New Zero Trust Overlays Codify DOD Cybersecurity Strategy
The overlay document asks Defense Department components to standardize its implementation strategy across the enterprise.

The Defense Department updated its zero trust overlays that standardize and clarify zero-trust implementation throughout the department. The new overlays are the culmination of an effort that began in the 2021 White House cybersecurity executive order.
The new overlays also phase in zero-trust controls and conduct a gap analysis to help the agency reach its target goals, according to Will Schmitt, division chief at the DOD Zero Trust Portfolio Management Office.
“Zero trust is a data-centric strategy for security,” Schmitt said in an agency statement. “You’re protecting the data itself. You’re moving that protection boundary from the perimeter right down to what’s critical to be protected, and what that means is that everybody has to be authorized and authenticated to access that piece of information.”
Randy Resnick, chief zero trust officer for DOD’s Zero Trust Portfolio Management Office, said at AFCEA TechNet Cyber last month that “the existing overlay controls weren’t good enough to describe zero trust, so what you’ll find in that document is a mapping of controls to activities. We did the hard work here, where we now have controls that describe zero trust at the target and advanced level mapping back to the activities.”
The overlays consist of a number of pillars — user, device, data, application and workload, network and environment, automation and orchestration, visibility and analytics — that underpin the agency’s zero-trust posture. Additionally, five tenets serve as the foundation of the DOD zero-trust implementation: assume a hostile environment, presume breach, never trust, always verify, scrutinize explicitly and apply unified analytics.
“The overlays are giving the ability to quickly determine that 70% to 90% of the controls are in place so we can be confident as we operate that the machine’s checked it, the systems checked it, we’re using the best practices, and we don’t have to go in and manually check everything because that’s going to slow us down,” George Lamb, director of cloud and software modernization at DOD, told GovCIO Media & Research.
Les Call, director of the DOD’s Zero Trust Portfolio Management Office, said in an agency video that zero trust is “like having locks, not just on the external front door, back door, windows, but on all your doors outside and inside, so once the intruder gets in your home, they still can’t go anywhere unless they’re authenticated to move from one room into the other room.”
Call emphasized that system owners are likely already implementing many of the zero-trust controls the department mandates, but some might still need to align themselves with the department’s new standards.
By fiscal year 2027, the department plans to reach “target level” implementation, which consists of implementing at least 91 out of 152 target activities listed in the 2022 DOD’s Zero Trust Strategy and Roadmap.
“The zero-trust overlays are another tool in the department’s toolbox supporting components’ execution by providing clear guidance on which controls facilitate specific zero trust activities and outcomes,” said David McKeown, deputy CIO for cybersecurity and chief information security officer at DOD, in a June statement.
This is a carousel with manually rotating slides. Use Next and Previous buttons to navigate or jump to a slide with the slide dots
-
DOD Can No Longer Assume Superiority in Digital Warfare, Officials Warn
The DOD must make concerted efforts to address cyber vulnerabilities to maintain the tactical edge, military leaders said at HammerCon 2025.
4m read -
Tracking CIOs in Trump's Second Term
Stay informed on the latest shifts in federal technology leadership as new CIOs are appointed and President Trump's second term takes shape.
6m read -
Inside Oak Ridge National Lab’s Pioneer Approach to AI
Energy Department’s Oak Ridge National Lab transforms AI vulnerabilities into strategic opportunities for national defense.
22m listen -
AWS Summit: Innovation Accelerates IT Delivery at DOD
Marine Corps Community Services is tackling outdated IT processes with agile development and cutting-edge cloud security to deliver mission-critical capabilities faster.
12m watch -
AWS Summit: NIST Secures High-Performance Computing Against Evolving Threats
NIST’s Yang Guo reveals the broad attack surface of high-performance computing and explains developing guidance and future-proofing security strategies.
9m watch -
Trump Overhauls Federal Cybersecurity with New Executive Order
The new directive aims to strengthen digital defenses while rolling back "burdensome" software requirements and refocusing AI security.
3m read -
AWS Summit: Forging Successful Cloud Modernization Partnerships
Industry leaders share insights on the critical role industry partnerships have in enabling government agencies to navigate procurement challenges for cloud and zero trust solutions.
24m watch Partner Content -
CISA's CVE Program and Why it Matters for Zero Trust
The vulnerability program provides the cybersecurity community visibility into software as part of a key pillar of CISA's zero trust model.
5m read -
Air Force, Coast Guard Talk Data Security Efforts for AI Development
The services' AI initiatives include efforts like creating clean training data, countering data poisoning and bridging siloed teams.
4m read -
DHS Secretary Urges Congress to Reauthorize CISA 2015
Federal leaders highlight CISA 2015's role in strengthening public-private partnerships and defending against evolving cyber threats.
3m read -
Rep. Gerry Connolly Leaves Lasting Mark on Federal Tech
Connolly's leadership in Congress significantly advanced government IT, emphasizing accountability, efficiency and a robust cybersecurity posture.
4m read -
Agencies Use AI to Boost Efficiency, Cybersecurity Under White House Mandates
DLA and GAO are investigating how AI can boost efficiency and bolster cybersecurity as agencies align with the president's tech directives.
3m read