Zero trust moves from vision to reality

 

Connecting state and local government leaders

More sophisticated technologies and better access to data are helping agencies pursue dynamic and context-driven security to combat the growing threats.

It wasn’t that long ago that zero trust was an aspirational goal for federal agencies. While the benefits seemed obvious, actual implementation was difficult to imagine. Now, zero trust efforts are starting to  power up. The Defense Information Systems Agency has issued the first version of its zero-trust reference architecture, and Federal Chief Information Security Officer Chris DeRusha has said the White House will push all federal agencies toward a "zero trust paradigm."

Participants

Gerald Caron III
Acting Director of Enterprise Network Management, Bureau of Information Resource Management, Department of State

Alma Cole
Chief Information Security Officer, Customs and Border Protection

Sean Connelly
Trusted Internet Connections Program Manager and Senior Cybersecurity Architect, ‎Cybersecurity and Infrastructure Security Agency

Larry Hale
Director, Strategic Solutions and Security Services, General Services Administration

Steven Hernandez
Director of Information Assurance Services and Chief Information Security Officer, Department of Education

La'Naia Jones
Deputy CIO, National Security Agency

Lisa Lorenzin
Director of Transformation Strategy, Zscaler

Allison McCall
Acting CIO, National Technical Information Service

Ranjeev Mittu
Branch Head, Information Management and Decision Architectures Branch, Information Technology Division, U.S. Naval Research Laboratory

Karim Said
Chief Information Security Officer, NASA

Drew Schnabel
Vice President, Federal, Zscaler

Steve Wallace
Systems Innovation Specialist, Emerging Technologies Directorate, Defense Information Systems Agency

Note: FCW Editor-in-Chief Troy K. Schneider and Staff Writer Justin Katz led the roundtable discussion. The April 9 gathering was underwritten by Zscaler, but both the substance of the discussion and the recap on these pages are strictly editorial products. Neither Zscaler nor any of the roundtable participants had input beyond their April 9 comments.

A group of IT leaders recently gathered to explore why this long-discussed concept is finally getting traction and the challenges still remaining. The discussion was on the record but not for individual attribution (see sidebar for the list of participants), and the quotes have been edited for length and clarity.

Here's what the group had to say.

Government's interest in zero trust originally focused on computer networking. Yet when the federal CIO Council asked ACT-IAC to explore the applicability of zero trust security in 2018, "it became apparent almost at light speed that it's bigger than the network," one official recalled. "We're talking about zero trust architectures, not just zero trust networking. Networking is a very critical subset of the discussion, but it's really about that architecture."

To illustrate that broader scope, consider the variables that can feed into a dynamic risk assessment, another official said. "I used a PIV card versus a username and password. There's a different risk to those things. Did I come in on a mobile device? Is it a managed mobile device? Am I coming from a known network?" The data being accessed can also be an important indicator and so can the individual user's overall performance or job status. "It's got to be ongoing authentication. You've got to keep checking."

One official pointed out that there are four main elements of a zero trust architecture. "The first, of course, is ICAM and identity. Next, we need to talk about data," which includes the data to be protected and the data needed to assess risk and determine trust. Third is "the control fabric or the control plane, and that's really all these technologies that we've been talking about."

Finally, the official said, "we get to the fourth piece, which ACT-IAC calls the trust engine. NIST calls it the policy engine. And it's really about where we are using tools and technologies like machine learning, artificial intelligence and even just robotic process automation" to make sense of all the data and grant or restrict access based on dynamic risk assessments.

"Zero trust is a model, and the model changes over time," another said. "SolarWinds is a good reality check. Here's a product a lot of people are using. They trusted it on their network. They didn't think it would be exploited. It was just a given, like we trust our inside employees."

Ideally, zero trust should extend throughout the supply chain, that official added, but even a limited implementation would have helped minimize the impact of the SolarWinds breach by detecting "the lateral movement and the escalation of privilege."

Whether the threat is ransomware, persistent nation-state attacks or "anything that's self-propagating," another participant said, zero trust is "incredibly effective in reducing the impact of all those types of attacks. So that makes it really, really key."

Data, data and more data

Such a holistic monitoring and automated risk management effort requires a tremendous amount of data, the group agreed.

"There are datasets that you're going to want to bring in that haven't traditionally been there," one official said. Physical access logs and data that usually lives with human resources are important. "Are we tied into the travel system? Are we tied into the performance system? Are we tied into onboarding and off-boarding? When we start to paint a picture about the risk and when understanding risk is quantified, we have to start thinking about these data sources" that don't normally feed into a security information and event management system.

"For example, someone gets a bad performance review, and then all of a sudden we start to see a lot of data traffic and a lot of file [input/output]," that official said. "Those two things together are pretty suspect. And so when we think about the zero trust architecture, we have to start broadening that concept."

"In many cases, this is new for organizations," another participant said. "There's heavy bifurcation and firewalling between those areas. To move zero trust forward into its truly optimized form, we have to be working with our chief data officers to understand what data we have in the environment that might be useful for us." Chief privacy officers are also essential to the effort, the official added.

Even with the data feeds more traditionally used for security, the old ways of operating need to be revisited. Security teams can no longer own all the tools, one official said. "For most of us, when we deploy security, by golly, that means pizza boxes in the data center. We have to take a step back and be willing to say, 'What I really need is the data. And I need it in this format and in this frequency in this place. And if you can get me that, do what you want, but I need the visibility so I can understand risk.'"

The governmentwide commitment to zero trust is real, the group agreed. It comes up in virtually every discussion by the CIO and CISO councils, participants said, and there was optimism that the recent infusion of money into the Technology Modernization Fund could be a catalyst. "Something that really drives hard has to be backed with the right resources," one executive said. "There's a big hope that the CISOs, the security folks and the CIOs are going to step up and say, 'We want to make some big shifts in cybersecurity.'"

"We've got the people who are the early adopters moving forward," another observed. The real question is: "How are we gaining the momentum for the masses?"

A longer version of this article was first posted to FCW, a sibling site to GCN.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.