Insight by Splunk

Trust whom your data tells you to

In the video interview moderated by Federal News Network’s Tom Temin, Sean Connelly of the Cybersecurity and Infrastructure Security Agency and Air Force Brig...

When a million federal employees suddenly found themselves teleworking, agency tech staffs found they had several problems to solve. If the first one was building and provisioning sufficient infrastructure to support collaboration and access to applications and data, it’s handmaiden was how to do it all securely. The change in working mode accelerated nearly every agency’s moves to build zero trust architectures in their networks.

The zero trust premise holds that it takes more than a simple user name and password to enable secure access, whether on premise or remotely. It requires continuous identification and authentication throughout even a single session, with algorithms evaluating characteristics of the user – behaviors, IP addresses, authentication factors offered. Zero trust must operate as an orchestrated service, with the ability to monitor its own available and potential for interruption.

It’s all a data driven operation. As detailed in this interview with two high level federal cybersecurity practitioners, zero trust is informed by many data sources. Some are generated by the agency, such as network activity logs. Others come from both government-generated and commercially provided security telemetry, such that uses gain trust in the context of what is known about the security environment.

In the video interview moderated by Federal News Network’s Tom Temin, Sean Connelly of the Cybersecurity and Infrastructure Security Agency and Air Force Brigadier General Chad Raduege, the cyberspace and information dominance director at the Air Combat Command, talk about how to gain trust, the data and workflows required, and the organizational constructs that best foster trust.

Shape

How the Security Approach Has Morphed

You can enrich your access controls with telemetry, those intel feeds. So when the policy enforcement point is making decisions, it can look at what we know of the adversaries, and what the commercial products know, and decide if this is a trusted user or does this have some of the ways the adversary would be trying to establish trust also.

Shape

Cybersecurity Workflows

I think that zero trust, future, this zero trust strategy is all about. It's thinking about the old perimeter security, and it's now thinking about how do you protect the data, whether that's in transit or whether that's it rest.

Listen to the full show:

Copyright © 2024 Federal News Network. All rights reserved. This website is not intended for users located within the European Economic Area.

Related Stories

    Courtesy Anne AylwardAnne Aylward

    The Transportation Department says farewell to one of its most distinguished employee

    Read more
    (U.S. Space Force photo by Tech. Sgt. James Hodgman)U.S. Space Force Capt. Mark Conque, 1st Range Operations Squadron assistant director of operations, uses the Range Application Deployment system to assess Space Launch Complex 40 June 7, 2022, at Cape Canaveral Space Force Station, Fla. The RAD system offers up to 25 video feeds to support launch operations. (U.S. Space Force photo by Tech. Sgt. James Hodgman)

    Space Force to tackle HR, promotions before it can bring in part-time Guardians

    Read more
Featured speakers
  • Sean Connelly

    TIC Program Manager, Cybersecurity and Infrastructure Security Agency

  • Brigadier General Chad Raduege

    Director of Cyberspace and Information Dominance, Headquarters Air Combat Command, U.S. Air Force

  • Tom Temin

    Host, The Federal Drive, Federal News Network