<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>Zero Trust: How to adapt accordingly &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/zero-trust-how-to-adapt-accordingly/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 25 Aug 2025 19:39:27 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>Zero Trust: How to adapt accordingly &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Zero Trust: How to Adapt Accordingly</title>
		<link>https://www.steelcloud.com/zero-trust-how-to-adapt-accordingly/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 15 Feb 2022 18:03:08 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[cisa]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[configuration drift]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Defensive line]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[lot vulnerabilities]]></category>
		<category><![CDATA[mitre att&ck]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[ransomware attacks]]></category>
		<category><![CDATA[Security Technical Implementation Guide]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system hardening]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<category><![CDATA[Zero Trust: How to adapt accordingly]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=83009</guid>

					<description><![CDATA[Zero Trust: How to adapt accordingly with secure and compliant baselines using automation January’s OMB Memorandum detailing the White House Executive Order on Zero Trust has government and defense industrial base (DIB) organizations talking. In last week’s Tech Talk Tuesday, we shared some basics of Zero Trust, including a refresher on network access control (NAC) ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
