The US military is going all-in on zero-trust

An image of security icons for a network encircling a digital blue earth.
(Image credit: Shutterstock) (Image credit: Shutterstock)

The US Department of Defense (DoD) has published an official document detailing how it plans on integrating Zero Trust Network Access (ZTNA) in all of its departments, from technology, to cybersecurity, to human resources. 

The “DoD Zero Trust Strategy” outlines how the entire DoD and all of its departments need to have the Zero Trust framework firmly in place by 2027.

“This shift in philosophy is a significant change in legacy authentication and security mechanisms,” the paper reads. “It also represents a major cultural change that stakeholders throughout the DoD ZT Ecosystem, including the Defense Industrial Base (DIB), will need to embrace and execute beginning with FY2023 through FY2027 and in the future.”

Growing attacks

Zero Trust is a relatively new concept in cybersecurity, which states that any person, device, or application, on a network, needs to be authenticated and verified. Nothing is trusted by default. 

Putting things into the wider context, the DoD said the US Government and its departments are under increasing cyberattacks, which had gotten more devastating in recent times. At the same time, the shift in how people work (namely, remote working) has only made securing the perimeter more difficult. 

“Our adversaries are in our networks, exfiltrating our data, and exploiting the Department’s users,” the paper claims. “The rapid growth of these offensive threats emphasizes the need for the Department of Defense to adapt and significantly improve our deterrence strategies and cybersecurity implementations.”

The project was kicked off by US President Joe Biden some 18 months ago, after the administration issued an executive order aimed at strengthening the government's defenses. 

Besides the DoD, this also prompted the Cybersecurity and Infrastructure Agency (CISA) to update its infrastructure resilience framework for guiding state, local, and tribal entities, as they work further on their cyber-protections. 

Furthermore, the Information Technology Industry Council (ITI) asked the White House Office of Management and Budget (OMB) to further detail its recommendations on how to better secure software development. 

Via: The Register

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Digital US flag
Biden orders review, new rules governing US national cybersecurity
A wall of data on a large screen.
“It's the same doors that the good guys use, that the bad guys can walk through” - former White House tech advisor on data-centric security in the wake of Salt Typhoon
Dr Chase Cunningham speaking at ZTW25
The grand delusion: endpoint protection isn’t the magic pill, says Dr Zero Trust
An American flag flying outside the US Capitol building against a blue sky
White House unveils "US Cyber Trust Mark" to help determine if your devices are secure
Security padlock in circuit board, digital encryption concept
Best Zero Trust Network Access Solution of 2025
An abstract image of a lock against a digital background, denoting cybersecurity.
Building a resilient workforce security strategy
Latest in Security
Isometric demonstrating multi-factor authentication using a mobile device.
NCSC gets influencers to sing the praises of 2FA
Sam Altman and OpenAI
OpenAI is upping its bug bounty rewards as security worries rise
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Dangerous new CoffeeLoader malware executes on your GPU to get past security tools
China
Notorious Chinese hackers FamousSparrow allegedly target US financial firms
A digital representation of a lock
NYU website defaced as hacker leaks info on a million students
NHS
NHS IT supplier hit with major fine following ransomware attack
Latest in News
Nintendo Switch 2 Joy-Con up-close from app store
Nintendo's new app gave us another look at the Switch 2, and there's something different with the Joy-Con
cheap Nintendo Switch game deals sales
Nintendo didn't anticipate that Mario Kart 8 Deluxe was 'going to be the juggernaut' for the Nintendo Switch when it was ported to the console, according to former employees
Three angles of the Apple MacBook Air 15-inch M4 laptop above a desk
Apple MacBook Air 15-inch (M4) review roundup – should you buy Apple's new lightweight laptop?
Witchbrook
Witchbrook, the life-sim I've been waiting years for, finally has a release window and it's sooner than you think
Amazon Echo Smart Speaker
Amazon is experimenting with renaming Echo speakers to Alexa speakers, and it's about time
Shigeru Miyamoto presents Nintendo Today app
Nintendo Today smartphone app is out now on iOS and Android devices – and here's what it does