|
Content Assessment: Beyond the Perimeter? The DoD Zero Trust Strategy and Roadmap
Information - 93%
Insight - 94%
Relevance - 90%
Objectivity - 88%
Authority - 93%
92%
Excellent
A short percentage-based assessment of the qualitative benefit of the recently published U.S. Department of Defense Zero Trust Strategy and Roadmap.
Editor’s Note: From time to time, ComplexDiscovery highlights publicly available or privately purchasable announcements, content updates, and research from cyber, data, and legal discovery providers, research organizations, and ComplexDiscovery community members. While ComplexDiscovery regularly highlights this information, it does not assume any responsibility for content assertions.
To submit recommendations for consideration and inclusion in ComplexDiscovery’s cyber, data, and legal discovery-centric service, product, or research announcements, contact us today.
Press Announcement (November 23, 2022)
Department of Defense Releases Zero Trust Strategy and Roadmap
U.S. Department of Defense
Today, the Department of Defense released the Department of Defense Zero Trust Strategy and Roadmap.
Current and future cyber threats and attacks drive the need for a Zero Trust approach that goes beyond the traditional perimeter defense approach. The Department intends to implement distinct Zero Trust capabilities and activities as outlined in the strategy and associated Roadmap by FY27.
The strategy envisions a DoD Information Enterprise secured by a fully implemented, Department-wide Zero Trust cybersecurity framework that will reduce the attack surface, enable risk management and effective data-sharing in partnership environments, and quickly contain and remediate adversary activities.
The strategy outlines four high-level and integrated strategic goals that define what the Department will do to achieve its vision for ZT.
• Zero Trust Cultural Adoption – All DoD personnel are aware, understand, are trained, and committed to a Zero Trust mindset and culture and support integration of ZT.
• DoD information Systems Secured and Defended – Cybersecurity practices incorporate and operationalize Zero Trust in new and legacy systems.
• Technology Acceleration – Technologies deploy at a pace equal to or exceeding industry advancements.
• Zero Trust Enablement – Department- and Component-level processes, policies, and funding are synchronized with Zero Trust principles and approaches.
Implementing Zero Trust will be a continuous process in the face of evolving adversary threats and new technologies. Additional Zero Trust enhancements will be incorporated in subsequent years as technology changes and our Nation’s adversaries evolve.
The Department of Defense Zero Trust Strategy and Roadmap can be found at the DoD CIO library.
Read the original announcement.
Complete Report: DoD Zero Trust Strategy (PDF) – Mouseover to Scroll
DoD-ZTStrategyAdditional Reading
- Defining Cyber Discovery? A Definition and Framework
- Cybersecurity Challenges for Artificial Intelligence: Considering the AI Lifecycle
Source: ComplexDiscovery