Implementing Comply-To-Connect Is Critical To DoD’s Drive To Zero Trust Cybersecurity (From 1945)
The size and complexity of both private and public networks – and the number of devices on them – are growing at a rapid pace. It is apparent to all that the old way of providing security for Department of Defense (DoD) networks, by creating an ostensibly penetration-proof barrier, will not work. As recent major cybersecurity breaches have demonstrated, all systems are vulnerable to penetration. DoD recognizes that it must pursue with all possible speed a strategy based on zero trust (ZT). ZT cybersecurity assumes that unauthorized users will be on a network. The key to countering this threat is putting in place the policies and supporting cybersecurity systems that continually monitor networks to identify unauthorized users and isolate them. DoD has announced a strategy for the rapid implementation of ZT on all its networks. To that end, it needs to make broader use of existing techniques and technologies such as those provided under the current Comply-to-Connect (C2C) program. I have written more about C2C here.
Find Archived Articles: