Zero trust gains momentum in U.S. military's new approach to managing microelectronics acquisition

June 17, 2020
The aged foundry method was time-consuming and not cost-effective for many suppliers, hampering the fielding of the important technology.

WASHINGTON – Zero trust architecture is becoming more popular in the U.S. Department of Defense (DOD) and serves as a model for how the military fields microelectronics. Fedscoop reports. Continue reading original article

The Military & Aerospace Electronics take:

17 June 2020 -- Zero trust security relies on continuous validation for access as a user moves around a network regardless of his physical location and relationship to an organization, instead of a one-and-done security check like the normal user name and password. In essence, it gives users or other device personas accessing a network “zero trust” as it connects to a network.

That mentality is the leading force behind how the DOD performs microelectronics acquisition, says Mark Lewis, director of defense research and engineering for modernization.

Microelectronics are in everything from weapons systems on fighter jets to IT platforms. If a malicious or weak microchip is implanted into the military’s systems, it could open wide cyber attack options. Zero trust is the department’s new answer to replace the older “trusted foundry” system where DOD had oversight over the physical development of the microelectronics.

Related: Deploying commercial trusted computing for defense and aerospace applications at the speed of technology

Related: Government, military search for ways to secure networks, shield technology supply chain from cyber attacks

Related: Are we in the midst of an embedded computing industry shakeout?

John Keller, chief editor
Military & Aerospace Electronics

Voice your opinion!

To join the conversation, and become an exclusive member of Military Aerospace, create an account today!