31.07.2023 Views

The Cyber Defense eMagazine August Edition for 2023

Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Adhering to the guiding principles of a zero trust architecture requires a multifaceted approach.<br />

First, verification using multi-factor authentication everywhere provides a normalized SSO token <strong>for</strong> the<br />

representation of the authenticated user. Using least privileged access will allow agencies to<br />

incrementally grant access on an as-needed basis.<br />

Next, in order to minimize the blast radius of a breach through segmented data access, the ideal support<br />

plat<strong>for</strong>m will be given access to the appropriate zone key to decrypt the underlying data. This combined<br />

with complete auditing through long-term retention of data and robust machine learning, will provide a<br />

powerful tool <strong>for</strong> threat hunting, investigation, and remediation.<br />

Lastly, governance, compliance, and data cataloging – allows teams to better understand and protect<br />

your data efficiently. <strong>The</strong>se approaches provide a high transparency level to each task that allows<br />

decision-makers and those tackling key missions to see specifically what is going on throughout the<br />

process. When followed effectively, teams are able to smoothly move along the zero trust journey to<br />

optimal.<br />

Achieving the required deadline demands respecting the role of data in the zero trust journey,<br />

understanding how agencies can best protect their data, and how proper governance supports the trek<br />

to optimal maturity. As a constant and evolving mission, the nation is working to protect our country from<br />

cyber adversaries and secure its intelligence, including DOD missions.<br />

This comes with the help of plat<strong>for</strong>ms that are prepared to fulfill a balance of security from bad actors and<br />

access to the right members of the DOD, all while maintaining zero trust and abiding by the CISA<br />

guidelines. A plat<strong>for</strong>m that operates independently from compute and storage layers will offer integrated<br />

security and governance based on metadata, while a simplified data delivery and access model will<br />

reduce risks and costs while enabling faster deployment. Implementing an effective zero trust approach<br />

and reaching the optimal maturity level will better secure the nation’s cyber and technological landscape,<br />

and understanding the role of data and governance within the process can lead to greater mission<br />

success.<br />

About the Author<br />

Carolyn Duby is the current Field CTO and <strong>Cyber</strong>security Lead at Cloudera<br />

Government Solutions. With nearly three decades of experience, Carolyn<br />

spearheads the digital trans<strong>for</strong>mation ef<strong>for</strong>ts <strong>for</strong> Cloudera’s customers and<br />

delivers high-per<strong>for</strong>mance, data-intensive applications in a variety of<br />

industries. She can be reached online at our company website<br />

https://www.cloudera.com/solutions/public-sector.html<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2023</strong> <strong>Edition</strong> 34<br />

Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!