How Akamai's Zero Trust Framework Meets Critical U.S. Government Mandates

Keith Jordan

May 05, 2026

Keith Jordan

Keith Jordan

Written by

Keith Jordan

Keith Jordan is Director of Product Development within the Security Technology Group at Akamai, where he leads the delivery of Zero Trust capabilities for U.S. federal agencies. He specializes in translating Zero Trust strategy into operational architecture — advancing identity-centric security, microsegmentation, secure access, and resilient enterprise design across complex, high-risk mission environments.

Keith spent more than 15 years in operational and defense acquisition leadership roles in the U.S. Army. He uses a mission-first approach that integrates security architecture, acquisition strategy, and execution to deliver scalable, FedRAMP-aligned outcomes that strengthen enterprise resilience.

Share

U.S. mandates for Zero Trust architecture (ZTA) have continued to evolve since 2020, signaling a broad shift in how U.S. federal networks are secured. Agencies have needed to move away from traditional, perimeter-based architectures and legacy firewall setups — in which users, once authenticated, are often granted broad network access — toward a principle of “Never trust, always verify.” 

With the proliferation of artificial intelligence (AI), threat conditions, vulnerabilities, and cyberthreats like phishing and malware not only persist but also have grown significantly more complex.

Common mandates

Some of the more common U.S. mandates include:

NSA implementation guides

To implement these policy changes, the National Security Agency (NSA), in its role as National Manager (NM) for the U.S. National Security System (NSS), developed a series of Zero Trust Implementation Guidelines (ZIGs) to provide a roadmap for security teams and federal agencies to fully implement Zero Trust architectures.

The ZIG structure is derived from the DoD Zero Trust Reference Architecture’s seven Zero Trust pillars (User, Device, Application and Workload, Data, Network/Environment, Automation and Orchestration, and Visibility and Analytics). 

These pillars are delivered across five phases of implementation: Discovery, Phase One, Phase Two (target-level phases), Phase Three, and Phase Four (advanced level). Within these phases are 152 unique activities: 91 target-level (foundational) and 61 advanced-level steps to fully implement an advanced ZTA.

Akamai: A trusted ZTA provider

Akamai is a trusted global leader that is setting the standard for cybersecurity excellence with a Zero Trust security and microsegmentation platform that delivers a comprehensive enforcement layer across all seven Zero Trust pillars. Akamai’s Zero Trust Network Access (ZTNA) capabilities and overall Zero Trust approach align with — and often exceed — NSA guidance. With deep experience within federal civilian agencies and the Department of War (DoW), Akamai remains a trusted cornerstone of cyberdefense.

Akamai's strength: Comprehensive Zero Trust framework

Akamai provides a comprehensive, layered Zero Trust solution that applies continuous authentication and continuous authorization across all origins — cloud, on-premises, mobile, etc. We distinguish ourselves by ensuring comprehensive protection through deep integrations with our customers, and with leading identity, endpoint, and security operations platforms. This positions Akamai to support agencies operating at higher impact levels, including those with mission-critical and national security requirements.

The following table summarizes our Zero Trust solutions’ alignment with the DoD Zero Trust Reference Architecture’s seven pillars:

 

Zero Trust pillar

Pillar description

Akamai solutions

Strength and positioning

Network/Environment

Granular network segmentation and control

Segment, isolate, and control (physically and logically) the network environment with granular policy and access controls. 

Akamai Guardicore Segmentation

VERY strong (industry-leading microsegmentation) Delivers industry-leading microsegmentation with deep visibility into application dependencies and east-west (i.e., lateral server-to-server) traffic. Enables granular, policy-driven isolation of workloads and systems, forming a critical foundation for Zero Trust network control and protection against ransomware, lateral movement, and data exfiltration. 

Visibility and Analytics

Continuous visibility and intelligent analysis

Analyze events, activities, and behaviors to derive context and apply AI/ML. Achieve a highly personalized model that improves detection and reaction time in making real-time access decisions.

Akamai Guardicore Segmentation and third-party integrations (Elastic, Splunk, Sentinel, and others)

VERY strong (integrated visibility and analytics)
Provides rich telemetry, DNS flow data, and security analytics, including SIEM/SOAR integrations, across Akamai enforcement points. Use this data to derive actionable insights and strengthen verification across the ZTA. 

Data

Secure data access and protection

Data transparency and visibility is enabled and secured by enterprise infrastructure, applications, standards, robust end-to-end encryption, and data tagging.

