Legacy tech could undermine 'zero trust' push

ArtemisDiana/Getty Images

 

Connecting state and local government leaders

As agencies move toward more secure infrastructures, managing legacy systems that are unprepared for today’s cybersecurity challenges could slow their progress.

State and local governments may be determined to implement so-called zero trust cybersecurity strategies, but legacy technology and infrastructure could present a major obstacle.

Zero trust is a security framework based on the principle of never trust, always verify. It is designed to protect users, applications, infrastructure and data, whether systems reside in an agency data center, in the cloud or in a hybrid environment. 

Many government agencies still use legacy systems to manage complex, critical business functions like benefits programs, and mission-critical business functions and processes. But because these systems were developed before cybersecurity was a major concern, they lack features that can make them more secure. 

It all adds up to a big headache for state and local governments that must balance their need to defend themselves against evolving threats with managing legacy assets that cannot easily be upgraded or migrated to the cloud.

One way agencies try to protect their legacy systems against modern threats is by adding features to address specific vulnerabilities, but that approach has drawbacks. 

“Government is always good at fighting the last war,” said Matt Keller, vice president of federal services at cybersecurity company GuidePoint Security. “We always go in and look at what has happened in the past, and then build requirements to fight that last war.”

The biggest challenges state governments face when it comes to securing legacy technology is a lack of documentation about how any of the infrastructure works or how the applications can be tweaked. Chris Montgomery, a government and cybersecurity industry strategist at cloud computing company VMware, said it can be a “daunting task” to figure out how code has been embedded.

“You pull the wrong thread,” and everything could crumble, he said. “The coding is not nimble, there's embedded code, and often we've seen passwords put into code.” 

Upgrading from legacy technology to a zero-trust future is also affected by procurement policies. Keller said that staying on a legacy system can become “a contractual issue more than anything.” Those contracts are often long, and vendors are unable to “morph or change their product as quickly to migrate to those zero trust initiatives.”

Separate from legacy technology but also part of the challenge of modernization is the need to ensure IT employees have the right skills to implement a zero trust strategy. Additionally, government often loses skilled staff to the private sector, which can lead to stagnation, Keller said. Montgomery said that agency employees’ “fear of change” may prevent new, innovative solutions from being implemented. 

“Some of these [government] places have gotten so mundane and so cumbersome, compared to some of the technology firms,” Keller said. Agencies saddled with legacy systems are “missing out on a lot of the pushing on the culture and migrating to the next best thing and next capability.”

Political considerations may also weigh on agencies looking to modernize legacy technology. Some state IT leaders are political appointees, and Montgomery said that modifying critical systems, even for upgrades, can seem like a “high-risk decision.”

“You can get beat up for not modernizing, but you can certainly lose your job over unexpected downtime or extended downtime,” he said.

The best place to start when aligning a legacy technology upgrade with zero trust goals is with a risk assessment, Montgomery said. That way, governments can establish what applications and infrastructure they have and how to isolate systems to ensure they can be safely upgraded while not affecting other business processes.

But, he warned, that evaluation must lead to actions and deliverables, otherwise assessment may never end.

“Sometimes folks get overly caught up in the analysis and don't actually break ground,” Montgomery said. “You have to carve out your proof of concept or your sequence in terms of your implementation plan into manageable bite-sized pieces.”

Sean Frazier, federal chief security officer at Okta, said any such risk assessment must consider how quickly technology has evolved, and will continue to.

“It doesn't matter whether you're a government agency, or whether your company has been around for 14 years, or whether you're a brand spanking new company,” he said. “You’ve got legacy on day two.”

And if they want to ensure their employees are on board, governments must have a positive vision for how they will upgrade legacy systems and implement zero trust, Montgomery said.

“Organizations really can make or break themselves on attacking this with the right mindset,” he said. Agency leaders must position changes “as a path forward, not necessarily punitive. [For] any of the folks who were around with the original system, it's got to be seen as a collaborative, positive effort,” Montgomery added.

Governments looking to make the transition away from legacy technology and implement zero trust need not pursue a “big bang approach,” Montgomery said, urging leaders to be systematic in their approach, rather than try to do everything all at once. Frazier echoed that view. “It's the old adage of, how do you eat an elephant? One bite at a time,” he said.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.