Air Force Deputy Pushes Zero Trust on Mission Partner Environment
The Air Force considers how to retrofit the mission partner environment with zero trust principles amid growing cyber priorities.
Future technology solutions within Indo-Pacific region defense operations will need to be built on zero trust, the Air Force’s zero trust deputy chief said at AFCEA TechNet Indo-Pacific in Honolulu this week.
“Any mission partner environment that we are going to use at the Department of Defense of the United States is going to be built with technologies that are surrounding zero trust. So if you want to play the mission partner environment game, you have to do so with zero trust as your foundation,” said Department of the Air Force Zero Trust Functional Management Office Deputy Director Capt. Ryan Fraser.
The service just released the second version of its enterprise zero trust strategy that outlines goals it will accomplish through fiscal year 2026.
Zero trust principles have helped foster collaboration with key mission partners in the Indo-Pacific region while keeping critical data out of the hands of those who should not have access to it. This in turn allows more data to be securely shared amongst and between partners, Fraser said.
The Department of the Air Force serves as the executive agent for the secret and below releasable environment, or SABRE, a software tool designed for information sharing between the military and its partners.
Although the mission partner environment is nothing new, Fraser said their longevity is creating new issues since they were not designed at a time when building off zero trust principles had not been a priority. Plus, the partners now make up not only other militaries, but also civilian infrastructure in countries that might be culturally different than the U.S. military when it comes to cyber hygiene.
Despite Air Force’s role over SABRE, Fraser emphasized that all components of the DOD will have to build their own roadmaps to abide by zero trust principles as it relates to external partners.
“Regardless of what service you’re in or what function you perform in the DOD, Air Force mission partner environment guidance is going to affect you,” Fraser said.
Fraser said that the DOD must consider cultural awareness when collaborating with partners and shape its cybersecurity practices and access to those it is working with, without fully compromising its own principles.
“We have a lot of resources and a lot of effort that we can put into making these technologies work,” Fraser said, highlighting the potential of cost-prohibitive policies on mission partners.
“Some people aren’t going to be able to pay to play. The [department] is looking really hard right now at how we can frame things in a way that gets relevant data to the warfighter, regardless of where they’re from, as long as they’re doing the mission that needs to be done,” Fraser said.
This is a carousel with manually rotating slides. Use Next and Previous buttons to navigate or jump to a slide with the slide dots
-
Trump's DHS Secretary Pick Prioritizes Tech to Boost Security
South Dakota Governor Kristi Noem has prioritized advancements in cyber, quantum and biometrics to enhance state and national security.
7m read -
HUD’s New CIO Focuses on AI, Zero Trust
HUD's new CIO Sairah Ijaz is focusing on implementing artificial intelligence and zero trust to mature and secure the agency's IT framework.
4m read -
CMS Cyber Integration Center Leverages PenTesting to Protect Patient Data
Testing efforts help better identify vulnerabilities, coordinate incident response and mitigate risks.
15m listen -
DOD Cyber Crime Center Appoints New Executive Director
Lesley Bernys previously served as CIO at the Air Force Office of Special Investigations.
2m read