WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Posts Passthrough: CISA and NSA Release Cybersecurity Information Sheets - Advancing Zero Trust Maturity and Cloud Security Best Practices
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Community Partners
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Passthrough: CISA and NSA Release Cybersecurity Information Sheets – Advancing Zero Trust Maturity and Cloud Security Best Practices

Author: Chase Snow

Created: Thursday, March 7, 2024 - 18:54

Categories: Cybersecurity, Federal & State Resources, Security Preparedness

CISA and the NSA released five joint Cybersecurity Information Sheets (CSIs) to provide organizations with recommended best practices and/or mitigations to improve the security of their cloud environment(s).

  • Use Secure Cloud Identity and Access Management Practices
  • Use Secure Cloud Key Management Practices
  • Implement Network Segmentation and Encryption in Cloud Environments
  • Secure Data in the Cloud
  • Mitigate Risks from Managed Service Providers in Cloud Environments

CISA and NSA encourage all organizations to review the practices and implement the mitigations provided in the joint CSIs to help strengthen their cloud security.  

The NSA also released a Cybersecurity Information Sheet (CSI) on Tuesday entitled “Advancing Zero Trust Maturity Throughout the Network and Environment Pillar.” This CSI provides guidance on how to use Zero Trust principles to strengthen internal network control and contain network intrusions to a segmented portion of the network. The Network and Environment Pillar is the fifth of seven pillars that make up the Zero Trust framework, they include:

  • User
  • Device
  • Application & Workload
  • Data
  • Network & Environment
  • Automation & Orchestration
  • Visibility & Analytics

The purpose of Zero Trust principles is to operate under the assumption that threats already exist within the network boundaries. This is a type of mindset that allows personnel and organizations to attentively identify, protect against, and respond to cyber intrusions. WaterISAC encourages members to review this CSI and to apply Zero Trust principles in their environments. For more information on Tuesday’s CSI, access NSA. 

Access the NSA’s full “Zero Trust” Cybersecurity Information Sheet below.

Attached Files:

CSI-ZERO-TRUST-NETWORK-ENVIRONMENT-PILLAR

Related Resources

Tip of the Week – May 14, 2026

May 14, 2026 in Cybersecurity, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 14, 2026)

May 14, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

(TLP:CLEAR) Non-Human Identities (NHIs) Are Growing Faster Than Most Security Programs

May 14, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar