Current and future cyber threats and attacks drive the need for a Zero Trust approach that goes beyond the traditional perimeter defense approach. The Department of Defense intends to implement distinct Zero Trust capabilities and activities across the Joint Force and the defense ecosystem to protect information systems from increasingly sophisticated attacks as adversaries seek to affect warfighters and DoD mission success. Zero Trust principles are now integrated into each of the five cybersecurity functions representing key elements of a successful and holistic cybersecurity program – Identify, Protect, Detect, Respond, and Recover.
The post Beyond the Perimeter? The DoD Zero Trust Strategy and Roadmap appeared first on ComplexDiscovery.