federalnewsnetwork.com Open in urlscan Pro
151.101.130.217  Public Scan

URL: https://federalnewsnetwork.com/commentary/2023/07/meeting-zero-trust-goals-with-modern-cybersecurity-solutions/
Submission: On July 21 via api from FI — Scanned from FI

Form analysis 4 forms found in the DOM

GET https://federalnewsnetwork.com/search/

<form id="header-search-form" role="search" method="get" class="search-form search-form--header" action="https://federalnewsnetwork.com/search/" tabindex="-1">
  <label class="search-form__label">
    <span class="search-form__label-text">Search</span>
    <input type="text" class="search-form__field" id="search-form__field" placeholder="Search …" value="" name="s" autocomplete="off">
  </label>
  <button id="searchsubmit" class="search-form__submit" type="submit" value="Search" aria-label="Submit search"><span>Submit </span>Search</button>
</form>

<form id="email-signup-mobile" class="email-signup-mobile" tabindex="-1">
  <input class="email-signup__email" type="email" placeholder="Newsletter">
  <button class="email-signup__submit" type="submit" aria-disabled="true">Submit</button>
</form>

GET https://federalnewsnetwork.com/search/

<form id="header-mobile-search-form" role="search" method="get" class="header-mobile-search-form" action="https://federalnewsnetwork.com/search/" tabindex="-1">
  <label class="search-form__label">
    <span class="search-form__label-text">Search</span>
    <input type="text" class="search-form__field" id="search-form__field" placeholder="Search …" value="" name="s" autocomplete="off">
  </label>
  <button id="searchsubmit" class="search-form__submit" aria-disabled="true" type="submit" value="Search" aria-label="Submit search"><span>Submit </span>Search</button>
</form>

Name: emailsignupformPOST https://federalnewsnetwork.com/sailthru-newsletters-signup/

<form action="https://federalnewsnetwork.com/sailthru-newsletters-signup/" name="emailsignupform" id="sailthru-form-content" class="form form--red form--red visible" method="post">
  <div class="form__row" id="form-inputs">
    <legend class="form__title">Sign up for breaking news.</legend>
    <input class="form__input" type="email" name="email" aria-label="Email Address" placeholder="Email Address" required="">
    <input class="form__submit form__submit--white" type="submit" name="sbutton" aria-label="Sign up button" value="Signup">
  </div>
  <!-- button class="disclaimer"></button -->
</form>

Text Content

 * Technology
   * Artificial Intelligence
   * Ask the CIO
   * Big Data
   * CIO News
   * Cloud Computing
   * Cybersecurity
   * IT Modernization
   * Open Data/Transparency
   * Reporter’s Notebook
 * Defense
   * On DoD
   * Army
   * Navy
   * Air Force
   * Space Operations
   * Defense Industry
 * Workforce/Management
   * Acquisition
   * Agency Oversight
   * Budget
   * Facilities/Construction
   * Hiring/Retention
   * Management
   * Unions
   * Workforce Rights/Governance
 * Pay & Benefits
   * Benefits
   * Fed Life
   * Open Season
   * Pay
   * Retirement
   * TSP
 * Commentary
   * Federal Report
   * Tom Temin
 * Audio
   * A Deeper Look with Joe Paiva
   * Accelerating Government
   * All About Data
   * Amtower Off-Center
   * Ask the CIO
   * The Business of Government Hour
   * Every Side of Cyber
   * Federal Drive
   * Federal Executive Forum
   * Fed Life
   * Federal Newscast
   * FEDtalk
   * For Your Benefit
   * GovNavigators
   * Innovation in Government
   * Inside the IC
   * Leaders & Legends
   * Modern Government
   * Off the Shelf
   * On DoD
   * Platform for the Mission
   * Search for Accountability
   * Security Clearance Insecurity
   * The Space Hour
   * Your Turn
   * More Audio Shows
 * Resources
   * Events & Webinars
   * FNN Knowledge Hub
   * Federal Insights
   * Ad & Sponsorship Opportunities

