TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Zero Trust Strategy and Roadmap

205 pointsby CKMoover 2 years ago

10 comments

dhxover 2 years ago
For the following techniques:<p>1.6 Behavioral, Contextual ID and Biometrics &amp; 7.4 User and Entity Behavior Analytics - focus monitoring&#x2F;auditing on accounts that all of a sudden transfer 10GB data when they usually only transfer only 100MB&#x2F;day, or where the employee has had to be asked for that one time of the year to login on a weekend at an office they don&#x27;t usually visit.<p>5.1 Data Flow Mapping - detect unexpected egress of data by defining ahead of time the volumes of data being transferred between systems (e.g. 2AM backup transfers 100GB to systemX and between 9AM-5PM there is a usual data transfer rate of 1MB&#x2F;s therefore 100MB&#x2F;s transfer rate at 1PM would raise an alert).<p>How well do these techniques work in practice, particularly in a huge organisation? I would have thought the number of false positives would be very high and the people monitoring the anomalous behaviour wouldn&#x27;t have much or any context to know whether something is legitimate or not.<p>A more feasible approach may be system owners installing a new system would have to specify rate limits (including per time of day, per API call and&#x2F;or per user) and would have to lodge as part of a change request whether these limits need to be temporarily increased to cater for a one-off or rare event such as a major system upgrade. But given that some of the other techniques listed indicate a lack of awareness of what software is installed and is in use, it seems unlikely that specification of rate limits would happen any time soon.
评论 #33714644 未加载
评论 #33715263 未加载
评论 #33714911 未加载
评论 #33714671 未加载
评论 #33717407 未加载
asynchronousover 2 years ago
<i>“The Department’s most consequential strategic competitor and the pacing challenge for the Department, the People’s Republic of China,3 as well as other state-sponsored adversaries and individual malicious actors often breach the Department’s defensive perimeter and roam freely within our information systems.”</i><p>This statement from the actual PDF really is telling for how far the DoD has dropped the ball on protection- maybe spend less time fleshing out offensive capabilities and more time on defense of your citizens?
评论 #33714825 未加载
评论 #33714297 未加载
评论 #33714507 未加载
评论 #33717792 未加载
评论 #33714742 未加载
degenerateover 2 years ago
The actual roadmap document (PDF) is not linked directly from the press release:<p><a href="https:&#x2F;&#x2F;dodcio.defense.gov&#x2F;Portals&#x2F;0&#x2F;Documents&#x2F;Library&#x2F;DoD-ZTExecutionRoadmap.pdf" rel="nofollow">https:&#x2F;&#x2F;dodcio.defense.gov&#x2F;Portals&#x2F;0&#x2F;Documents&#x2F;Library&#x2F;DoD-Z...</a>
评论 #33714036 未加载
评论 #33714081 未加载
_HMCB_over 2 years ago
Didn’t know much about Zero Trust. This article was helpful: <a href="https:&#x2F;&#x2F;www.csoonline.com&#x2F;article&#x2F;3247848&#x2F;what-is-zero-trust-a-model-for-more-effective-security.html" rel="nofollow">https:&#x2F;&#x2F;www.csoonline.com&#x2F;article&#x2F;3247848&#x2F;what-is-zero-trust...</a>
评论 #33716049 未加载
teleforceover 2 years ago
NIST Zero Trust Architecture recommendation:<p><a href="https:&#x2F;&#x2F;www.nist.gov&#x2F;publications&#x2F;zero-trust-architecture" rel="nofollow">https:&#x2F;&#x2F;www.nist.gov&#x2F;publications&#x2F;zero-trust-architecture</a>
CDT-MLTover 2 years ago
What is a real joke is how you can make into the phone system at the DOD and speak to a human and they give you information without even verifying who the hell you are. Still happens all the time.
edgyquantover 2 years ago
This is the kind of decentralized systems web3 is supposed to be. Not ethereum tokens
评论 #33714408 未加载
desimoneover 2 years ago
