Compliance, maturity levels, edge computing
Some people think the television phrase, “Set it and forget it” applies to Zero Trust. Today’s discussion throws that notion out the window.
The interview takes a deep dive into how an agency can move to a Zero Trust Architecture. Three experts discuss compliance, maturity levels, and the role of edge computing. The conclusion is obvious: Zero Trust is a serious, constantly evolving methodology and federal leaders must take advantage of every resource possible to gain a thorough understanding of the process.
Jennifer Franks from the GAO points out that Zero Trust is not a new concept and the federal government has all kinds of reference materials to support leaders. She lists information from DISA, NIST, the DoD as well as the OMB. She reminds listeners that there is a maturity model associated with Zero Trust change -- and leaders must be aware of revisions to these documents. Jennifer reminds the audience of the recent upgrade to the DISA model that adds more maturity levels.
Guidance is nice, but where to start? During the interview, Wayne Rogers talks about looking at your respective agency’s situation and doing a gap analysis. Once that is complete, then one can set priorities. For example, when he used this process, his agency identified a weakness in their VPN system. He prototyped a transition to Secure Access Service Edge and then deployed it across the agency.
Probably the best quote from this interview was provided by Akamai’s Tony Lauro. He said, “Security has to work despite users.” He is referring to the base concept behind Zero Trust – an automated system that can identify threats and provision resources with appropriate access levels that can have nothing to do with end users acting themselves.
Ron Popeil’s catchphrase may work on television, but not in today’s federal government.
Twitter: @FedInsider
LinkedIn: https://www.linkedin.com/company/fedinsider/
Facebook: https://www.facebook.com/FedInsiderNews