Home > Storage > PowerScale (Isilon) > Product Documentation > Security and Compliance > Dell PowerScale OneFS: Security Considerations > Conclusion
The configuration steps in this section provide a framework for implementing a zero trust architecture on a PowerScale cluster. However, it is essential to understand that this is a model based on the NIST CST and data model. The exact implementation of the zero trust architecture depends on the data center, workflow, and IT administration requirements. Ensure that the zero trust architecture is adapted to your organization’s specific requirements.