Войти

The Pentagon is implementing a "zero trust" strategy to protect its servers from cyber attacks

1221
0
0

Image source: topwar.ru

The new anti-hacker strategy of the US Department of Defense is called "zero trust". Its essence lies in the fact that the network is already considered to be subject to cyberattack, and any user or account owner who performs actions in it is a potential threat.

With zero trust, we assume that the network has already been compromised, and with the help of repeated user authentication and authentic authorization, we will do everything possible to prevent the attacker from moving around the network, as well as quickly identify him and reduce the damage and vulnerability that he could use.

- Randy Reznik told reporters before the release of the new network security strategy.

Many skeptics claim that this strategy is five or more years late, and although they may be right, its main idea is that the Ministry of Defense has changed its attitude to cybersecurity very much, and in the near future they want to make it a reference for other units. The developers of the ideas of the "zero trust" strategy solve security problems architecturally, striving for a lasting and measurable effect.

The 29-page strategy paints a very disturbing picture for the information segment of the US Department of Defense, which is subject to large-scale and constant attacks by known and unknown attackers. It names both individual individuals and opponents sponsored by states, especially, according to the States themselves, by China. At the same time, it is said that allegedly the Chinese very often violate the "tranquility of the network space" of the Pentagon.

The strategy of protection against cyber attacks is divided into types of zero-trust targets. The first stage receives the prefix "target" zero trust. It represents the required minimum set of actions that the Ministry of Defense and its units must perform by fiscal year 2027.

More global requirements are included in the "extended" zero trust, which should provide the highest level of protection. In total, 152 necessary "actions" are defined in the strategy. 91 items must be completed to achieve the target zero level of trust and another 61 actions, according to the American authors, will make the IT system of the US Department of Defense fully protected.

Although the strategy does not indicate specific technologies or solutions, it is a list of requirements and algorithms that the US Department of Defense should implement to achieve targeted and advanced security levels.

The rights to this material belong to
The material is placed by the copyright holder in the public domain
  • The news mentions
Страны
Проекты
Do you want to leave a comment? Register and/or Log in
ПОДПИСКА НА НОВОСТИ
Ежедневная рассылка новостей ВПК на электронный почтовый ящик
  • Discussion
    Update
  • 25.09 00:27
  • 4950
Without carrot and stick. Russia has deprived America of its usual levers of influence
  • 24.09 22:33
  • 2
Глава "Хезболлы" после взрывов в Ливане заявил, что Израиль пересек все "красные линии"
  • 24.09 18:00
  • 0
Ответ на "Как отбить у НАТО желание заблокировать Петербург и Калининград"
  • 24.09 16:20
  • 0
Что нужно знать о правдивости заявлений литовских властей
  • 24.09 11:40
  • 1
ВМС Индии намерены обзавестись вторым авианосцем собственной постройки
  • 24.09 11:30
  • 1
How to discourage NATO from blocking St. Petersburg and Kaliningrad
  • 24.09 09:28
  • 1
Названы особенности российского комплекса «Рубеж-МЭ»
  • 24.09 03:54
  • 1
The Russian Su-35 fighter is no joke (The National Interest, USA)
  • 24.09 03:36
  • 0
Ответ на "Противники мнимые и реальные"
  • 24.09 03:27
  • 1
Air Defense: Thoughts out loud (part 2)
  • 24.09 01:36
  • 1
О поражении (в смысле - выводе из строя) танков
  • 23.09 23:16
  • 2
Industrial design: harmony of beauty and functionality
  • 23.09 22:19
  • 0
Ответ на "«Снаряд прошил весь танк и вышел через корму»"
  • 23.09 18:59
  • 2
О "западной" танковой школе.
  • 23.09 16:28
  • 0
О чём умолчал Зеленский, или фантазии одного «известного политолога»