The National Security Agency has published guidance on how to protect applications and workloads from unauthorized access, as part of a series focused on supporting adoption of the Pentagon's zero-trust model across national security systems, the Defense Department and the defense industrial base.