31.01.2023 Views

Cyber Defense eMagazine February Edition for 2023

Cyber Defense eMagazine February Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine February Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

A linchpin of Biden’s cyber-defense plan is zero trust — the “Never trust, always verify” security<br />

framework generating a lot of attention. For more than a year, Biden has called <strong>for</strong> the accelerated<br />

adoption of secure cloud infrastructure and zero-trust architecture.<br />

Zero trust represents an important step <strong>for</strong>ward, but it’s no panacea. Be<strong>for</strong>e the federal government sees<br />

broad adoption of zero-trust principles, there are several significant challenges to overcome.<br />

The time is now <strong>for</strong> a zero-trust security approach.<br />

Zero trust is not a single product, technology. Nor is it a turnkey solution. It’s a methodology.<br />

The main principles of zero trust include the following:<br />

• Denying access to an organization’s data by default.<br />

• Never trust any device by default.<br />

• Isolate workloads and data as part of a granular authentication process.<br />

Verified users are given access to only the data, applications, and other resources needed to complete<br />

their work.<br />

While zero trust has been around <strong>for</strong> over a decade, its popularity has spiked with the rise of hybrid cloud<br />

and hyperconnected environments. In a world in which resources sprawl across a massive attack surface,<br />

new security practices are necessary.<br />

But implementing zero trust can be tricky.<br />

Not every federal agency has access to mature security systems or operates computer systems that are<br />

compatible with zero-trust services. And not every government agency or entity can allocate the labor<br />

and funds necessary to undertake a major technology and operational overhaul.<br />

Weighing the challenges of zero-trust implementation<br />

Implementing zero trust requires agencies to reorganize and redesign IT infrastructure. Laptops are<br />

stolen frequently, <strong>for</strong> instance. There<strong>for</strong>e, if zero trust is to extend to all endpoints, organizations need to<br />

secure all devices. This requires patching and securing all hardware assets and could mean issuing<br />

completely new devices.<br />

Isolating workloads and in<strong>for</strong>mation via authentication processes is complex. Creating specific access<br />

policies <strong>for</strong> different workloads and resources requires enormous ef<strong>for</strong>t. Additionally, these policies<br />

typically need continuous updating.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2023</strong> <strong>Edition</strong> 103<br />

Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!