Zero Trust Strategies to Secure Federal Systems
Tech modernization and the demands of the COVID-19 pandemic have pushed major agencies to embrace IT security that protects against newfound vulnerabilities.

Agencies across the federal government are moving to implement zero trust to protect the integrity of their IT systems amidst modernization programs and to adapt around vulnerabilities that emerged during the COVID-19 pandemic.
Speaking at the GovernmentCIO Media & Research Cyberscape: National Security forum, public sector cybersecurity experts discussed the evolving threat landscape and the growing embrace of zero trust as a means of staying ahead of malicious actors.
โIf Iโm a threat actor and I want to get the most bang for my buck, and I can gain network access into a software company โ weโve seen these attacks recently with SolarWinds โ and I can reach an update server or an entity that I know is used across the whole of government or across the whole of the United Statesโ networks, I can use that as a jumping off point to attack a variety of organizations,โ said Matthew Swenson, chief of the cyber crime unit at Homeland Security Investigations.
The potential damage of these kinds of attacks, especially across the remote work environment, has reinforced the need to prevent spillover breach through leveraging network segmentation and requiring additional verification to access discrete areas of an organizationโs broader IT system. The Defense Digital Service has helped the Defense Department overall evolve to implement core zero trust methodology.
โItโs been really interesting to see DOD move from traditional defense in depth to zero trust architecture, especially with the COVID pandemic forcing more people to work from home. In the case of the Sunburst malware attack, our kill chain used aggressive deny by default [access control lists]. So weโre really focused on, as we evolve into zero trust initiatives, what happens to these sort of traditional [access control list] protections? Tightening those deny-by-default protections at all layers of the OSI model, and then specifically focusing on anomaly detection, has been one of the big recommendations that weโve been providing,โ said Lance Cleghorn, Digital Services Expert, Defense Digital Service.
This has even encompassed a tighter approach to email access security, particularly as a response to the growing sophistication of ransomware attacks.
โWe put a lot of protective capabilities in place, especially around our email because that is probably the most specific vector thatโs being attacked these days with ransomware. We went very aggressive on what email we allow to come into our network,โ said Mike Witt, associate CIO for cybersecurity and privacy at NASA.
The sheer potential cost and disruption to crucial services from ransomware is due in large part to how malicious actors have begun better organizing breaches and payment demands, leading to a corresponding professionalization and consistency in these types of attack.
โRansomware actors, their methodologies, and the way that they function in an organized capacity is getting much more sophisticated. The vast majority of ransomware groups now essentially function like organized criminal networks. Some of the groups have as many as 80 or more actors all working in conjunction, and they become very specialized in their skill sets. So you have malware developers, money mules and people who gain network access, to people who function as help desk operators and negotiate payment,โ Swenson said.
Zero trust measures have enabled agencies to prevent such crippling attacks on vital IT systems and prevent the worst possible outcomes of methodical and highly coordinated ransomware breach.
โIf you look at the most major ransomware attacks that have occurred, basic cyber hygiene could have prevented the vast majority of them. Killing their ability to move laterally, heavy network segmentation, network security monitoring, zero trust models, multi-factor authentication, all those types of things,โ Swenson said.
In recognizing the shifts to both federal IT and the corresponding threat landscape, private sector security experts have begun updating their recommendations to federal partners to meet this more dispersed approach to network protection โ bringing together collaboration around how to most effectively codify and instate these measures across government as a whole.
โIn addition to the threat landscape changing, our own network infrastructure has changed quite a bit as weโve moved to the cloud, as well as an increasingly remote workforce,โ said Gram Slingbaum, solutions engineer at CyberArk. โWe adopt an assumed breach mentality. Basically we take into account that there are lots of identities out there, but we donโt want to assume that these identities can be trusted. Instead, we have to place controls around them. These controls have meant that identity has become the new perimeter. So, while we used to treat our firewall as the edge of our network, now as soon as that user has to make themselves known, that is the new perimeter.โ
This is a carousel with manually rotating slides. Use Next and Previous buttons to navigate or jump to a slide with the slide dots
-
DOD Can No Longer Assume Superiority in Digital Warfare, Officials Warn
The DOD must make concerted efforts to address cyber vulnerabilities to maintain the tactical edge, military leaders said at HammerCon 2025.
4m read -
Marine Corps Operation StormBreaker Slashes Software Delivery Timelines by 17x
New program aims to deliver critical digital capabilities to warfighters at the "speed of relevance" by overhauling traditional processes.
4m read -
Modernization Strategies to Enable Energy Innovation
Lawrence Berkeley National Lab and Maximus experts explore the modernization strategies driving digital transformation and operational resilience within the energy sector.
33m watch -
DOE National Labs Launch New AI Tools for Operational Efficiency
The Energy Department's National Laboratories are using AI to increase operational efficiency and drive research efforts forward.
3m read -
Software Factories Accelerate Federal Modernization Outcomes
IT leaders from Nutanix and SAIC explain how software factories streamline tech development, modernize legacy systems and accelerate adoption of emerging technologies like AI.
34m watch -
AI in Top-Secret Clouds Is a โGame Changerโ for IC, DNI Says
Tulsi Gabbard touts significant improvements in AI, data analysis, interoperability and operational intelligence at the AWS Summit 2025.
3m read -
AWS Summit: Forging Successful Cloud Modernization Partnerships
Industry leaders share insights on the critical role industry partnerships have in enabling government agencies to navigate procurement challenges for cloud and zero trust solutions.
24m watch Partner Content -
CISA's CVE Program and Why it Matters for Zero Trust
The vulnerability program provides the cybersecurity community visibility into software as part of a key pillar of CISA's zero trust model.
5m read -
Air Force, Coast Guard Talk Data Security Efforts for AI Development
The services' AI initiatives include efforts like creating clean training data, countering data poisoning and bridging siloed teams.
4m read -
Agencies Use AI to Boost Efficiency, Cybersecurity Under White House Mandates
DLA and GAO are investigating how AI can boost efficiency and bolster cybersecurity as agencies align with the president's tech directives.
3m read -
DOD Cyber Strategy to Adapt to New Budgets, Tech Innovation
Budgetary pressures spur innovation as department tackles aging infrastructure and evolving threats, says top cyber official.
4m read -
Federal Agencies Tout Tech in President Trumpโs First 100 Days
Defense modernization and health care restructuring landed among some of the key IT highlights within the president's first few months.
6m read