DOD, OMB Agree Identity Management Is Key To Implementing Zero Trust
Identity management, level of assurance and single source of truth are pillars of the zero trust approach to cybersecurity.

Time is running out for federal agencies to implement zero trust architectures in accordance with Office of Management and Budget’s FY 2024 deadline. Federal cyber leaders highlighted identity management as a foundational component of zero trust and a necessary first step in zero trust architecture at ATARC’s Accelerating Zero Trust Implementations with Network Visibility webinar Thursday.
If you don’t know who’s on the other end of line, you can’t possibly implement any of the other principles of zero trust, said Dan Chandler, Information Systems Security Officer with the Budget Systems Branch at the OMB, Executive Office of the President.
Chandler said the level of assurance associated with an identity is vital.
“In the federal government we’re fortunate to have access to a really strong two-factor identity solution and so leveraging those for your identity management and authentication is a really a strong first step that to makes it a lot easier to implement future components of a zero trust architecture,” Chandler said during the ATARC webinar.
Organizations should also designate a single source of truth for identity and access management to prepare for zero trust architecture.
“Rather than having lots of individual systems that have their own group structures or their own interface for managing permissions you really want to have a single tool that’s part of your identity management solution that lets you identify who a person is and what roles that person has,” Chandler said. “Then in the individual systems all they have to do is implement access controls and security controls based on the roles a person has.”
Brian Hermann, Cyber Security and Analytics Director at the Defense Information Systems Agency (DISA), said DOD is making progress in achieving zero trust architecture with DISA’s Thunderdome prototype, which will inform the future of DOD cybersecurity.
“We’re implementing secure access service access edge (SASE) as a mechanism for us to understand and consolidate information about the user from the ICAM, from the device,” Hermann said during the webinar. “We’re going to eliminate some of the virtual private networking access to applications and pair that up with application security stacks to limit the east-west kind of movement across the network.”
Chandler said one of the things organizations miss when implementing zero trust is allowing IT systems to be dynamic and incorporate all relevant data to determine whether a user should access to a resource.
“We’re working on architecting a system that creates a trust score for a particular session and then matches that up with a trust requirement on a function or feature so that we have a dynamic change and the level of trust we have for a particular session and then we can guide that user,” Chandler said. “Let’s say your trust score isn’t high, you can reauthenticate to raise your score enough for you to be able to do what you need to and doing that dynamically forces you to build up a lot of other best practices.”
Hermann said he didn’t like the term zero trust because he considers the zero trust approach a journey rather than a destination. Zero trust is primarily about determine trust levels and progressively reducing or increasing trust based on different user profiles and scenarios.
“It’s trust that is based on information and policies, not just blanket trust which is where many of us were when we started,” Hermann said. “What is the first step we take to make that move toward zero trust and just continue to evolve in an agile fashion? That’s what we really have to do.”
This is a carousel with manually rotating slides. Use Next and Previous buttons to navigate or jump to a slide with the slide dots
-
The Next AI Wave Requires Stronger Cyber Defenses, Data Management
IT officials warn of new vulnerabilities posed by AI as agencies continue to leverage the tech to boost operational efficiency.
5m read -
Federal CIOs Push for ROI-Focused Modernization to Advance Mission Goals
CIOs focus on return on investment, data governance and application modernization to drive mission outcomes as agencies adopt new tech tools.
4m read -
DOD Can No Longer Assume Superiority in Digital Warfare, Officials Warn
The DOD must make concerted efforts to address cyber vulnerabilities to maintain the tactical edge, military leaders said at HammerCon 2025.
4m read -
Tracking CIOs in Trump's Second Term
Stay informed on the latest shifts in federal technology leadership as new CIOs are appointed and President Trump's second term takes shape.
6m read -
Inside Oak Ridge National Lab’s Pioneer Approach to AI
Energy Department’s Oak Ridge National Lab transforms AI vulnerabilities into strategic opportunities for national defense.
22m listen -
AWS Summit: Innovation Accelerates IT Delivery at DOD
Marine Corps Community Services is tackling outdated IT processes with agile development and cutting-edge cloud security to deliver mission-critical capabilities faster.
12m watch -
AWS Summit: NIST Secures High-Performance Computing Against Evolving Threats
NIST’s Yang Guo reveals the broad attack surface of high-performance computing and explains developing guidance and future-proofing security strategies.
9m watch -
Trump Overhauls Federal Cybersecurity with New Executive Order
The new directive aims to strengthen digital defenses while rolling back "burdensome" software requirements and refocusing AI security.
3m read -
AWS Summit: Forging Successful Cloud Modernization Partnerships
Industry leaders share insights on the critical role industry partnerships have in enabling government agencies to navigate procurement challenges for cloud and zero trust solutions.
24m watch Partner Content -
CISA's CVE Program and Why it Matters for Zero Trust
The vulnerability program provides the cybersecurity community visibility into software as part of a key pillar of CISA's zero trust model.
5m read -
Air Force, Coast Guard Talk Data Security Efforts for AI Development
The services' AI initiatives include efforts like creating clean training data, countering data poisoning and bridging siloed teams.
4m read -
DHS Secretary Urges Congress to Reauthorize CISA 2015
Federal leaders highlight CISA 2015's role in strengthening public-private partnerships and defending against evolving cyber threats.
3m read