ChaptersCircleEventsBlog
Join us for the in-person CCSK Azure course at Black Hat from August 4–5! Register now for a hands-on deep dive and secure your spot now!

Download Publication

Toward a Zero Trust Architecture - Japanese Translation
Toward a Zero Trust Architecture - Japanese Translation

Toward a Zero Trust Architecture - Japanese Translation

Release Date: 02/10/2022

Working Group: Zero Trust

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact research@cloudsecurityalliance.org.

企業の利害関係者は、リアルタイムシステムの複雑化、新たなサイバーセキュリティポリ
シーの必要性、そしてセキュアにシステムを運用するために欠かせない力強い文化的サポート
といった課題を考慮する必要があります。ゼロトラストのような新たなテクノロジーソリューショ
ンやアプローチは、バイデン大統領の大統領令14028 Improving the Nation’s Cybersecurity
で定められた義務を果たすために不可欠です。本稿では、新たに登場した豊富で多様なソリューション
の意味と、ゼロトラストアーキテクチャ(ZTA)を最終的に実現するための組織の能力に対する課題につ
いて検討しています。また、企業のリーダーとセキュリティ担当者がそれぞれの環境にゼロトラストを
導入することを促進するために、業界が主要なステークホルダーグループ間のコラボレーションを強化
する方法についても提言しています。

Enterprise stakeholders must consider the challenges of increased real-time system complexity, the need for new cybersecurity policy and strong cultural support that is required to securely operate systems in a complex and hybrid world. Emerging technology solutions and approaches such as Zero Trust are critical to meeting the mandates in President Biden’s Executive Order on Improving the Nation’s Cybersecurity. The implications of an emerging, rich and diverse solutions landscape and the challenges to an organization’s ability to ultimately deliver a Zero Trust Architecture (ZTA) are explored in this paper. Recommendations on how industry can improve collaboration among key stakeholder groups is discussed to accelerate both enterprise leaders and security practitioners’ adoption of Zero Trust into their environments.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
Zero Trust Automation & Orchestration and Visibility & Analytics Overview
Zero Trust Automation & Orchestration and Visib...
Zero Trust Guidance for IoT
Zero Trust Guidance for IoT
Zero Trust Privacy Assessment and Guidance
Zero Trust Privacy Assessment and Guidance
Navigating the Cybersecurity Imperative in India’s Manufacturing Ascent
Navigating the Cybersecurity Imperative in India’s Manufacturing As...
Published: 06/27/2025
CIEM and Secure Cloud Access Best Practices
CIEM and Secure Cloud Access Best Practices
Published: 06/24/2025
Agentic AI is Redefining Identity Security in the Cloud
Agentic AI is Redefining Identity Security in the Cloud
Published: 06/09/2025
In the Beginning, Before Zero Trust
In the Beginning, Before Zero Trust
Published: 06/06/2025
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training