Menu Search
Search Submit Search
On Air: Business of Government Hour
Trending:
 * Telework rollbacks increasingly common
 * Telework an 'uphill battle' at SSA
 * VA: Independent oversight coming to acquisitions

Email Alerts
Listen Live
 * Listen
 * Schedule
 * Sports Schedule

Listen Live Schedule
 * Technology
   * Artificial Intelligence
   * Ask the CIO
   * Big Data
   * CIO News
   * Cloud Computing
   * Cybersecurity
   * IT Modernization
   * Open Data/Transparency
   * Reporter’s Notebook
 * Defense
   * On DoD
   * Army
   * Navy
   * Air Force
   * Space Operations
   * Defense Industry
 * Workforce/Management
   * Acquisition
   * Agency Oversight
   * Budget
   * Facilities/Construction
   * Hiring/Retention
   * Management
   * Unions
   * Workforce Rights/Governance
 * Pay & Benefits
   * Benefits
   * Fed Life
   * Open Season
   * Pay
   * Retirement
   * TSP
 * Commentary
   * Federal Report
   * Tom Temin
 * Audio
   * A Deeper Look with Joe Paiva
   * Accelerating Government
   * All About Data
   * Amtower Off-Center
   * Ask the CIO
   * The Business of Government Hour
   * Every Side of Cyber
   * Federal Drive
   * Federal Executive Forum
   * Fed Life
   * Federal Newscast
   * FEDtalk
   * For Your Benefit
   * GovNavigators
   * Innovation in Government
   * Inside the IC
   * Leaders & Legends
   * Modern Government
   * Off the Shelf
   * On DoD
   * Platform for the Mission
   * Search for Accountability
   * Security Clearance Insecurity
   * The Space Hour
   * Your Turn
   * More Audio Shows
 * Resources
   * Events & Webinars
   * FNN Knowledge Hub
   * Federal Insights
   * Ad & Sponsorship Opportunities

Submit
Search Submit Search

Hubbard Radio Washington DC, LLC. All rights reserved. This website is not
intended for users located within the European Economic Area.


Commentary


MEETING ZERO TRUST GOALS WITH MODERN CYBERSECURITY SOLUTIONS

Chris Cullerot
July 19, 2023 1:35 pm
4 min read
      

Released earlier this spring, CISA’s Zero Trust Maturity Model 2.0 assists
agencies in navigating their zero trust journey by offering a well-defined
roadmap for the widespread adoption of zero trust in the government sector. A
zero trust approach sets a high bar for security by assuming that every user,
device and application is a potential threat and requires verification and
authorization before granting access.

CISA’s zero trust model provides federal agencies with a clear path...

READ MORE

Released earlier this spring, CISA’s Zero Trust Maturity Model 2.0 assists
agencies in navigating their zero trust journey by offering a well-defined
roadmap for the widespread adoption of zero trust in the government sector. A
zero trust approach sets a high bar for security by assuming that every user,
device and application is a potential threat and requires verification and
authorization before granting access.

CISA’s zero trust model provides federal agencies with a clear path to follow,
making it another vital tool to help define the zero trust journey — one that
will help them meet the September 2024 deadline set by the Office of Management
and Budget’s memo, M-22-09 Federal Zero Trust Strategy.

While every agency has a unique starting point, there are several steps that can
help agencies as they work to achieve an “optimal” posture in their zero trust
journey and meet upcoming deadlines. These steps include taking inventory of
their current posture, continually modernizing to implement the strongest
standards, considering the impact of supply chain security and improving
detection of cyber incidents and investigative capabilities.


UNDERSTANDING YOUR POSITION IN THE ZERO TRUST JOURNEY

Proper security tools are essential to an agency’s defense against
cyber-attacks. But first, agencies must have a complete understanding of their
systems’ strengths and weaknesses. This includes knowing which tools are
currently being utilized, which require enhancements, and which are lacking
entirely. This creates a baseline for the agency’s zero trust position and
establishes required actions.

        Insight by Carahsoft: In our new ebook, we look at sweeping federal
initiatives and agency-specific efforts to empower the government’s cyber
workforce — featuring from Air Force, FEMA, DoD, DHS, Navy and OPM leaders.

