify Zero Trust.


Delight your engineers. Protect your infrastructure.