TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

The new White House memo on zero trust is a strong signal

205 pointsby CKMoabout 3 years ago

14 comments

tptacekabout 3 years ago
This memo is driving me nuts. It&#x27;s not that the memo is bad; it&#x27;s very competent, and while there are things in it I disagree with, it&#x27;s far better than anything else the USG has published, and its authors should be happy.<p>No, my problem is that every goddam security product company in the world is treating it like the white paper for their product, and so, if you pay attention to security stuff, you&#x27;re besieged with takes about how this memo is going to change everything, hmmm, just coincidentally, in such a way that makes our product vital to the continued working of every company connected to the Internet.<p>God help us if the federal government ever publishes a memo about geographically distributing app workloads. You thought I was a nightmare now.<p>&quot;[M]any overlook device identity but it’s one of the most important context sources&quot;. Yeesh.
评论 #30531477 未加载
评论 #30531750 未加载
评论 #30531592 未加载
评论 #30533449 未加载
评论 #30531533 未加载
评论 #30531400 未加载
WalterBrightabout 3 years ago
&quot;The foundational tenet of the Zero Trust Model is that no actor, system, network, or service operating outside or within the security perimeter is trusted&quot;<p>It&#x27;s about time. That&#x27;s how airliners are designed. The guiding principle is &quot;no single failure will bring the airplane down.&quot;<p>What it is <i>not</i> is &quot;guarantee critical components will not fail&quot;.<p>The airline design principle is applicable to all kinds of things, like electrical grid design, security design, nuclear plant design, oil drilling platform design, ship design, and on and on. But I see it rarely applied, which is frustrating.
评论 #30533224 未加载
评论 #30532849 未加载
评论 #30532248 未加载
评论 #30532290 未加载
评论 #30535617 未加载
评论 #30553342 未加载
评论 #30532221 未加载
opportuneabout 3 years ago
This has restored my faith in the government wrt technology. I am sure there are some very passionate and smart people behind this initiative who are motivated by doing things right rather than intellectual laziness.<p>I’m convinced that the “defense in depth” and “security permitter” models were pretty much entirely driven by laziness (define a perimeter and call it a day) and pork (defense in depth= we can pay for tons of different disjoint security software&#x2F;vendors&#x2F;contracting because it adds depth). Zero trust actually requires you to do the right thing and do it everywhere, and hopefully reduces the amount of waste thrown at vendors. It will create a lot of integration work but will hopefully consolidate the actual security software used.
评论 #30537056 未加载
treatmentteamabout 3 years ago
I like that they&#x27;re setting such a high bar, despite the potential difficulties of achieving that broadly. One question I have: I&#x27;ve yet to encounter an entity (including login.gov) that allows FIDO2&#x2F;WebAuthn without also requiring a HOTP&#x2F;TOTP or other 2nd-factor. So what&#x27;s the point of allowing the security key option if an attacker has the option to attack the authentication code (which is often sent via SMS)?
评论 #30531459 未加载
评论 #30535818 未加载
评论 #30531669 未加载
评论 #30532353 未加载
评论 #30532769 未加载
noasaserviceabout 3 years ago
I&#x27;ll believe it when I see it.<p>I&#x27;m still waiting for feds to implement the guidance from <a href="https:&#x2F;&#x2F;pages.nist.gov&#x2F;800-63-3&#x2F;sp800-63-3.html" rel="nofollow">https:&#x2F;&#x2F;pages.nist.gov&#x2F;800-63-3&#x2F;sp800-63-3.html</a> from 2017 and 2020 about NOT rotating passwords arbitrarily, and NOT requiring undue amount of special symbols.<p>Even when I&#x27;ve asked IT, I get crickets and more bullshit password rotation.
评论 #30532739 未加载
tomohawkabout 3 years ago
I just have to shake my head at this stuff.<p>They still haven&#x27;t fixed <i>this</i> after decades of effort:<p><a href="https:&#x2F;&#x2F;www.washingtonpost.com&#x2F;sf&#x2F;national&#x2F;2014&#x2F;03&#x2F;22&#x2F;sinkhole-of-bureaucracy&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.washingtonpost.com&#x2F;sf&#x2F;national&#x2F;2014&#x2F;03&#x2F;22&#x2F;sinkho...</a><p>It would be great if they could do something to prevent things like the OPM data breach, but check out this questioning of the principles involved in that debacle:<p><a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=AK-zEGjxuAA" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=AK-zEGjxuAA</a><p>Does this give anyone any hope that there is competence to deal with this?<p>I know someone is going to say, &quot;but we have to start somewhere&quot;. Sure. But, keep in mind there doesn&#x27;t appear to be any pilot program where they&#x27;ve proven they can do this in even a single place. And now they&#x27;re creating a blanket executive order to <i>do something</i> across the whole federal government?
visvivaabout 3 years ago
Previous HN discussion on this memo: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=30101411" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=30101411</a>
评论 #30531711 未加载
oxplotabout 3 years ago
Ah, I thought the name was familiar. They have a good zero trust reverse proxy that I deployed on k8s a few years back.<p><a href="https:&#x2F;&#x2F;www.pomerium.com&#x2F;guides&#x2F;kubernetes.html" rel="nofollow">https:&#x2F;&#x2F;www.pomerium.com&#x2F;guides&#x2F;kubernetes.html</a>
MadVikingGodabout 3 years ago
Does this mean that the decades of training on &quot;Defense in Depth&quot; is going to have to be rewritten and all the certs reacquired?
评论 #30533283 未加载
righttoolforjobabout 3 years ago
They&#x27;re also (intentionally?) misrepresenting the memo.<p>&gt; MFA should be integrated at the application layer, such as through an enterprise identity service as described above, rather than through network authentication (e.g., a virtual private network).<p>They comment with:<p>&gt; While it’s no surprise seeing multi-factor authentication being a requirement, what stands out is that doing so at the network level is explicitly disallowed. Meaning all VPNs and tunnels – nextGen or not – do not meet the standard.<p>Which of course is completely untrue. You still want VPNs to connect sites or even client&#x2F;network and any security expert worth their salt will surely recommend you to have layered security. Opening up your internal network to the internet and rely on every app to do security correctly is a ridiculously bad strategy.<p>I don&#x27;t know or care who pomerium is or what they sell, but this sort of anti-advice severely diminishes their trustworthiness.
评论 #30532553 未加载
评论 #30532457 未加载
killjoywashereabout 3 years ago
This should be voted back to the top, because it&#x27;s hugely important and everyone should have eyes on the bad actors inside government called authorizing officials who are going to abuse the shit out of this by attacking their users. Fuck Citrix, fuck Menlo Security, fuck F5. Fuck these motherfuckers.
aborsyabout 3 years ago
VPNs are one of those items misunderstood (perhaps even by authors) in this memo.<p>People claim they are deprecated. I don’t think VPNs, proxies and bastions will be deprecated. I don’t think we will access so many random applications directly over internet without segmentation.
actuatorabout 3 years ago
Is it inspired by Google&#x27;s zero trust model, Beyond Corp?
cettabout 3 years ago
Any bets on how many years before PCI DSS catches up?