Zero Trust Architecture – Modernizing Federal Security from the Endpoint to the Application – CROWDSTRIKE White papper

Both defense and civilian government agencies face an unprecedented challenge in securing data, as the COVID-19 pandemic created a rapid surge in remote working and connections with non-enterprise devices.
Agencies already in the midst of modernization and cloud migration efforts, increasingly sophisticated cyberattacks, and complex systems and work environments must now figure out how to manage these challenges on an accelerated schedule and while staying within their budgets

According to the Gartner Market Guide for Zero Trust Network Access (ZTNA), “Users and
applications are already in the cloud. Hence, secure access capabilities must evolve to cloud
delivery, too … ZTNA provides adaptive, identity-aware, precision access. Removing network
location as a position of advantage eliminates excessive implicit trust, replacing it with explicit
identity-based trust.”
The National Institute of Standards and Technology (NIST) offers the following operational
definition of Zero Trust: Zero Trust (ZT) provides a collection of concepts and ideas designed to reduce
the uncertainty in enforcing accurate, per-request access decisions in information systems and services in the face of a network viewed as compromised. Zero trust architecture (ZTA) is an enterprise’s cybersecurity plan that utilizes zero trust concepts and encompasses component relationships, workflow planning, and access policies. Therefore, a zero trust enterprise is the network infrastructure (physical and
virtual) and operational policies that are in place for an enterprise as a product of a zero trust architecture plan.
In November 2019, FedScoop conducted research into the government’s shift to identitycentered access and perceptions of Zero Trust strategies. The research showed that many agencies believe Zero Trust strategies are a high priority.

Leave a Reply

Your email address will not be published.