Content Assessment: Embracing Trust? NSA Shares Guidance on Zero Trust Security Model
Information - 95%
Insight - 95%
Relevance - 90%
Objectivity - 95%
Authority - 100%
A short percentage-based assessment of the qualitative benefit of the post highlighting the recently published information paper from the NSA on the Zero Trust security model.
Editor’s Note: As highlighted in recently published guidance from the NSA, embracing a Zero Trust security model, and re-engineering an existing information system based on this security model, is a strategic effort that will take time to achieve full benefits. It is not a tactical mitigation response to new adversary tools, tactics, and techniques. However, several recent, highly publicized system breaches have exposed widespread vulnerabilities in systems, as well as deficiencies in system management and defensive network operations. These incidents show that purely tactical responses are often insufficient. The guidance asserts that a mature Zero Trust environment will afford cybersecurity defenders more opportunities to detect novel threat actors, and more response options that can be quickly deployed to address sophisticated threats. Given the increasingly sophisticated threats in today’s connected world, the NSA guidance may be beneficial for legal, business, and information technology professionals operating in the eDiscovery ecosystem as they consider cybersecurity threats and responses.
NSA Issues Guidance on Zero Trust Security Model
FORT MEADE, Md., Feb. 25, 2021 — The National Security Agency published a cybersecurity product, “Embracing a Zero Trust Security Model,” on Thursday. This product shows how deploying Zero Trust security principles can better position cybersecurity professionals to secure enterprise networks and sensitive data. To provide NSA’s customers with a foundational understanding of Zero Trust, this product discusses its benefits along with potential challenges, and makes recommendations for implementing Zero Trust within their networks.
The Zero Trust model eliminates trust in any one element, node, or service by assuming that a breach is inevitable or has already occurred. The data-centric security model constantly limits access while also looking for anomalous or malicious activity.
Adopting the Zero Trust mindset and leveraging Zero Trust principles will enable systems administrators to control how users, processes, and devices engage with data. These principles can prevent the abuse of compromised user credentials, remote exploitation, or insider threats, and even mitigate effects of supply chain malicious activity.
NSA strongly recommends that a Zero Trust security model be considered for all critical networks within National Security Systems, the Department of Defense’s critical networks, and Defense Industrial Base critical networks and systems. NSA notes that Zero Trust principles should be implemented in most aspects of a network and its operations ecosystems to become fully effective. To address potential challenges of implementing Zero Trust solutions, NSA is developing and will release additional guidance in the coming months.
NSA seeks to regularly release unique, actionable, and timely cybersecurity guidance to strengthen the cybersecurity of the nation and its allies at scale. For more information or other cybersecurity products, visit NSA.gov/cybersecurity-guidance.
NSA – Embracing a Zero Trust Security Model – 022521
* Taken directly from and used with permission of the National Security Agency (NSA).
- An EDPB Update: Guidelines on Examples Regarding Data Breach Notification
- A New Model for Cybersecurity? NIST Details Framework for Zero Trust Architecture