homepage
Menu
Open menu
  • Training
    Go one level top Back

    Training

    • Courses

      Build cyber prowess with training from renowned experts

    • Hands-On Simulations

      Hands-on learning exercises keep you at the top of your cyber game

    • Certifications

      Demonstrate cybersecurity expertise with GIAC certifications

    • Ways to Train

      Multiple training options to best fit your schedule and preferred learning style

    • Training Events & Summits

      Expert-led training at locations around the world

    • Free Training Events

      Upcoming workshops, webinars and local events

    • Security Awareness

      Harden enterprise security with end-user and role-based training

    Featured

    Get a Free Hour of SANS Training

    Free Course Demos

    Can't find what you are looking for?

    Let us help.
    Contact us
  • Learning Paths
    Go one level top Back

    Learning Paths

    • By Focus Area

      Chart your path to job-specific training courses

    • By NICE Framework

      Navigate cybersecurity training through NICE framework roles

    • DoDD 8140 Work Roles

      US DoD 8140 Directive Frameworks

    • By European Skills Framework

      Align your enterprise cyber skills with ECSF profiles

    • By Skills Roadmap

      Find the right training path based on critical skills

    • New to Cyber

      Give your cybersecurity career the right foundation for success

    • Leadership

      Training designed to help security leaders reduce organizational risk

    • Degree and Certificate Programs

      Gain the skills, certifications, and confidence to launch or advance your cybersecurity career.

    Featured: Solutions for Emerging Risks

    New to Cyber resources

    Start your career
  • Community Resources
    Go one level top Back

    Community Resources

    Watch & Listen

    • Webinars
    • Live Streams
    • Podcasts

    Read

    • Blog
    • Newsletters
    • White Papers
    • Internet Storm Center

    Download

    • Open Source Tools
    • Posters & Cheat Sheets
    • Policy Templates
    • Summit Presentations
    • SANS Community Benefits

      Connect, learn, and share with other cybersecurity professionals

    • CISO Network

      Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders

  • For Organizations
    Go one level top Back

    For Organizations

    Team Development

    • Why Partner with SANS
    • Group Purchasing
    • Skills & Talent Assessments
    • Private & Custom Training

    Leadership Development

    • Leadership Courses & Accreditation
    • Executive Cybersecurity Exercises
    • CISO Network

    Security Awareness

    • End-User Training
    • Phishing Simulation
    • Specialized Role-Based Training
    • Risk Assessments
    • Public Sector Partnerships

      Explore industry-specific programming and customized training solutions

    • Sponsorship Opportunities

      Sponsor a SANS event or research paper

    Interested in developing a training plan to fit your organization’s needs?

    We're here to help.
    Contact us
  • Talk with an expert
  • Log In
  • Join - it's free
  • Account
    • Account Dashboard
    • Log Out
  1. Home >
  2. Blog >
  3. Zero Trust Blog Series - Blog 2: Architecting for Zero Trust
Ismael Valenzuela
Ismael Valenzuela

Zero Trust Blog Series - Blog 2: Architecting for Zero Trust

This is the second in a 4-part series of blogs covering the end-to-end aspects of zero trust

August 10, 2023

This is the second in a 4-part series of blogs covering the end-to-end aspects of zero trust.

Find the others here:

Blog 1: Adopting a Zero Trust Mindset

Blog 3: Instrumenting for Zero Trust

Blog 4: Operating for Zero Trust

Architecting for Zero Trust

Once organizations are on-board with the commitment to evolve their cybersecurity strategy towards one that increasingly enforces zero trust concepts, there is need to better understand what a "to be" zero trust architecture looks like. As discussed in the first blog, adopting a zero trust mindset must be followed by an organization-specific plan designed to gradually and purposefully move toward a mature or optimal zero trust cybersecurity implementation. The right plan will consider the organization's current enterprise cybersecurity posture and technologies, cybersecurity resources, high value IT assets, tolerance for risk, regulatory requirements, and organizational mission and objectives. Once established, the organization is ready to turn their zero trust vision into reality - which begins with a deeper look at the enterprise-wide network and cybersecurity architecture.

Why does Architecture Matter?

