DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Last call! Secure your stack and shape the future! Help dev teams across the globe navigate their software supply chain security challenges.

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

Releasing software shouldn't be stressful or risky. Learn how to leverage progressive delivery techniques to ensure safer deployments.

Avoid machine learning mistakes and boost model performance! Discover key ML patterns, anti-patterns, data strategies, and more.

Related

  • Zero Trust Architecture: Revolutionizing Network Security in the Digital Age
  • Zero-Trust Infinite Security: Masking's Powerful New Ally
  • Implementing Zero-Trust Security in Kubernetes
  • Achieving Security and Trust in a Data Fabric: The Role of Zero Trust Architecture

Trending

  • Simplify Authorization in Ruby on Rails With the Power of Pundit Gem
  • Revolutionizing Financial Monitoring: Building a Team Dashboard With OpenObserve
  • Chaos Engineering for Microservices
  • The Modern Data Stack Is Overrated — Here’s What Works
  1. DZone
  2. Software Design and Architecture
  3. Security
  4. How Federal Agencies Are Achieving Zero Trust With Automation

How Federal Agencies Are Achieving Zero Trust With Automation

As cyberattacks grow in severity and sophistication, agencies are using AI and automation to meet zero-trust mandates and safeguard national infrastructure.

By 
Brandon Maxwell user avatar
Brandon Maxwell
·
Oct. 23, 24 · Analysis
Likes (1)
Comment
Save
Tweet
Share
3.6K Views

Join the DZone community and get the full member experience.

Join For Free

“Never trust, always verify.” This key principle has been ingrained into the cybersecurity lexicon since Forrester first popularized the concept of zero trust in 2009. Since then, zero trust has emerged as one of the most important frameworks in modern cybersecurity programs.

For government agencies, the shift to zero trust is both crucial and inevitable. Tasked with protecting vital national infrastructure and driving scientific innovation, agencies are increasingly waking up to the fact that traditional security practices no longer cut it in today’s escalating, and increasingly complex, threat landscape.

About Zero Trust and Automation

The push towards zero trust has gained considerable momentum in recent years, spurred by President Biden’s 2021 executive order aimed at bolstering the U.S.’s cybersecurity capabilities. The directive, further underscored by the Biden administration's 2023 National Cybersecurity Strategy and the Department of Defense's 2027 zero-trust goal, sets a clear mandate for moving beyond traditional cybersecurity practices.

Automation plays a key role in reaching zero-trust targets. A memo to agency heads in 2022 (or M-22-09, to give its official name) stressed the importance of moving beyond perimeter-based defenses to a zero-trust architecture that required continuous verification of users and devices. Crucially, it highlighted the need for tools capable of automating this continuous monitoring and streamlining complex processes without the need for constant human oversight.

The federally-funded Oak Ridge National Laboratory (ORNL) was among those that heeded the call. To meet the government’s zero-trust mandate, the research institute set out to optimize its security team — comprised of veterans, active duty personnel, reservists, and civilian security experts — through automation. 

Oak Ridge has over 6,000 employees worldwide and highly sensitive initiatives within its remit, making security foundational to its operations. By employing no-code tools, ORNL was able to increase the number of team members who could manage automation and reduce the mean time to resolution for security incidents — an especially important requirement, given that active-duty and reserve personnel were often deployed for months at a time. 

Automation also eliminated the need for specialist scripting knowledge to maintain ORNL’s complex tech stack, which had historically created bottlenecks. By linking together its disparate internal and external systems and enabling them to “talk” to each other, Oak Ridge was able to automate routine tasks and break ground on projects that were years in the making — all while transforming the organization’s evaluation and reporting capabilities.

Oak Ridge offers a prime example of how automation can help federal agencies transform their security posture while upholding the integrity of sensitive information. The importance of taking such steps was illustrated in a leak of classified national defense information on Discord in April 2023, which subsequently saw a 21-year-old U.S. Air National Guardsman indicted by a federal grand jury.

John Sherman, the Pentagon’s Chief Information Officer, commented that, had the U.S. Defense Department fully implemented a zero-trust strategy, it “sure as heck would’ve made it a lot more likely that we would’ve caught this and been able to prevent it.” 

As a former Intelligence Officer in the U.S. Air Force, I can speak to the huge potential of leveraging automated workflows when pursuing zero-trust goals. 

Directives like M-22-09, and guidance like CISA’s Zero Trust Maturity Model (ZTMM), underscore automation's indispensable role in achieving zero trust. Indeed, implementing zero trust with automation isn’t just a sound strategic movie: it’s essential. 

The dynamic nature of today’s threat landscape calls for a security stance that is both scalable and adaptable — something that automation delivers. Without the efficiency and rapid response capabilities of automation, organizations are more susceptible to breaches and will struggle to apply consistent security policies across all users and devices. This leaves them dangerously exposed. 

Challenges and Considerations of Implementing Zero Trust

As with any major architectural (and cultural) shift, moving to zero trust brings its own challenges. Even before reaching the implementation stage, understanding the broad and complex requirements of zero trust — which is not a single technology, but a comprehensive set of security practices — presents a major hurdle. The sprawling and often confusing market for zero-trust technologies also makes it difficult to find suitable tools that work together to provide comprehensive control and visibility. 

Likewise, integrating the technologies listed in CISA’s ZTMM requires a highly coordinated approach, something that’s especially challenging in organizations with limited resources and a siloed tech stack. As we see all too often in cybersecurity, zero-trust directives often come with little or no additional funding, meaning careful planning and prioritization are needed to ensure even marginal progress. There’s also a need to update legacy systems and align existing security procedures with zero-trust principles — often a huge undertaking in itself. 

As federal agencies design their zero-trust architectures, a few considerations should be front of mind. Perhaps most importantly, automation and security solutions should be scalable, compatible with existing infrastructure, and have the capacity to adapt to new threats. It’s also important to remember that zero trust isn’t just a technological shift: it also requires a shift in organizational culture that puts security, and the continuous assessment of security procedures, front-and-center.

Final Thoughts

The directive for zero trust is clear. As cyberattacks grow in severity and sophistication, it’s never been more important to safeguard national infrastructure and protect crucial scientific research. Federal agencies are at a critical junction in the journey towards zero trust. Automation can help them get there faster — and with fewer resources.

security zero trust

Published at DZone with permission of Brandon Maxwell. See the original article here.

Opinions expressed by DZone contributors are their own.

Related

  • Zero Trust Architecture: Revolutionizing Network Security in the Digital Age
  • Zero-Trust Infinite Security: Masking's Powerful New Ally
  • Implementing Zero-Trust Security in Kubernetes
  • Achieving Security and Trust in a Data Fabric: The Role of Zero Trust Architecture

Partner Resources

×

Comments
Oops! Something Went Wrong

The likes didn't load as expected. Please refresh the page and try again.

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends:

Likes
There are no likes...yet! 👀
Be the first to like this post!
It looks like you're not logged in.
Sign in to see who liked this post!