Leverage Existing Cybersecurity Investments
By leaving the selection of tools to the discretion of each branch, the DOD is allowing for greater flexibility without sacrificing security. One reason for such an approach is to take into consideration limitations around budgets and acquisitions.
Branches can and must leverage existing cybersecurity investments as they work toward the maturity model, especially considering that most already have been applying zero-trust principles in pockets.
As the DOD explains in its roadmap, “there is one destination (zero trust) with many paths.” To that end, DOD’s zero-trust strategy details 45 capabilities that can be broken down into seven categories, or pillars: user, device, application and workload, data, network and environment, automation and orchestration, and visibility and analytics.
As branches dig into each pillar, they should ask themselves what technology already exists that can be used to meet this goal. For the user, device and application pillars, taking an inventory is the first step and is slated to happen this fiscal year or next.
EXPLORE: How agencies can best foster a security culture.
Identify and Categorize Users, Data and Applications
After taking an inventory of existing technology, the DOD must ensure it can identify and categorize users, data and applications across networks.
The DOD has more than 10,000 networks, each with its own identity solutions, physical security, segmentation and firewalls. A true culture of zero trust requires tagging all traffic to see beyond what’s happening on any single network.
Regarding users, zero trust entails enforcing the principle of least privilege, which limits employee access to only the data and applications they need to do their jobs. In this context, users refer to both individuals and nonhuman entities, such as applications talking to each other across environments.
Concerning data, agencies must track it not just at rest but in motion. This requires tagging all DOD data — determining its level of sensitivity to be secret, top-secret or mission-specific — and thinking of it as a system rather than a repository.
Altogether, identifying and categorizing data, users and apps across networks will allow branches to use artificial intelligence and machine learning to analyze and remediate risky behavior. For users, behaviors can be monitored so that risk is quantified, and any deviation from the norm is flagged and addressed without having to shut down the entire network. This level of targeted security is far more effective than the perimeter-based methods the DOD is phasing out.
DIVE DEEPER: How agencies are stepping up on their journey to zero trust.
Digital Rights Management Supports the Mission Anywhere
One reason the DOD is moving away from a perimeter-based model is because security in that context often entails locking down the entire network or overly restricting access to essential data, thereby hurting employees’ ability to do their jobs. Zero trust eliminates this perimeter, in part so the mission can happen anywhere: on the ground, in the air or in space.
A stated benefit of the DOD Zero Trust Strategy is the “the ability of a user to access required data from anywhere, from any authorized and authenticated user and device, fully secured.” Another is to support a “more agile, more mobile, cloud-supported workforce.”
Whether the branches choose to implement a holistic security solution or various point solutions, they must still preserve open yet secure communication to prevent silos. To ensure the mission can happen anywhere, branches must synchronize zero-trust enablement, deployment, components and policies across multiple clouds and myriad devices.
Remote access itself represents a big cultural shift for the DOD, while zero trust is the natural sequel. Branches must prioritize digital rights management for data — limiting access to only the intended recipients — and encryption.
Again, branches of the DOD have already been doing this in pockets. Now, it’s time to integrate existing capabilities to achieve the target level of zero trust in the stated timeline.
For any department, making a cultural shift regarding cybersecurity can seem daunting, but the DOD is balancing an aggressive timeline with a reasonable amount of flexibility. Similarly, its branches must balance being able to support missions anywhere without leaving its systems vulnerable to attack.