Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Civilian

The Five Pillars of Zero Trust Architecture

by Kelsey Winick
April 26, 2022
in Civilian, Cybersecurity
Reading Time: 4 mins read
A A
Five Pillars
Share on FacebookShare on Twitter

The threat of cyberattacks and the need for robust security plans are critical for agencies to deliver on the mission in today’s hostile threat landscape. Federal agencies must build resilient and robust defenses, where they can operate quickly and efficiently to mitigate threats. Security frameworks, such as the five pillars of Zero Trust architecture, enable agencies to secure their IT environments from insider threats and nation-state actors. 

Following the May 2021 Federal Executive Order (EO) on Cybersecurity, Zero Trust has become the definitive strategy for federal agencies as they seek to prevent attacks and respond effectively when they do happen. In outlining clear guidance and setting deadlines for compliance, the EO has driven a great deal of change within federal agencies. But for federal agencies just getting started on their Zero Trust journey what are the most important elements? 

We checked in with industry experts from Dell to find out about the founding principles of Zero Trust. In a recent podcast they outline five pillars that agencies need to consider when building a successful Zero Trust architecture. 

Pillar 1: People (User) Trust

As with any effective cybersecurity strategy an agency’s users, or their people, are at the center. As well as continuing to build a cyber aware community through education, Zero Trust protects the user, the network, and the data by requiring the user to continuously authenticated as they move around the network. 

Pillar 2: Device Trust 

An optimal Zero Trust strategy moves agencies from a simple inventory and validation strategy to constant device authentication and access granted on the basis of real-time risk assessment analytics. 

Pillar 3: Network Trust 

When it comes to the network, Zero Trust requires a transformation from macro-segmentation to micro-segmentation in order to have a better understanding of who or what is on the network at any given time. 

Pillar 4: Application Trust

Traditionally, access to applications has been granted at the local level and is static, meaning that once authorization is granted it is in place until it is revoked. A Zero Trust approach to application access in comparison is dynamic, requiring authentication to happen at a global level and on a continuous basis. The upside to this approach is that all applications can be available via the Internet and agencies no longer require VPNs to offer secure access. 

Pillar 5: Data Trust 

One of the most significant changes for agencies when moving to a Zero Trust model centers around data accessibility. The goal here, for agencies, is to, once again, move from static to dynamic authentication and also improve their categorization and organization of data in order to support dynamic access. 

Compliance with the Executive Order on Cybersecurity has added a necessary urgency to agency plans to evolve their cybersecurity postures. With the continued intensity of cyber attacks and the on-going expansion of attack surfaces as federal agencies embrace the Digital Age, the five pillars of Zero Trust is an idea whose time has surely come. 

Five Pillars
Five Pillars
Tags: AffigentcybersecurityDellSecuritysecurity frameworkZero Trust Architecture

RELATED POSTS

Design Secure Application Software That Transforms Government Agencies
Civilian

Design Secure Application Software That Transforms Government Agencies

June 28, 2022
Contributed Articles

DMARC: A Critical Tool for State and Local Government Cybersecurity

June 21, 2022
Balancing Security and Customer Experience for Digital Government
CX Service and Delivery

Balancing Security and Customer Experience for Digital Government

June 20, 2022

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5370 shares
    Share 2148 Tweet 1343
  • For the Army to Reach Modernization Goals, a Tactical Data Fabric is Crucial

    41 shares
    Share 16 Tweet 10
  • Design Secure Application Software That Transforms Government Agencies

    12 shares
    Share 5 Tweet 3
  • 2022 Government Investigations Technology Guide Discusses Nine Factors Investigators Should Consider in Technology Solutions

    12 shares
    Share 5 Tweet 3
  • Arizona Department of Economic Security Combats Unemployment Benefits Fraud

    61 shares
    Share 24 Tweet 15

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Digital Transformation
    • Cybersecurity
    • Hybrid Work
  • Contact Us