A “rip and replace” approach is not a practical solution for cybersecurity
infrastructure, so starting with a clear baseline can allow agencies to
effectively support zero trust pillars of identity, devices, networks,
applications and workloads and data by understanding where the
cyberinfrastructure can be improved.


MODERNIZING AND IMPLEMENTING STRONGER STANDARDS

A focus on SLAs, dashboards with real-time analytics, and enterprise IT security
posture can support agencies as they assess the effectiveness of their current
security efforts. It can also ensure they align with increasingly vigorous
standards, like the ones outlined in recent zero trust guidelines, and track the
continued improvement of maturity levels over time.

Key standards highlighted in zero trust guidelines include using
enterprise-managed accounts, which allow employees access to everything they
need while remaining reliably protected from sophisticated attacks, encrypting
all network traffic and consistently testing enterprise applications.

Federal security and data teams must also work together to develop data
categories and security rules to automatically detect and ultimately block
unauthorized access to sensitive information.




SECURING THE IT SUPPLY CHAIN

Over the past couple of years, federal agencies have become keenly aware of the
need to protect their IT supply chain. This includes implementing solutions that
provide a flexible and customizable approach to evaluating vendors, and those
that can help close down parts of the network if one portion of the security
supply chain becomes compromised. These solutions and approaches are already
playing an imperative part for various agencies across government.

For example, to achieve the crucial balance between enhancing network security
and enabling dynamic autonomous operations for law enforcement, the Treasury
Department leveraged logical micro-segmentation and network-based segmentation
to help strengthen network security. Segmenting the agencies’ network can
isolate environments and prevent compromised components from jeopardizing the
entire network. This approach has proven highly effective in maintaining the
security and reliability of operations.




IMPROVING DETECTION OF CYBER INCIDENTS AND REMEDIATION CAPABILITIES

The sheer volume of cyber incidents that analysts receive in a cabinet-level
security operations center makes it impossible to appropriately assess each one
and quickly identify those that require immediate attention. Agencies need
access to tools that can automate detection and prioritization so analysts can
take appropriate actions fast enough to address a threat. Should a severe
incident take place, their ability to contain, eradicate and recover from the
event is crucial.

As part of its process of enforcing a uniform approach to cyber incidents, the
Environmental Protection Agency worked toward automating functions of its
security and risk team’s responsibilities. Implementing a security incident
response module helped structure security operation agency-wide, enabling a more
uniform approach to emerging threats. Utilizing security orchestration and
automation response helped reduce manual errors and streamlined response
processes, improving the agency’s ability to respond to threats quickly.

        Read more: Commentary

By embracing zero trust principles, agencies can be more proactive and diligent
in protecting their IT infrastructure and users in today’s digital landscape.
However, it’s a big undertaking that requires ongoing effort to implement fully.
To identify which standards need strengthening, agencies must understand their
position in their zero trust journey.



From there, agencies can make informed decisions on flexible cybersecurity
solutions that align with Zero Trust Maturity Model 2.0 pillars. This will help
accelerate the implementation of zero trust without compromising compliance
requirements and citizens’ needs, all while limiting the impact of a potential
breach. By taking small steps, agencies can evaluate their current compliance
levels, create
plans to increase maturity and stay informed and aligned with federal guidance
and regulations.

Chris Cullerot is director of technology and innovation at iTech AG.

Copyright © 2023 Federal News Network. All rights reserved. This website is not
intended for users located within the European Economic Area.

      
 * Go Apple's Website to download the APP
 * Go Google's Website to download the APP


Sign up for breaking news.



