DISA Leader Calls for Increased Zero Trust in an Era of Cloud
A layered defense approach won’t work anymore — zero trust is necessary as the Defense Department moves to the cloud.

As the Defense Department continues to move toward cloud capabilities, it also is looking to lean into a zero-trust model of securing those capabilities and cloud environment. Such a model is necessary amid breaches, insider threats and other cybersecurity concerns that department faces daily.
Traditionally, DOD has approached cybersecurity with a layered approach, which Defense Information Systems Agency Cloud Portfolio Chief John Hale called “defense in depth.” After gaining access through the many layers of DOD security — from firewalls at the edge to intrusion detection devices, reporting and aggregation of data — a user gains full access to the network.
Although this “defense in depth” approach was effective in DOD’s internal, closed-network environment, Hale highlighted that this model is problematic in an era of client-serving cloud computing.
“We’re seeing now the problems with the layers model,” Hale said at the FCW Cloud Security Workshop Thursday. “Once you’re inside, you’re inside. And then lateral movement is the big fear that everybody has from a cloud perspective. Once you get past your defense and you’re inside, that lateral movement from one system to the other, elevation of privilege down the chain, is the scary part.”
Hale noted that zero trust is data centric, which he said works well with the nature of cloud infrastructure.
“The data is the cloud is what’s valuable, and access to that data is not guaranteed at any time, so in order to gain access to the data, there’s a myriad of pieces of information that have to come together for you to grant gained access to that material and that data into processing,” Hale said. “That could be anything from who you are, where you are, what kind of device you’re on, what network you’re on. A myriad of factors ultimately drive to an authentication decision, so that you can gain access to that data and utilize it.”
In particular, DOD is looking to use mobile devices to help create an authentication signature. Once DOD personnel and warfighters generate an authentication through their mobile device, Hale said that those individuals will be able to access, process and manage data in the cloud.
“That’s kind of where we see things going, is that integration between the mobile world and the cloud world [in] how the communications are going to happen between that, how zero trust is going to be directly influenced by the end-user device that they’re using to access the capabilities and how they’re able to process that information accordingly,” Hale said.
With this zero-trust approach to cybersecurity, Hale said he hopes to see industry partners help move the department in that direction as well.
“The missions are pushing toward zero-trust model, and we’re really hoping that commercial products catch up and leads up in that way, in that direction,” Hale said. “Zero trust is one of those things where we’re looking at commercial partners to really help us get to that model and to help us across the board to make sure that we can continue to push the cloud capabilities to enable the warfighter to complete their mission.”
This is a carousel with manually rotating slides. Use Next and Previous buttons to navigate or jump to a slide with the slide dots
-
DOD Accelerates Software Modernization with Agile DevSecOps Push
The Pentagon's software implementation plan tackles cultural hurdles and integrates security early to deliver critical capabilities faster.
6m read -
VA's Platform One Powers Rapid Innovation to Bolster Digital Services
VA's Platform One accelerates software development timelines from weeks to hours, ultimately enhancing digital services for veterans.
5m read -
DOD Can No Longer Assume Superiority in Digital Warfare, Officials Warn
The DOD must make concerted efforts to address cyber vulnerabilities to maintain the tactical edge, military leaders said at HammerCon 2025.
4m read -
Marine Corps Operation StormBreaker Slashes Software Delivery Timelines by 17x
New program aims to deliver critical digital capabilities to warfighters at the "speed of relevance" by overhauling traditional processes.
4m read -
Modernization Strategies to Enable Energy Innovation
Lawrence Berkeley National Lab and Maximus experts explore the modernization strategies driving digital transformation and operational resilience within the energy sector.
33m watch -
DOE National Labs Launch New AI Tools for Operational Efficiency
The Energy Department's National Laboratories are using AI to increase operational efficiency and drive research efforts forward.
3m read -
Software Factories Accelerate Federal Modernization Outcomes
IT leaders from Nutanix and SAIC explain how software factories streamline tech development, modernize legacy systems and accelerate adoption of emerging technologies like AI.
34m watch -
AI in Top-Secret Clouds Is a ‘Game Changer’ for IC, DNI Says
Tulsi Gabbard touts significant improvements in AI, data analysis, interoperability and operational intelligence at the AWS Summit 2025.
3m read -
AWS Summit: Forging Successful Cloud Modernization Partnerships
Industry leaders share insights on the critical role industry partnerships have in enabling government agencies to navigate procurement challenges for cloud and zero trust solutions.
24m watch Partner Content -
CISA's CVE Program and Why it Matters for Zero Trust
The vulnerability program provides the cybersecurity community visibility into software as part of a key pillar of CISA's zero trust model.
5m read -
Air Force, Coast Guard Talk Data Security Efforts for AI Development
The services' AI initiatives include efforts like creating clean training data, countering data poisoning and bridging siloed teams.
4m read -
Agencies Use AI to Boost Efficiency, Cybersecurity Under White House Mandates
DLA and GAO are investigating how AI can boost efficiency and bolster cybersecurity as agencies align with the president's tech directives.
3m read