New York Tech Media
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
New York Tech Media
No Result
View All Result
Home Cybersecurity

Analyzing and implementing a national zero trust architecture

New York Tech Editorial Team by New York Tech Editorial Team
October 18, 2021
in Cybersecurity
0
Analyzing and implementing a national zero trust architecture
Share on FacebookShare on Twitter

This October, we once again find ourselves observing National Cybersecurity Awareness Month. While this effort traditionally targets consumers and businesses, the U.S. government has a unique interest in cyber awareness.

national zero trust architecture

The theme of the first week implores individuals and organizations to #BeCyberSmart, by highlighting best security practices while focusing on general cyber hygiene to effectively protect personal and company data. This includes using multi-factor authentication, backing up data, and updating software.

These basic practices are just a small part of the larger zero trust (ZT) security model, which is based on the concept such of “never trust, always verify,” multi-factor authentication, least privileged access, and micro-segmentation.

The zero trust security model has been around for over a decade, but did not reach widespread adoption until recently. But as today’s perimeter-based cybersecurity solutions continue to fail and produce news reports about high-profile data breaches and ransomware attacks, zero trust security continues to gain traction.

Zero trust and the U.S. government

The recent release of the Office of Management and Budget’s Federal Zero Trust Strategy, CISA’s Zero Trust Maturity Model, and Cloud Security Technical Reference Architecture documents represent a major step toward improving the U.S. government’s cyber defense capabilities. Triggered by Executive Order 14028, “Improving the Nation’s Cybersecurity,” the release of these draft reference models and guidance help government agencies accelerate their transition to a more secure, ZT-based approach to cybersecurity.

Getting the entire U.S. government to transition to a ZT security-based model represents a massive undertaking and requires careful planning, considerable resources, and multi-year, multi-phased, agency-specific implementation plans. For larger government agencies, such as the Department of Defense, that operate thousands of networks, tens of thousands of systems and applications and have hundreds of thousands of users and devices deployed worldwide, a comprehensive rollout of ZT throughout the enterprise could take 10 years or more. Nevertheless, significant security improvements in areas such as identity, data and network security could be achieved within just a few years.

Overcoming national zero trust concerns and obstacles

Two of the biggest challenges chief information officers within the affected government agencies will face with the administration’s mandated ZT adoption and its accelerated timeline is budget and resources. OBM, CISA and the National Institute of Standards and Technology (NIST) only provided the frameworks and ZT architecture needed to get started. It is still up to the individual agencies to budget for their ZT implementation, re-architect their current IT environments to comply with NIST’s ZT Architecture (ZTA) standard (NIST SP 800-207), identify the necessary internal and external talent, select relevant ZT technologies and vendors, re-accredit their systems, and retrain their workforce.

To help its government and commercial clients speed up their ZT adoption journey and to better manage the associated ZT migration risks, a platform-based approach to ZT will be necessary. Leveraging a NIST ZTA standard-compliant platform promotes interoperability, scalability, and extensibility. It also avoids vendor lock-in and allows organizations to start their ZT journey in areas in which they currently might have the highest exposure risks, such as networks, identities and access management.

Once the initial areas of concern have been addressed, other ZT focus areas, such as data, workloads and devices can be addressed. Developing a ZT strategy, conducting a ZT maturity and gap assessment, and creating a phased implementation plan are key to a successful ZT deployment.

The future of zero trust

Quantum supremacy refers to the point at which a quantum computer reliably does something that no conventional computer can do in a reasonable amount of time, e.g., break widely-used asymmetric encryption algorithms in record time. This poses a unique risk to global commerce, enterprises, consumers, and national security as it effectively renders many of our best data security and secure communication technologies useless.

The preparedness for the arrival of Quantum Day may rely on ZT strategies as nations work to prepare for the cyber risks that will inevitably accompany these computing advancements. While Q-Day isn’t predicted to arrive for another five to 10 years, preparation requires immediate action.

The principle of ZT is simple: trust no one, even if they work for your company, as employees can maliciously or ignorantly leave organization data vulnerable and accessible for a breach. It will likely take organizations several years to truly achieve comprehensive, multi-level ZT security, so it’s better to start now than wait until it’s too late to remediate.

As individuals, organizations, and now federal agencies acknowledge Cybersecurity Awareness Month, implementing zero trust will certainly be a top priority not only this October, but every month and day following.