RELATED STORIES

Amelia Brust/Federal News Network

NATIONAL CYBERSECURITY STRATEGY CALLS FOR SIGNIFICANT CHANGE IN CRITICAL
INFRASTRUCTURE


Commentary Read more

WHAT’S NEXT FOR AGENCIES IN THEIR ZERO TRUST JOURNEY


Commentary Read more

FOR VA, MOVING TO ZERO TRUST IS SIMPLE CONCEPT TO UNDERSTAND, BUT TOUGH TO
IMPLEMENT


Ask the CIO Read more

Related Topics
Chris Cullerot Commentary Cybersecurity IT Modernization iTech AG Technology
zero trust


AROUND THE WEB



DOWNLOAD 16,000+ WOODWORKING PLANS FOR JUST $67 BUILD YOUR OWN STUFF

TedsWoodworking

THE 50 MOST ROMANTIC HOTELS IN THE WORLD

bakeinto

AGE DOESN'T MATTER FOR THESE 32 FAMOUS COUPLES

Inspiredot

11 PECULIAR HOUSES FROM AROUND THE WORLD THAT WILL IMPRESS YOU

Inspiredot

WHAT WILL HAPPEN IF YOU EAT GINGER EVERY DAY?

Inspiredot

15 PLAYFUL CATS STICKING THEIR TONGUES OUT AT YOU

Inspiredot

BOOST YOUR MOOD WITH THESE HILARIOUS TWEETS FROM CAT OWNERS

Inspiredot

THEY WERE STARS BEFORE BUT NOW EVEN PAPARAZZI DON'T FOLLOW THEM

Inspiredot

LUXURY TRAVEL DESTINATIONS OFTEN VISITED BY RICH & FAMOUS PEOPLE

Inspiredot

The content you see here is paid for by the advertiser or content provider whose
link you click on, and is recommended to you by Revcontent. As the leading
platform for native advertising and content recommendation, Revcontent uses
interest based targeting to select content that we think will be of particular
interest to you. We encourage you to view your opt out options in Revcontent's
Privacy Policy


WANT YOUR CONTENT TO APPEAR ON SITES LIKE THIS?

Increase Your Engagement Now!


WANT TO REPORT THIS PUBLISHER'S CONTENT AS MISINFORMATION?

Submit a Report
Got it, thanks!



THE LATEST IN GOVERNMENT EVENTS POWERED BY:


7|27 Kelley Barracks Tech Expo
7|27 CISA Tabletop Exercise Package (CTEP)...
7|27 Tampa Cybersecurity Conference
View More Events
Post Your Event


RELATED STORIES

 * National Cybersecurity Strategy calls for significant change in critical
   infrastructure Commentary
 * What’s next for agencies in their zero trust journey Commentary
 * For VA, moving to zero trust is simple concept to understand, but tough to
   implement Ask the CIO


TOP STORIES

 * VA says ‘true independent’ oversight coming to major acquisitions after
   lawmaker probes Top Story
 * ‘Trustworthy AI’ executive order in the works for agencies to keep risks in
   check ARTIFICIAL INTELLIGENCE
 * CISA sees CDM program entering ‘new era’ with focus on cyber defense
   operations CYBERSECURITY
 * Intelligence community and Defense Department to share classified cloud
   services DEFENSE
 * USDA leaning harder into software-as-a-service to satisfy mission needs ASK
   THE CIO



Federal News Network
About FNN
 * News Team
 * Careers
 * Contact Us

Connect
 * Events
 * Press Releases
 * RSS Feeds

Partnerships
 * Advertise
 * Partners & Events
 * Hubbard Radio
 * Insights

Listen
 * Podcasts
 * Radio Shows
 * Sports
 * WTOP

 * Follow Federal News Network on Linkedin
 * Follow Federal News Network on Facebook
 * Follow Federal News Network on Twitter

 * Go Apple's Website to download the APP
 * Go Google's Website to download the APP


 * Terms of Use
 * Copyright/Usage Policy
 * DMCA Notice
 * Privacy Policy
 * Comment Policy
 * EEO Report
 * FCC Online Public Inspection File
 * FCC Applications

Need help accessing the FCC Public File due to a disability? Please contact
Susan Rushkowski at publicfiledc@hubbardradio.com or (202) 895-5027.

Copyright 2023 Hubbard Radio Washington DC, LLC. All rights reserved. This
website is not intended for users located within the European Economic Area.



Update Privacy Preferences
A Raptive Partner Site