Akamai Guardicore Segmentation and Enterprise Application Access

VERY strong (layered access control)

Combines identity-aware access management with workload segmentation to tightly control how users and systems interact with sensitive data, significantly reducing the risk of unauthorized access through layered Zero Trust enforcement.  

Device

Device trust and posture validation

Understand the health and status of devices to inform risk decisions. Real-time inspection, assessment and patching informs every access request.

Enterprise Application Access and partner integrations 

Strong (device-aware access via integration) Enables device-aware access decisions by incorporating posture and risk signals from endpoint security and management platforms, helping organizations enforce secure access based on device trust and compliance. Supports hybrid and multicloud environments.  

Automation and Orchestration

Automated policy enforcement and response

Automate security response based on defined processes and security policies enabled by AI; e.g., blocking actions or forcing remediation based on intelligent decisions. 

Akamai’s security operations center, platform APIs

Strong (ecosystem-driven automation) Integrates seamlessly with enterprise security orchestration and response tools, enabling automated policy enforcement and coordinated response actions across the ZTA. 

Application and Workload

Application and workload protection

Secure everything from applications to hypervisors, including containers and virtual machines.

App & API Protector and Akamai Guardicore Segmentation

VERY strong (industry-leading application and API protection) Protects modern applications and APIs while extending Zero Trust principles across workloads. Combines advanced API security with microsegmentation to reduce attack surface and enforce least-privilege access and communication. 

User

Identity-driven access control

Continually authenticate, assess, and monitor user activity patterns to govern users’ access and privileges while protecting and securing all interactions. 

Enterprise Application Access

VERY strong (identity-driven access control) Delivers secure, identity-driven access to applications, enabling continuous authentication via MFA and context-aware access decisions across users, devices, and locations. 

Akamai’s alignment with the DoD Zero Trust Reference Architecture’s seven Zero Trust pillars

Compliance as a competitive edge: FedRAMP and defense alignment

Akamai’s Zero Trust capabilities are backed by our rapidly expanding portfolio of federal security authorizations. Akamai is actively pursuing the highest level of federal security compliance, including FedRAMP High authorization for its key Zero Trust products and GovRAMP certification. 

Akamai is currently pursuing FedRAMP High authorization for Akamai Cloud meeting the strictest security baselines for mission-critical systems. This effort extends to Enterprise Application Access and Akamai Guardicore Segmentation, bringing high-level compliance to microsegmentation and east-west traffic enforcement. For more details, visit the Akamai Trust Center

Akamai’s Zero Trust and cloud capabilities are being aligned to support evolving DoW security frameworks, including high assurance environments and emerging certification models. Through continued investment in compliance and architecture, Akamai is building a portfolio designed to operate within the most demanding federal and defense environments.

Partnering with Akamai for a Zero Trust future

With Akamai’s ZTNA security solutions, agencies can operationalize the principles outlined in the NSA Zero Trust Implementation Guide and deliver a comprehensive enforcement layer across all seven pillars in the DoD Zero Trust Reference Architecture. From identity-driven access and device-aware policies to microsegmentation and application protection, Akamai provides the core capabilities required for seamlessly implementing ZTAs with existing federal security ecosystems.

Ready to accelerate your Zero Trust journey?

To learn how Akamai can support your organization’s alignment with the NSA Zero Trust framework and federal compliance requirements, contact our team to start the conversation.

Keith Jordan

May 05, 2026

Keith Jordan

Keith Jordan

Written by

Keith Jordan

Keith Jordan is Director of Product Development within the Security Technology Group at Akamai, where he leads the delivery of Zero Trust capabilities for U.S. federal agencies. He specializes in translating Zero Trust strategy into operational architecture — advancing identity-centric security, microsegmentation, secure access, and resilient enterprise design across complex, high-risk mission environments.

Keith spent more than 15 years in operational and defense acquisition leadership roles in the U.S. Army. He uses a mission-first approach that integrates security architecture, acquisition strategy, and execution to deliver scalable, FedRAMP-aligned outcomes that strengthen enterprise resilience.

Tags

Share

Related Blog Posts

Security
The Other Side of the MCP Threat Conversation
Learn how threat actors can directly exploit an exposed MCP server and its attack surface.
Security
The API Weak Spot: Study Shows AI Is Compounding Security Pressures
April 28, 2026
Nearly 90% of businesses faced API security incidents last year at an average cost of US$700,000. A new study shows how AI is increasing API risks.
Security
The Industrialization of Exploitation: Why Defensive AI Must Outpace Offensive AI
April 24, 2026
Today, vulnerabilities can be discovered, connected, and operationalized at a speed that traditional security processes were never designed to match. Learn more.