Data Mapping, Operational Understanding Are Next Steps For Zero Trust
Agencies are aligning security and performance needs.
Data-mapping is the next step when it comes to building cyber situational awareness, security leaders said at GovCIO Media & Research’s zero trust conference Thursday.
In order to detect suspicious activity on your network, you first need to understand what regular behavior looks like, said Gerald Caron, CIO for the Office of Inspector General at the Department of Health and Human Services (HHS).
“We are doing data mapping — not network mapping, but data mapping,” he said. “Understanding where our data is, where our data is going. Because if that’s what we’re trying to protect, we’ve got to understand what normal looks like. That will allow us to later do micro-segmentation.”
Drew Malloy, technical director for the Cyber Development Directorate at the Defense Information Systems Agency (DISA), said that understanding data will be critical to maturing the Department of Defense’s (DOD) zero trust model.
“If we want to get to the true of zero trust Shangri La of fine-grained, access control to specific data — based on how it’s tagged, based on need to know, things of that nature — we have to get our hands around data. DOD is a behemoth when it comes to that, right, but we need to start small.”
In order to secure that data, not only do cybersecurity teams need to gather information on what normal activity looks like — they also need to understand their users’ operational needs. Operational data is critical to getting controlled access and segmentation right, otherwise security measures can become a barrier to people doing their jobs.
“We’re not asking, ‘How do you work?’ But, ‘How do you want to work?’ So we can build those things in,” Caron said. “What kind of devices do they like? What do they really need? When do they need it? And then when we go on this journey, there’s less friction.”
User experience is a critical issue across the Defense Department, which is shifting its cybersecurity priorities to focus on mission performance.
“We had a really bad habit of going after the best, newest thing out there that somebody got sold on, and then throwing it on the endpoint,” Malloy said. “And the next thing you know, we’ve got three or four agents running on the endpoint and it’s pegging your CPUs and you can’t get anything done. So, taking a look at, how do we have a unified endpoint management product that we can optimize for actual performance while bringing security? No longer looking at the two in isolation, but bringing the two together to say, ‘Security can’t just come at the cost of performance.’”
Don Watson, CISO at the Patent and Trademark Office, said that cybersecurity measures have to work with mission, not against it. When he joined USPTO, he began building relationships with operational leaders to make that happen.
“When I came on board at USPTO, about three and a half years ago, I found our approach toward cybersecurity overall to be that we were more of a roadblock than an enabler,” Watson said. “It’s very important that you are an enabler for either mission or business operations. I met with all the businesses, and I told them, ‘I am not here, and my team is not here, to stop you from doing anything. We’re here to help you either design a product or deploy a solution that is secure.'”
For Caron, it all comes back to understanding data — where it is, who is using it, and what normal traffic looks like — so that users can securely complete their mission.
“At the end of the day, we’re protecting data,” Caron said. “Data to the right people at the right time.”
This is a carousel with manually rotating slides. Use Next and Previous buttons to navigate or jump to a slide with the slide dots
-
Federal Leaders Revamp Tech Workforce, Policy
Despite the rise in interest of emerging technology, federal leaders see data, policy and the workforce as a best vehicle for change.
4m read -
Looking Back at the First Trump Administration's Tech Priorities
In his first term, Donald Trump supported cybersecurity, space policy and artificial intelligence development.
4m read -
Securing the Expanding Attack Surface in Cyberspace
Agencies undergoing digital transformation face a more intricate threat landscape and a wider threat target for adversaries looking to exploit vulnerabilities. This panel dives into strategies agencies are undertaking to safeguard these complex environments, including zero-trust architecture, vigilant monitoring and robust cybersecurity training.
30m watch -
Elevating Cybersecurity in the Intelligence Community
The Intelligence Community is developing strategies to protect data and strengthen resiliency against emerging cyber threats.
30m watch