Why bother with an effort around architecture when IT teams can buy and deploy any number of tools to chip away at improving cybersecurity posture? Critically, because any tool deployed in a poorly designed, inadequately architected enterprise system will struggle to deliver the value they promise - leaving IT teams with limited potential to mature their systems along an achievable zero trust roadmap. As discussed on part 1, Zero Trust relies heavily on integration to achieve a defensible security architecture. This requires careful planning and well-defined security outcomes that are aligned to business goals. This is essentially what a security architecture provides.Failing to architect holistically for zero trust will result in a Whac-A-Mole and incomplete approach to cyberdefense, an inevitably, in an "indefensible security architecture". On the flip side, a well architected system will be equipped with the right building blocks for zero trust - laying the foundation on which zero trust solutions and supporting policies can incrementally improve, expand, adjust, and evolve, as business requirements continue to change. Said differently, teams can implement tools and technologies that improve various components of zero trust in isolation, but a solid understanding of zero trust architectural core components is required to realize the full benefit of this new and effective approach to cyberdefense.

Architecture Guidance from the Government

Given the government's commitment to improving the nation's cybersecurity also covered in the first blog in this series (ref Executive Order (EO) 14028, "Improving the Nation's Cybersecurity" and OMB's "Federal Strategy to Move the U.S. Government Towards a Zero Trust Architecture"), not to mention the many ZTA principles now baked into compliance standards like National Institute of Standards and Technology (NIST) SP 800-53, FISMA and FedRAMP baselines - getting on board with zero trust is no longer optional. Thankfully, the government has invested heavily in efforts to provide guidance for organizations and IT teams committed to the principles of zero trust - including architectural guidance. The National Cybersecurity Center of Excellence (NCCoE) team at NIST has recently published an updated Zero Trust Reference Architecture as part of their special publication on Implementing a Zero Trust Architecture (NIST SP 1800-35B). Given NIST is a U.S. government agency that leads efforts to advance measurement science, standards, and technology - federal employees and contractors supporting the secure operation of government IT systems or systems leveraged by government agencies should minimally familiarize themselves with this publication. The following diagram is a general zero trust reference architecture that highlights core components associated with zero trust implementations.

Figure 1 - NIST's Zero Trust Reference Architecture

ZTA Core Components

The core components presented in NIST's ZTA reference architecture (Policy Decision Point(s), Policy Information Points, Policy Enforcement Point(s), Policy Engine(s), and Policy Administrator(s)) are purposefully designed and positioned within the system to enable IT teams to implement and manage zero trust environments. Together these core components can be leveraged by organizations to implement and manage increasingly granular control that considers identity, context, organizational resource, and data to name a few. Remember, zero trust rejects the idea that perimeter security or granting blanket trust to "insiders" is adequate enough, pushing the concept of least-privilege access to a highly granular level. This requires a system to have deeply embedded policy management components throughout. Combined with thoughtful network macro and micro segmentation, granular control for system and session access protects each system's data and high value assets from potentially malicious outsiders and insiders alike.

Intertwined with the core ZTA components in the reference architecture are Subjects and Resources, representing the actors requesting/requiring access and the corporate resources they are requesting access to respectively. These put the components in context of generic system sessions and transactions.

  • Subjects: Subjects may be devices, end users, applications, servers, and other non-human entities that request information from resources. Human subjects (i.e., users) are authenticated. Non-human subjects are both authenticated and protected by endpoint security.
  • Resources: Resources refers to enterprise resources (e.g., data, applications, corporate services) that may be located on-premises or in the cloud, representing all that needs to be secured, protected, and judiciously made available to subjects in a least-privilege manner.

Understanding Each Core Component

Each of the following core components plays a specific role in the protection of a system's data, and work together in a configured/coordinated fashion to do so.

Policy Decision Points (PDP)

A Policy Decision Point (PDP) makes decision about whether or not to permit a subject to access a resource. A PDP consists of the combined activities of the PE and PA functions, meaning the PDP owns the decision making and administration of those decisions within a ZTA environment. Many zero trust systems leverage the PE and PA capabilities inherent in identity, credential and access management (ICAM) technologies.

Policy Engine (PE)

A Policy Engine (PE) handles the ultimate decision to grant, deny, or revoke access to a resource for a given subject - delivering continuous trust evaluations in a ZTA environment. The PE calculates the trust scores/confidence levels and ultimate access decisions based on enterprise policy and information from supporting components. The PE executes its trust algorithm to evaluate each resource request it receives.

Policy Administration (PA)

A Policy Administrator (PA) executes the PE's policy decision by sending commands to the Policy Enforcement Point (PEP) to establish and terminate the communications path between the subject and the resource. It generates any session-specific authentication and authorization token or credential used by the subject to access the enterprise resource. While the PE makes and logs access decisions, the PA is responsible for enforcing those decisions.

