Thursday, March 30, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > The U.S. Department of Defense announces its zero trust strategy

The U.S. Department of Defense announces its zero trust strategy

The zero trust strategy of The U.S. Department of Defense, which will cover entire military departments, has been published.


Hanife Diktas Hanife Diktas
November 25, 2022
2 min read
The U.S. Department of Defense releases Zero Trust Strategy and Roadmap
  • The U.S. Department of Defense’s zero trust strategy has been published and defines a roadmap for its plan on how to achieve a new level of cybersecurity.
  • The strategy lays out the U.S. Department of Defense’s approach to achieve zero trust and to keep critical data secure.
  • Zero trust is a new model for cybersecurity defenses and it is entirely based on the idea that networks are always at risk.

The U.S. Department of Defense’s zero trust strategy and roadmap were published by the chief information officer. The strategy gives the public a fresh look at its plan to achieve a new level of cybersecurity.

The need for zero trust approach

The Department of Defense says on its website that today’s and future cyber threats and attacks have driven a need for a zero-trust approach. The department adds that its information systems are on a wide scale and continuous attacks from known and unknown malicious actors.

According to the strategy report, the Department’s most significant strategic and advanced competitor is the People’s Republic of China. The other state-sponsored adversaries and individual malicious actors also often breach the Department’s defensive barriers and wander freely within the information systems.

The new zero-trust security philosophy will eliminate the traditional idea of defenses, trusted networks, devices, personas, or processes. It requires designing a more efficient architecture that increases security as well as the user experience, and overall mission performance. It is a new paradigm for cybersecurity and it is entirely based on the idea that networks are always at risk. The practice is often defined as “never trust, always verify”.

Adopting a more agile cybersecurity defense

Zero trust uses repeated multi-factor authentication, micro-segmentation, advanced encryption, endpoint security, analytics, and robust auditing as well as protecting data, applications, assets, and services to deliver strong cyber security. The Department is adopting a more agile, more mobile, cloud-supported workforce, collaborating with the entirety of DoD enterprise, including federal and non-federal organizations and mission partners working on a variety of missions.

The Zero Trust strategy will decrease the attack surface, reduce risk, offer opportunities to manage the full range of risks such as policy, programming, execution, and cybersecurity, and enable more effective data-sharing in collaborative environments. If a device, network, user, or credential is compromised, the fixing will be handled more quickly. The framework defines four strategic goals;

  • Zero trust culture adoption
  • DoD information systems secured and defended
  • Technology acceleration
  • Zero trust enablement

The strategy also touches on the seven DoD Zero Trust Pillars, which is the basis for the strategy’s roadmap:

The U.S. Department of Defense aims to implement the zero trust strategy and its activities by 2027.

See more Cybersecurity News

A comprehensive guide to understanding Cybersecurity: What is Cybersecurity?


Hanife Diktas

Hanife Diktas

Hanife Diktas is a news editor at Cloud7 News. Hanife started her career in the manufacturing sector in the marketing and sales department. Hanife worked in industrial equipment, renewable energy, and technology sectors. Hanife Diktas did her bachelor's degree in business administration and completed a master's degree in management at Yeditepe University in Istanbul, Turkey. Hanife is a Linux user, and she also contributed to AlmaLinux OS at the beginning of the project. Hanife focuses on web hosting, cloud computing, data centers, cybersecurity, Linux OS, and virtualization technologies. Hanife enjoys creating content and shooting videos covering these topics.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
Ubuntu 23.04 “Lunar Lobster” daily builds are now ready for download

Ubuntu 23.04 "Lunar Lobster" daily builds are now ready for download

Related News

7 best practices and tools to use for Linux security

7 best practices and tools to use for Linux security

March 24, 2023 5:00 pm
CISA aims to identify vulnerabilities that attract ransomware

CISA aims to identify vulnerabilities that attract ransomware

March 22, 2023 2:10 pm
7 best cybersecurity schools

7 best cybersecurity schools

March 21, 2023 9:00 pm
Akamai researchers warn about the new HinataBot botnet

Akamai researchers warn about the new HinataBot botnet

March 20, 2023 6:10 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Recent News

  • Trisquel GNU/Linux 11.0 review
  • What is continuous testing in DevOps?
  • [Event] FOSSASIA Summit 2023 – Get your discounted ticket now
  • What is browser automation: Getting started guide
  • 7 best live chat plugins for WordPress

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Artificial Intelligence
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.