Credit: Source link

Previous Post

Seoul Robotics debuts 3D plug-in with Milestone Systems XProtect

Next Post

Full-stack mobility startup Automovill raises funds from AngelBay

New York Tech Editorial Team

New York Tech Editorial Team

New York Tech Media is a leading news publication that aims to provide the latest tech news, fintech, AI & robotics, cybersecurity, startups & leaders, venture capital, and much more!

Next Post
Full-stack mobility startup Automovill raises funds from AngelBay

Full-stack mobility startup Automovill raises funds from AngelBay

  • Trending
  • Comments
  • Latest
Meet the Top 10 K-Pop Artists Taking Over 2024

Meet the Top 10 K-Pop Artists Taking Over 2024

March 17, 2024
Panther for AWS allows security teams to monitor their AWS infrastructure in real-time

Many businesses lack a formal ransomware plan

March 29, 2022
Zach Mulcahey, 25 | Cover Story | Style Weekly

Zach Mulcahey, 25 | Cover Story | Style Weekly

March 29, 2022
How To Pitch The Investor: Ronen Menipaz, Founder of M51

How To Pitch The Investor: Ronen Menipaz, Founder of M51

March 29, 2022
10 Raunchy Movies on Netflix You Won’t Regret Watching

10 Raunchy Movies on Netflix You Won’t Regret Watching

May 20, 2024
Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

March 29, 2022
Startups On Demand: renovai is the Netflix of Online Shopping

Startups On Demand: renovai is the Netflix of Online Shopping

2
Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

1
Menashe Shani Accessibility High Tech on the low

Revolutionizing Accessibility: The Story of Purple Lens

1

Netgear announces a $1,500 Wi-Fi 6E mesh router

0
These apps let you customize Windows 11 to bring the taskbar back to life

These apps let you customize Windows 11 to bring the taskbar back to life

0
This bipedal robot uses propeller arms to slackline and skateboard

This bipedal robot uses propeller arms to slackline and skateboard

0
Automat-it Vanta partnership

Automat-it And Vanta Partner To Transform Compliance Into A Growth Engine For AWS Startups

March 5, 2026
PointFive DeepWaste

DeepWaste AI Expands Cost Optimization to GPU Waste, Misconfigurations, and Provisioning Leakage

March 5, 2026
Reclaim Security team

Reclaim Security Raises $26M to Close the Remediation Gap With AI-Driven Automation

March 4, 2026
woman in green top posing beside a mirror wall

Inside the AI Shift: How Dolica Gopisetty Helps Enterprises Turn Hype into Real Transformation

February 25, 2026
New CISO Whisperer report highlights shift toward identity, integrity, and automation oversight

New CISO Whisperer report highlights shift toward identity, integrity, and automation oversight

February 23, 2026
AIUP and AINT*: FINQ Launches the First ETFs Fully Managed by Artificial Intelligence

AIUP and AINT*: FINQ Launches the First ETFs Fully Managed by Artificial Intelligence

February 11, 2026

Recommended

Automat-it Vanta partnership

Automat-it And Vanta Partner To Transform Compliance Into A Growth Engine For AWS Startups

March 5, 2026
PointFive DeepWaste

DeepWaste AI Expands Cost Optimization to GPU Waste, Misconfigurations, and Provisioning Leakage

March 5, 2026
Reclaim Security team

Reclaim Security Raises $26M to Close the Remediation Gap With AI-Driven Automation

March 4, 2026
woman in green top posing beside a mirror wall

Inside the AI Shift: How Dolica Gopisetty Helps Enterprises Turn Hype into Real Transformation

February 25, 2026

Categories

  • AI & Robotics
  • Benzinga
  • Cybersecurity
  • FinTech
  • New York Tech
  • News
  • Startups & Leaders
  • Venture Capital

Tags

AI AI QSRs Allseated AWS B2B marketing Business CISO CISO Whisperer coding Collaborations Companies To Watch cryptocurrency Cybersecurity Entrepreneur Fetcherr Finance FINQ Fintech hi-tech Hi Auto Investing Investors investorsummit Israel israelitech Leaders LinkedIn Leaders Metaverse Mindset Minnesota omri hurwitz OurCrowd PointFive PR QSR Real Estate start- up startupnation Startups Startups On Demand startuptech Tech Tech leaders Unlimited Robotics VC
  • Contact Us
  • Privacy Policy
  • Terms and conditions

© 2024 All Rights Reserved - New York Tech Media

No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital

© 2024 All Rights Reserved - New York Tech Media