Policy Enforcement Points (PEP)

The Policy Enforcement Point (PEP) is a data plane component and guards the trust zone that hosts one or more enterprise resources. Once the PEP receives an access request, the requestor is authenticated through the PA and authority is dynamically determined. The PEP handles enabling, monitoring and eventually terminating connections between subjects and enterprise resources. It operates based on commands it receives from the PA. Note that highly distributed systems which are very common in government and large corporations may require multiple PEPs to protect resources in different locations. Multiple PEPs may also be implemented to support load balancing.

Policy Information Points (PIP)

Policy Information Points (PIP) collect and deliver important information derived through telemetry and logs generated by supporting components in a system. Supporting components include technologies and capabilities that each contribute uniquely to establish maturity across CISA's (Cybersecurity and Infrastructure Security Agency) zero trust support pillars and cross-cutting capabilities discussed in Blog 1 of this series. The information gleaned from PIP supporting components is used to inform ZTA policy and policy enforcement.

ICAM - Identity, Credential and Access Management

Identity is at the heart of access control. The ICAM component includes the strategy, technology and governance for creating, storing, and managing subject (e.g., enterprise user) accounts and identity records and their access to enterprise resources. Cloud solutions consumed by government agencies are required to use multi-factor authentication as a part of FedRAMP baseline requirements, with some systems going so far as requiring a hard token (e.g., PIV card, CAC card, Yubikey) as a part of their authentication process. Identity has been referred to as the "new perimeter" in the era of zero trust - and is a key consideration for determining and ultimately implementing least-privilege access rights throughout a system.

EDR/EPP - Endpoint Detection & Response/Endpoint Protection Platform

The endpoint protection component includes the strategy, technology and governance to protect endpoints (e.g., servers, desktops, mobile phone, IoT devices and other non-human devices) and their data from threats and attacks as well as protect the enterprise from threats from managed and unmanaged devices. Some devices may have ZTA agents installed, while others may be agentless. Host firewalls, malware protection, and consistent vulnerability scanning on endpoint software are some examples of solutions that satisfy parts of this component - with an increasing interest in extended detection and response (XDR) solutions that bring some elements of automation to the area of endpoint protection - automation being another zero trust capability described by CISA.

Security Analytics

The security analytics component encompasses all the threat intelligence feeds and continuous traffic/activity monitoring for a hybrid enterprise environment. This component gathers security and behavior analytics about the current state of enterprise assets and continuously monitors those assets to actively respond to threats or malicious activity. This information can be used to inform the policy engine (PE), helping make dynamic access decisions. Analytics (combined with visibility) is also a fundamental ZTA component that cross-cuts CISA's zero trust pillar model. Most government and commercial organizations have existing tools that support security analytics to some degree (network detection and monitoring, traffic analysis, vulnerability scanners, and SIEM log analysis tools to name a few) - but it's also likely they may not be fully leveraging the tools in their stack or benefitting from all of the tools' capabilities.

Data Security

The data security component includes the policies an enterprise needs to secure access to enterprise resources, as well as the means to protect data at rest and in transit. Data security is a high priority item for government and commercial entities alike, with the government requiring FIPS-validated encryption for all data in transit and at rest in any systems that process federal data. Teams will need to consider capabilities including but not limited to data discovery, classification and labeling, encryption, integrity, availability, access protection, and audit and compliance as a part of this component.

While there are many components that constitute an enterprise-wide IT system, the ZTA core components are defined specifically to deliver the granular access and management capabilities required for optimal zero trust implementations.

It should be noted that each of the core components do not necessarily directly correlate to physical hardware or software element. In fact, while the simplicity of the architecture might lead readers to believe that the supporting components are simple plug-ins that respond in real-time to the PDP, in many cases the PIP supporting components (ICAM, EDR/EPP, security analytics, and data security) will each represent complex infrastructures and suites of tools and technologies working in an integrated way through automation and orchestration. Some ZTA logical component functions may be performed by multiple hardware or software components, or a single software component may perform multiple logical functions. Understanding each component, the work it does and the purpose it serves must precede analysis of and decisions about specific tools and technologies used to instrument and configure an environment for zero trust.

What Comes Next? A Plan to Implement...

Among several measures, EO 14028 actually requires all federal civilian agencies to establish plans to drive adoption of ZTA. Reaching the point in a zero trust journey where an organization has defined a reference architecture that works for their operations - the implementation plan is right around the corner. Implementation, along with the zero trust architecture, will be a part of the organization's broader cybersecurity improvement plan. The implementation portion of the plan will require teams to begin mapping existing/legacy tools and capabilities against the target architecture to gain clarity around what they have to work with and identify significant gaps in their enterprises where new capabilities need to be acquired.

