NIST SP 800-207 is a National Institute of Standards and Technology Special Publication that defines the Zero Trust Architecture (ZTA) model. It shifts security from implicit trust based on network location to explicit, context-aware decisions for every request. At its core, Zero Trust emphasizes verifying explicitly, using least privilege, and assuming a breach.
In practical terms, SP 800-207 describes a reference architecture built around three key elements that make and enforce access decisions:
The publication outlines common deployment patterns (e.g., identity-aware proxies/PEPs in front of applications), the use of continuous evaluation during sessions, and the importance of integrating with enterprise services such as identity providers (SSO/MFA), device posture, logging/telemetry, and automation/orchestration. Rather than prescribing specific products, it provides principles and building blocks to make Zero Trust fit for your environment.
How does it affect identity security?
From an identity perspective, SP 800-207 makes identity the primary control plane:
Case study
A global enterprise piloted Zero Trust for a set of internal web apps. They deployed an identity-aware gateway as the PEP, integrated it with their IdP (SSO + MFA) and device-health checks, and defined PE/PA logic to issue short-lived session tokens with context (user, device, risk). When a user’s behavior deviated—unfamiliar device and rapid access to sensitive records—the PE required step-up authentication and temporarily tightened authorization for that session. An operations runbook automatically notified the owner team and recorded the event for review.
This anonymized scenario illustrates how applying SP 800-207 principles (explicit verification, least privilege, continuous evaluation) can contain abnormal activity quickly without relying on network location or broad, permanent privileges.