Pentagon trusted computing experts eye zero-trust architecture to improve critical information security
WASHINGTON – The U.S. Department of Defense (DOD) is set to adopt an initial zero-trust architecture by the end of the calendar year, switching from a network-centric to a data-centric modern information security model. C4ISRnet reports. Continue reading original article
The Military & Aerospace Electronics take:
12 Oct. 2020 -- Zero trust means an organization does not inherently trust any user. Trust must be continually assessed and granted in a granular fashion. This allows defense agencies to create policies that provide secure access for users connecting from any device, in any location.
Understanding how the DOD will benefit from this new zero-trust security model involves the intent and weaknesses of the department’s current Joint Information Environment (JIE) architecture.
The JIE framework was developed to address inefficiencies of siloed architectures. The goal of developing one trusted-computing architecture with JIE was to collapse network security boundaries, reduce the DOD’s external attack surface and standardize management operations.
John Keller, chief editor
Military & Aerospace Electronics