31.07.2023 Views

The Cyber Defense eMagazine August Edition for 2023

Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

While making this progress, agencies must understand the impact a successful zero trust process can<br />

have on data and the future of government decision-making. <strong>The</strong>re are also key strategies and data<br />

governance policies that agencies can implement to abide by the CISA guidelines and find achievable<br />

solutions <strong>for</strong> a zero trust future.<br />

How Agencies Can Safeguard <strong>The</strong>ir Data<br />

<strong>The</strong> updated ZTMM from CISA claims that agency data should be protected on devices, in applications,<br />

and on networks in accordance with federal requirements, and that agencies should inventory,<br />

categorize, and label data; protect data at rest and in transit; and deploy mechanisms to detect and stop<br />

data exfiltration.<br />

Zero trust is all about enhancing your security posture. <strong>The</strong> balancing act of security and accessibility is<br />

possible through plat<strong>for</strong>ms that can operate independently from compute and storage layers which offer<br />

integrated security and governance based on metadata. <strong>The</strong> ideal zero trust approach will contain a data<br />

security plat<strong>for</strong>m capable of contextualizing across analytics and cloud environments while simplifying<br />

data delivery and access with a unified multi-tenant model.<br />

Ultimately, the approach of utilizing a secure plat<strong>for</strong>m to assist with zero trust will result in reduced<br />

cybersecurity risk and operational costs, all while allowing faster deployment of governed and secured<br />

data lakes <strong>for</strong> broader responsibly safeguarded data access.<br />

Role of Data in the Zero Trust Journey<br />

With data as one of the five main pillars of the ZTMM, it is critical that DOD moves to optimal maturity to<br />

properly secure our nation’s data and privacy. <strong>The</strong> DOD has already shared various plans and guidelines<br />

that focus heavily on data protection and management, so movement to an optimal zero trust position<br />

greatly aligns.<br />

<strong>The</strong>re<strong>for</strong>e, implementing the ZTMM will eliminate unauthorized access by bad actors and safeguard data<br />

from non-trusted sources. This is essential as data continues to play a key role in the federal<br />

government’s mission-critical operations. <strong>The</strong> optimal maturity of zero trust will better position defense<br />

agencies to protect their essential data, ranging from citizen services to military intelligence; all<br />

government data will be protected and safeguarded.<br />

Proper Governance Supports the Trek to Optimal<br />

Governance is a need as CISA also stated that agencies should carefully craft and review data<br />

governance policies to ensure all data lifecycle security aspects are appropriately en<strong>for</strong>ced across the<br />

enterprise. When you have proper governance with zero trust, it frees up the data so you can share it<br />

effectively within the organization. <strong>The</strong> data is protected and highly accessible by the team members who<br />

need it most.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2023</strong> <strong>Edition</strong> 33<br />

Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!