Insight by Saviynt

The right technology for tactical information dominance

On its journey to Zero Trust, the DoD must secure a multi-cloud environment with a common defensive layer. Here’s how it can succeed.

This content was provided by Saviynt.

In the days of castle and moat security, defense was simple: the enemy was “out there” and everything “in here” was safe. Now, critical data and assets can live anywhere; every identity and device–-human or non-human, in-network or out—is a potential threat. The US Department of Defense (DoD) is on the front lines of this evolving battleground.

The DoD has ambitious goals and timelines for modernizing and aligning its defense strategy with Zero Trust architecture. This initiative would reduce its attack surface, manage risks more effectively, and enable secure data-sharing in coalition warfare. But the first step is investing in the right cloud solution.

There are many pressures driving this paradigm shift, the DoD’s architecture goals, and the IGA (identity governance & administration) capabilities required to build a modernized cybersecurity arsenal.

Key Pillars of the DoD Zero Trust Architecture

As part of its effort to align multi-cloud adoption with its zero trust strategy, the DoD’s Joint Warfighting Cloud Capability contract endeavors to identify cloud-supported software solutions that will move it closer to a fully implemented Zero Trust framework.

At the same time, it must also support warfighters in low-bandwidth, Denied, Disrupted, Interrupted, and Limited (DDIL) mission scenarios, requiring some of the Zero Trust solutions to run on local infrastructure. The timeline is aggressive, with implementation slated for the end of FY 2027.

Where is the Enemy? Everywhere

Beyond bad actors trying to break in, internal weaknesses are common—74% of organizations say they are at least moderately vulnerable to insider threats, and over half experienced an incident in the last year. Malicious employees, accounts with compromised or orphaned credentials, and systems infected with malware serve as jumping-off points for attacks.

Contractors present another confounding challenge. They are inherently difficult to manage from a security standpoint, with access needs that are temporary and vary widely. At some point, many are re-staffed in a different capacity or move to a different team within the organization.

Work is Anywhere

Security based on administrators and standing privilege worked well for on-prem workforces. Now, “work” happens in a complex and distributed environment, with personnel and resources spread across the globe. Modern workers use software and resources that live in the cloud, migrating between networks of questionable safety. VPN tunnels have capacity issues and require expensive hardware, additional networking, and can present configuration and management challenges.

The expansion in the number of devices, machines, and other NPEs on the DOD Information Networks (DoDIN)–combined with the significant challenge of verifying changes to hardware, firmware, and software–puts undue strain on critical defense teams.

The Cloud is Ubiquitous

Even in the largest enterprises, on-prem resources are losing their attractiveness. It’s simply cheaper, faster, and easier to use the cloud. The number of SaaS apps increased by 18 percent this year, with enterprises using an average of 130 apps.

But SaaS solutions aren’t always well managed. Over 55% of security executives reported a SaaS security incident in the past two years—ranging from data leaks and breaches to ransomware and malicious apps. With 68% monitoring less than half their SaaS stack, IT departments struggle to know who is using what resources and, importantly, who should be using those resources.

An Identity-Based Perimeter with Zero Trust is the Answer

With Zero Trust, every time a user or application submits an access request, all of the attributes associated with that user or application (role, position, duties, usage behaviors, etc.) are evaluated. The security system either auto-grants access or flags the request for further review.

With identity as the perimeter, founded on just in time access, the DoD can move closer to Zero Trust and ensure that:

  1. Old credentials are eliminated
  2. Employees can’t access data or resources they shouldn’t after moving to a different department or organization
  3. Slow-moving VPN tunnels don’t bog down productivity
  4. Modern threats have fewer places to hide

Zero Trust Is Measurable—But Only With Visibility

Before they can protect endpoints with common policies and governance, analysts need a tool that can provide a unified picture of user identities across different cloud solutions. They need telemetry to gauge the maturity of environments and to know where to focus. They need AI to help harmonize data from different environments and track down key data without high-level experts weighing in.

And, if an attack spans different environments, teams need to be able to source the identities involved, verify each user in each environment, and perform entity behavior analysis. With a single source of truth for identities, cyber defenders can operationalize in real-time rather than spending precious time trying to manually connect data and correlate identities across platforms.

4 Ways Saviynt Fortifies Zero Trust

The Zero Trust journey is no easy task for even the largest organizations. The most effective approaches to IT security start with investment in the right technology. Here’s how Saviynt can help deliver on core capabilities across cloud, multi-cloud, and hybrid environments:

  • One Centralized Identity Repository helps organizations achieve an up-to-date inventory of all identities (human and machine) that need to access resources, what roles each of them play, and what rights they should have. This feature drives consistent and accurate access policies across the IT environment.
  • Least Privilege access policies based on current usage and outlier analysis can be enforced across solutions, ensuring users are only given the minimum level of access necessary to perform their jobs
  • Automated Lifecycle Management connects user and device identity with contextual information to help enforce policies by allowing (or denying) access to resources in the environment.
  • Analytics and Machine Learning tracks user and device behavior, identifying potential threats in real-time, and allowing for rapid response and mitigation. Saviynt can ingest logs and data from security tools and solutions in the environment, allowing for continuous monitoring and helping teams respond to risky activities quickly, accurately, and appropriately.

With Saviynt, any enterprise can achieve a resilient, scalable, and multi-disciplinary cybersecurity architecture that can extend far beyond the “trusted internal zone” of a network.

Check out their Zero Trust Capabilities eBook to learn more!

Copyright © 2024 Federal News Network. All rights reserved. This website is not intended for users located within the European Economic Area.

Related Stories

    Amelia Brust/Federal News Networkmilitary housing concept

    Troops are eligible to receive housing stipend when attending training

    Read more
    Congress Defense Spending

    Key Republican calls for ‘generational’ increase in defense spending to counter US adversaries

    Read more
    Chief Digital and Artificial Intelligence Office

    CDAO will focus on unlocking data rather than having common operating picture

    Read more