Feb. 24, 2024, 12:42 a.m. | CKMo

DEV Community dev.to

This guide gives a children’s-level overview for zero trust principles based on NIST SP 800-207 Zero Trust Architecture. It is part of Pomerium's Children's Guide series.


(All images are generated with AI.)


Once upon a time there was an app named Alice. She grew up under the watchful eye of DevDad, but no app could help people while stuck in the Sand Castle. The day came for Alice to leave the safety of the Sand Castle, and DevDad …

alice app architecture children cybersecurity generated guide images introduction nist principles series s guide trust under watchful eye zero trust zerotrust zero trust architecture

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Data & Security Engineer Lead

@ LiquidX | Singapore, Central Singapore, Singapore

IT and Cyber Risk Control Lead

@ GXS Bank | Singapore - OneNorth

Consultant Senior en Gestion de Crise Cyber et Continuité d’Activité H/F

@ Hifield | Sèvres, France

Cyber Security Analyst (Weekend 1st Shift)

@ Fortress Security Risk Management | Cleveland, OH, United States

Senior Manager, Cybersecurity

@ BlueTriton Brands | Stamford, CT, US