Content Assessment: Beyond the Perimeter? The DoD Zero Trust Strategy and Roadmap
Information - 93%
Insight - 94%
Relevance - 90%
Objectivity - 88%
Authority - 93%
A short percentage-based assessment of the qualitative benefit of the recently published U.S. Department of Defense Zero Trust Strategy and Roadmap.
Editor’s Note: From time to time, ComplexDiscovery highlights publicly available or privately purchasable announcements, content updates, and research from cyber, data, and legal discovery providers, research organizations, and ComplexDiscovery community members. While ComplexDiscovery regularly highlights this information, it does not assume any responsibility for content assertions.
To submit recommendations for consideration and inclusion in ComplexDiscovery’s cyber, data, and legal discovery-centric service, product, or research announcements, contact us today.
Press Announcement (November 23, 2022)
Department of Defense Releases Zero Trust Strategy and Roadmap
U.S. Department of Defense
Today, the Department of Defense released the Department of Defense Zero Trust Strategy and Roadmap.
Current and future cyber threats and attacks drive the need for a Zero Trust approach that goes beyond the traditional perimeter defense approach. The Department intends to implement distinct Zero Trust capabilities and activities as outlined in the strategy and associated Roadmap by FY27.
The strategy envisions a DoD Information Enterprise secured by a fully implemented, Department-wide Zero Trust cybersecurity framework that will reduce the attack surface, enable risk management and effective data-sharing in partnership environments, and quickly contain and remediate adversary activities.
The strategy outlines four high-level and integrated strategic goals that define what the Department will do to achieve its vision for ZT.
• Zero Trust Cultural Adoption – All DoD personnel are aware, understand, are trained, and committed to a Zero Trust mindset and culture and support integration of ZT.
• DoD information Systems Secured and Defended – Cybersecurity practices incorporate and operationalize Zero Trust in new and legacy systems.
• Technology Acceleration – Technologies deploy at a pace equal to or exceeding industry advancements.
• Zero Trust Enablement – Department- and Component-level processes, policies, and funding are synchronized with Zero Trust principles and approaches.
Implementing Zero Trust will be a continuous process in the face of evolving adversary threats and new technologies. Additional Zero Trust enhancements will be incorporated in subsequent years as technology changes and our Nation’s adversaries evolve.
The Department of Defense Zero Trust Strategy and Roadmap can be found at the DoD CIO library.
- Defining Cyber Discovery? A Definition and Framework
- Cybersecurity Challenges for Artificial Intelligence: Considering the AI Lifecycle
Have a Request?
If you have information or offering requests that you would like to ask us about, please let us know and we will make our response to you a priority.
ComplexDiscovery is an online publication that highlights cyber, data, and legal discovery insight and intelligence ranging from original research to aggregated news for use by cybersecurity, information governance, and eDiscovery professionals. The highly targeted publication seeks to increase the collective understanding of readers regarding cyber, data, and legal discovery information and issues and to provide an objective resource for considering trends, technologies, and services related to electronically stored information.
ComplexDiscovery OÜ is a technology marketing firm providing strategic planning and tactical execution expertise in support of cyber, data, and legal discovery organizations. Focused primarily on supporting the ComplexDiscovery publication, the company is registered as a private limited company in the European Union country of Estonia, one of the most digitally advanced countries in the world. The company operates virtually worldwide to deliver marketing consulting and services.