&gt; Our adversaries are in our networks, exfiltrating our data, and exploiting the Department’s users.<p>I&#x27;m happy to see this admission lead the document; it&#x27;s bold coming from an org as conservative as the DoD. To see critical mass around the idea that -- like it or not -- adversaries (both malicious insiders and outsiders) are already on trusted networks is really encouraging to see.<p>First, let&#x27;s be clear what this document is and isn&#x27;t.<p>&gt; Importantly, this document serves only as a strategy, not a solution architecture. Zero Trust Solution Architectures can and should be designed and guided by the details found within this document.<p>This is a long term strategy doc, not an implementer&#x27;s guide. Operators looking for zero-trust easy mode won&#x27;t find it here. It&#x27;s also very DoD specific.<p>But there are some good parts. I read the doc so (maybe?) you don&#x27;t have to.<p>I made some screenshots of the portions I thought most relevant.<p><a href="https:&#x2F;&#x2F;imgur.com&#x2F;a&#x2F;Dhm7yvi" rel="nofollow">https:&#x2F;&#x2F;imgur.com&#x2F;a&#x2F;Dhm7yvi</a><p>The comments will make more sense if you are viewing those.<p>&gt; Zero Trust uses continuous multi-factor authentication, micro-segmentation, advanced encryption, endpoint security, analytics, and robust auditing, among other capabilities, to fortify data, applications, assets, and services to deliver cyber resiliency. The Department is evolving to become a more agile, more mobile, cloud-supported workforce, collaborating with the entirety of DoD enterprise, including federal and non-federal organizations and mission partners working on a variety of missions.<p>If you somehow managed to read the above without going into a post word salad coma, I&#x27;m sorry. I highlighted the section just to bring up there&#x27;s an awful lot of enterprise security buzzword and DoD acronym bingo going on. But there are some good thoughts too.<p>&gt; Zero Trust is much more than an IT solution. Zero Trust may include certain products but is not a capability or device that may be bought.<p>It&#x27;s nice to hear this being reiterated so often. A good start!<p>&gt; Zero Trust security eliminates the traditional idea of perimeters, trusted networks, ...<p>Zero trust is -- to me at least -- mostly about the idea of removing perimeters and trusted networks as the basis for trust and access control. So I&#x27;m with you so far.<p>&gt; ... devices, personas, or processes and shifts to multi-attribute-based levels of confidence that enable authentication and authorization policies founded on the concept of least privileged access concept of least privileged access<p>But it&#x27;s interesting here that the authors are also calling out and devices, personas which is what I&#x27;d argue are the fundamental contextual attributes that allow you to replace a &quot;trusted perimeter&quot;; if we aren&#x27;t using perimeters, devices, personas... what is the DoD suggesting we use? I can&#x27;t find it.<p>&gt; At its core, ZT assumes no implicit trust is granted to assets or users based solely on their physical or network location (i.e., local area networks versus the Internet) or asset ownership (enterprise or personally owned).12<p>I strongly agree with the first point, but disagree and am perplexed by the second. Zero trust is all about getting rid of a trusted network location.<p>However, asset ownership *matters* because it affects not only the identity of the user, but also the _state_ of the device. It&#x27;s totally reasonable to have different levels of trust for a managed company owned device with a known set of endpoint protection tools, vs a BYOD device whose device state is largely unknown.<p>The doc does a good job of outlining the &quot;Why&quot; of zero trust. And what&#x27;s required from an org to make it possible.<p>Unfortunately, while the document starts out strong, it quickly becomes &quot;actually, zero trust is every security thing you&#x27;ve ever heard of&quot;. Paired with a timeline no one will ever meet ever.
评论 #33717319 未加载
评论 #33716628 未加载
评论 #33719770 未加载
imwillofficialover 2 years ago
I was pushing this stuff in DoD for years. Glad to see it catch on.
评论 #33716475 未加载
headsoupover 2 years ago
Is zero trust just the same idea as agile &#x27;fixing&#x27; waterfall?<p>I.e. is it just another &#x27;practice&#x27; marketed to solve an existing people and process issue that can be readily solved with proper focus , which just introduces its own issues anyway? Like sure, zero trust will work IF you do it really well, but then so will the existing environment.