Building on DOD’s Proven Model for Zero-Trust Security
On the heels of the cybersecurity EO, DOD defined its approach to a zero-trust architecture the following year. The department identified seven pillars: users, devices, networks/IT environments, applications and workloads, automation and orchestration, and visibility and analytics, with data as the central pillar.
From there, DOD outlined technical and operational capabilities as well as the activities that make zero trust possible for each of the pillars.
“While many public agencies and private sector organizations talk about zero-trust principles and guidance, the Department of Defense went many steps further and defined how to do it,” Kelsey says. “And, having proven it out, now they’re giving it to the world.”
EXPLORE: Here are three key considerations for achieving a zero-trust framework.
Dell used DOD’s zero-trust architecture as the cornerstone of its Zero Trust CoE. Built in collaboration with CyberPoint International and the Maryland Innovation Security Institute, the center affords agencies the opportunity to understand how zero trust can be implemented in their IT environment.
The company additionally launched Project Fort Zero, a Dell-led industry initiative with more than 30 partners designed to accelerate organizations’ paths to zero trust by delivering a fully configured, end-to-end solution. The product will be validated by DOD and made available to both private and public sector entities.
“Project Fort Zero formalizes the technical work that we’ve been doing with DOD over the past 18 months,” Kelsey says. “It ensures that our work in zero trust isn’t a one-off activity or single moment in time; it establishes an opportunity for continuous innovation, from prototyping a product to making it generally available.”
Click the banner below to learn how Backup as a Service boosts data protection.