The U.S. Department of Defense (DoD) recently issued a Zero Trust strategy and roadmap. Even though the term Zero Trust has been overused (and even misused) for many years now, the underlying principals such as network segmentation, end-to-end encryption, and security automation are sound practices and are more important than ever in times with increasing volume and sophistication of attacks on our IT infrastructure. The model developed by the DoD is probably the most comprehensive look at all those principals. It shows the interdependencies of those concepts and how to practically implement these various technologies across the infrastructure and organization. They even consider the organizational impact on the operations and user community. The following summarizes this approach that could also be a helpful model for other industries which may not be as expansive as the DoD.
The DoD Approach
The DoD was aware that shielding its warfighters and operations from highly advanced assaults and opponents demanded not only a technological alteration, but also a comprehensive change in culture and processes. The DoD Zero Trust Strategy acknowledges the need for investments and projects in infrastructure, leadership, personnel, buildings, and regulations and educational systems, stating that, “the journey to Zero Trust requires all DoD Components to adopt and integrate Zero Trust capabilities, technologies, solutions, and processes across their architectures, systems, and within their budget and execution plans.” The objective is to build a sustainable, resilient, as well as verifiable and secure environment in a maximum of five years. The plan provides the essential resources and commands for prompt performance but acknowledges that the structure and the methods will need to grow and adjust over time. In addition, vendors will have to work together to achieve attainable results.
The federal government and Department of Defense have launched an extensive array of strategies, architecture frameworks, and regulations that are aimed at turning the concept of Zero Trust into a reality. The two primary documents are the DoD Zero Trust Reference Architecture Version 2.0 and the DoD Zero Trust Strategy.
The Seven Pillars – Tying it all Together
Version 2 of the Zero Trust Reference Architecture, created by DISA and NSA, has identified seven significant components (called pillars) that must be considered for a successful Zero Trust integration. These include user, device, application and workloads, data, network and environment, automation and orchestration, and visibility and analytics. These seven pillars provide the foundations for a Zero Trust Security Model and the DoD Zero Trust Architecture.
Figure 1 - DoD Zero Trust Pillars
Source: Department of Defense (DoD) Zero Trust Reference Architecture Version 2.0
The following briefly describes the concept of each one the seven pillars:
A Rapid Implementation Timeline
The DoD crafted a plan for capabilities operational by 2027, with more complex capabilities for a more all-encompassing solution by 2032. This is a very ambitious plan, mirroring the pressing nature of the escalating threats that malicious actors are causing to our infrastructure.
By 2023, the goal is to have the architecture in place, along with outreach to DoD, federal, and industry partners. By 2024 interoperability needs to be established for existing and new systems. Finally, the targeted capabilities are projected to be implemented by the end of FY 2027.
Figure 2 - DoD Zero Trust Capability by Pillar by Fiscal Year
Source: DoD Zero Trust Strategy: DoD Zero Trust Capability by Pillar by Fiscal Year
A Joint Effort – DoD and Industry working closely together
The Department of Defense emphasizes in its report that Zero Trust is an ongoing, dynamic process which includes more than just technology. It demands attention to personnel, protocols, resources, control, and risk management. This is a comprehensive effort which reflects the importance and immediacy of the situation. It also offers vendors an opening to speed up their product development through early contracts and for the rest of the industry to gain insights from this undertaking.
Achieving all the objectives laid out in the DoD’s Zero Trust Strategy will require a coordinated effort of the entire defense community. Each Department has a role to fill in order to ensure the success of Zero Trust, and all departments need to embrace the culture of Zero Trust. This may be a huge task, but the good news is that the DoD has already made significant progress towards a full adoption of Zero Trust. The future for Zero Trust adoption looks bright, and with the frameworks and processes in place, it can become a reality.
Learn more about the DoD’s Zero Trust Strategy