Post-architectural development plans should include a validation that the enterprise-specific zero trust architecture contains the right ingredients and is aligned with the use cases and mission of the organization being served. All organizations and government agencies have unique risk tolerances and cybersecurity needs specific to their missions, so teams must ensure the system is architected to provide protection that is appropriate for the information it processes/contains and the business it supports. For those supporting government IT systems that are required to adhere to standards and regulations like FISMA, FedRAMP, CMMC, or DoD ILs (DoD's FedRAMP Plus authorization), those additional baseline requirements will also need to be taken into consideration as a part of the zero trust-centric strategic cybersecurity improvement plan. Understanding the basic architectural components presented in this blog should help IT and security teams realize their zero trust objectives are within reach and identify the right use of core components - paving the way for incremental but well-orchestrated movement along the zero trust path.

More to come! Look for Blog 3 in this zero trust series, "Instrumenting for Zero Trust," which will focus on the technologies and tools that can be used to implement them.

Grow You Zero Trust Competencies with SANS

SANS is pleased to offer a 6-day course to equip participants with skills and knowledge to translate the concept of zero trust into actionable steps. Acquired skills will aid in building a robust security infrastructure, layer by layer, across hybrid environments, as you embark on a journey towards Zero Trust.

Course: Defensible Security Architecture and Engineering: Implementing Zero Trust for the Hybrid Enterprise 36 CPEs

This course is designed to help students establish and maintain a holistic and layered approach to security, while taking them on a journey towards a realistic 'less trust' implementation, based on Zero Trust principles, pillars and capabilities. Effective security requires a balance between detection, prevention, and response capabilities, but such a balance demands that controls be implemented on the network, directly on endpoints, and within cloud environments. This course will help your organization:

  • Identify and comprehend deficiencies in security solutions
  • Design and Implement Zero Trust strategies leveraging current technologies and investment
  • Maximize existing investment in security architecture by reconfiguring existing technologies
  • Layer defenses to increase protection time while increasing the likelihood of detection
  • Improved prevention, detection, and response capabilities
  • Reduced attack surface

For course details: https://www.sans.org/cyber-security-courses/defensible-security-architecture-and-engineering/

About SANS

SANS empowers cyber security professionals with the practical skills and knowledge they need to make our world a safer place through high quality training, certifications, scholarship academies, degree programs, cyber ranges, and resources to meet the needs of every cyber professional. Our data, research, and the top minds in cybersecurity collectively ensure that individuals and organizations have the actionable education and support they need.

Share:
TwitterLinkedInFacebook
Copy url Url was copied to clipboard
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Tags:
  • Cloud Security
  • Cyber Defense

Related Content

Blog
cloudsecnext_blog_image.png
Cloud Security, DevSecOps
October 16, 2023
A Visual Summary of SANS CloudSecNext Summit 2023
SANS CloudSecNext Summit was hybrid event for the cloud security community. Check out these graphic recordings of the talks created in real-time.
No Headshot Available
Alison Kim
read more
Blog
SANS_Cloud_Security_Exchange_2023.png
Cloud Security, DevSecOps
August 18, 2023
A Visual Summary of SANS Cloud Security Exchange 2023
Check out these graphic recordings created in real-time throughout the event for SANS Cloud Security Exchange 2023.
No Headshot Available
Emily Blades
read more
Blog
SANS_-_Blog_-_Zero_Trust_-_What_is_Zero_Trust_Architecture_-340x340_Thumb.jpg
Cyber Defense
August 2, 2023
What is Zero Trust Architecture?
This article outlines what Zero Trust is, how Zero Trust works, the five core principles of Zero Trust, and the stages of implementing Zero Trust.
SANS Cyber Defense
read more
  • Company
  • Mission
  • Instructors
  • About
  • FAQ
  • Press
  • Contact Us
  • Careers
  • Policies
  • Training Programs
  • Work Study
  • Academies & Scholarships
  • Public Sector Partnerships
  • Law Enforcement
  • SkillsFuture Singapore
  • Degree Programs
  • Get Involved
  • Join the Community
  • Become an Instructor
  • Become a Sponsor
  • Speak at a Summit
  • Join the CISO Network
  • Award Programs
  • Partner Portal
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
  • Privacy Policy
  • Terms and Conditions
  • Do Not Sell/Share My Personal Information
  • Contact
  • Careers
© 2025 The Escal Institute of Advanced Technologies, Inc. d/b/a SANS Institute. Our Terms and Conditions detail our trademark and copyright rights. Any unauthorized use is expressly prohibited.
  • Twitter
  • Facebook
  • Youtube
  • LinkedIn