• COVID-19
  • About Us
  • Contact Us
  • Events
  • Industries
  • Partners
  • Products & Services
  • Contribute
  • Webinars

Aerospace

  • Québec’s CloudOps Will Build Telesat LightSpeed’s Cloud Network
  • Myriota and Goanna Ag Team Up on IoT Agriculture Solutions
  • Fleet Picks Swissto12 to Deliver Additively Manufactured All-Metal Patch Antennas

Chemical

  • POWER magazine and Chemical Engineering magazine announce Eastman Chemical as the Host Chemical Process Industries (CPI) Sponsor for the 5th annual Connected Plant Conference
  • Evonik deepens partnership with IBM to accelerate AI implementation
  • Achieving Plant Efficiency – the Digital Way

Cybersecurity

  • House Passes Eight Bipartisan Cyber, Homeland Security Bills
  • Biden Administration Targets Electric Utilities For Cybersecurity Protections
  • White House Attributes SolarWinds Hack To Russian Agency

Healthcare

  • CISA Services In High Demand Related To COVID Vaccine Response
  • AI tool detects COVID-19 by listening to patients’ coughs
  • Printing Wearable Sensors Directly onto Skin

Oil & Gas

  • Globalstar Wins Asset Tracking Order from Brazilian Oil and Gas Company
  • Cybersecurity: Continuous Vigilance Required
  • Repsol and Microsoft renew partnership developing AI-powered digital solutions

Power

  • POWER magazine and Chemical Engineering magazine announce Eastman Chemical as the Host Chemical Process Industries (CPI) Sponsor for the 5th annual Connected Plant Conference
  • Self-Tuning Artificial Intelligence Improves Plant Efficiency and Flexibility
  • How to Put the Power Grid to Work to Prevent Wildfires

Transportation

  • Swarm CEO Sara Spangelo Sets Disruptive Pricing on New Satellite IoT Service
  • Trump Issues Cyber Security Plan For Maritime Transportation System
  • Sabic Launches New Compounds for Automotive Radar Sensors

Webinars

  • Anticipating the Unknowns: Accelerating Incident Response Without Losing Control
  • Industrial Endpoint Protection in Operational Technology
  • Known and Unknown: Putting a Stop to OT and IT Threats Before they Act

Sign up today for our free weekly e-letter

sign up
CONNECTING INNOVATIONS
WITH INSIGHT
SIGN UP
LOG IN
  • Aerospace
    Québec's CloudOps Will Build Telesat LightSpeed's Cloud Network
    Read story View all articles
  • Chemical
    POWER magazine and Chemical Engineering magazine announce Eastman Chemical as the Host Chemical Process Industries (CPI) Sponsor for the 5th annual Connected Plant Conference
    Read story View all articles
  • Cybersecurity
    House Passes Eight Bipartisan Cyber, Homeland Security Bills
    Read story View all articles
  • Healthcare
    CISA Services In High Demand Related To COVID Vaccine Response
    Read story View all articles
  • Oil & Gas
    Globalstar Wins Asset Tracking Order from Brazilian Oil and Gas Company
    Read story View all articles
  • Power
    POWER magazine and Chemical Engineering magazine announce Eastman Chemical as the Host Chemical Process Industries (CPI) Sponsor for the 5th annual Connected Plant Conference
    Read story View all articles
  • Transportation
    Swarm CEO Sara Spangelo Sets Disruptive Pricing on New Satellite IoT Service
    Read story View all articles
Cybersecurity
April 14 2021 8:49 pm

Defense Department Accelerating Move To Zero Trust Framework In Response To Recent Hacks

C

Cal Biesecker

Following recently disclosed cyber breaches of a number of federal government and private sector networks, the Defense Department is accelerating its adoption of a zero trust (ZT) framework across the department's information network, the DODIN, defense officials told a Senate panel on Wednesday.

The DoD was already moving toward a ZT framework but the "increasing sophistication, determination, and resourcefulness of our adversaries in cyberspace" as evidenced by the compromises of software supplied by Microsoft [MSFT] and SolarWinds [SWI] "highlight the importance of accelerating adoption across the department," three DoD officials said in their written statement to the Senate Armed Services Committee's panel that oversees cybersecurity issues.

"Currently, untrusted users, machines, applications and other entities are kept outside of our network perimeter while trusted ones are allowed inside," David McKeown, deputy chief information officer for Cybersecurity and the Chief Information Security Officer for DoD, told the subcommittee in his opening statement. "We have developed advanced capabilities to monitor traffic flowing between untrusted networks, such as the internet, and our trusted networks to identify attempted attacks or exfiltration of data. The limitations of this defense are exposed when the adversary is able to establish a foothold on a device within our perimeter on our trusted network."

In the cases of the compromises of SolarWinds and Microsoft, the DoD wasn't hacked although nine other federal departments and agencies were, including the Department of Homeland Security.

The SolarWinds incident is being attributed to Russian actors by the U.S. intelligence community. In this incident, a foreign intelligence service is suspected of compromising the software supply chain of the company, which ultimately approved the software to be used in patches to upgrade customer networks using their Orion platform. This way, the hackers avoided having to penetrate a network perimeter by using what was considered a trusted upgrade that is routinely downloaded by network administrators.

A ZT framework assumes a network has been compromised.

"As the threat landscape evolves, so must we," McKeown, Rob Joyce, director of the National Security Agency's Cybersecurity Directorate, and Rear Adm. William Chase, deputy principal Cyber Advisor to the Secretary of Defense, stated in their written testimony. "We must assume the DODIN is compromised and utilize existing and future advanced cyber defense capabilities to isolate and expel intruders. This advanced defense posture is at the core of the ZT framework."

McKeown, speaking for the witnesses in opening remarks, said that not-trusting a network means to "constantly" search for threats and only giving approved users and devices access. So, if a non-trusted user gains accesses to the DODIN, they won't be able to move laterally across the network or expand their privileges to gain further access to the network, he said.

Perimeter and other cyber defense tools are still necessary, McKeown said. His view here has been echoed by top DHS cybersecurity officials who have said that despite hackers using the SolarWinds software as a vector to penetrate some government networks, perimeter detection and intrusion prevention tools remain necessary but that more resources have to be invested in better understanding the applications and components of existing networks and then providing defenses inside these networks.

The defense officials outlined seven pillars to the DoD ZT framework, which are "predicated on our strategy to architect from the inside out." The pillars include the users, which require continuous multifactor authentication, activity monitoring and behavioral biometrics to confirm activity.

The other pillars include application and workloads, which involves containerizing and micro-segmenting to secure software, devices, which require real-time inspections and patching, data for end-to-end encryption and tagging to protect sensitive information, networks and infrastructure that includes next-generation firewalls and physical and software-based segmentation, visibility and analytics to analyze events and activities on the network, and finally automation and orchestration, which refers to the responses and alerts when an incident is detected.

Sign up today for our free weekly e-letter

sign up

Aerospace

Chemical

Cybersecurity

Healthcare

Oil & Gas

Power

Quiz

Transportation

Webinars

About Us

IIoT Connection delivers the latest news, trends, insights, events and research surrounding the dynamic and disruptive Industrial Internet of Things (IIoT) marketplace. Brought to you by the publisher of must-read publications Defense Daily, OR Manager, POWER and Chemical Engineering, as well as the conference producers of SATELLITE, Global Connected Aircraft Summit, Connected Plant Conference and ELECTRIC POWER, IIoT Connection is committed to providing the most comprehensive compilation of products and services dedicated to the Industrial Internet of Things. Key verticals with associated products and services include: aerospace, chemical, cybersecurity, healthcare, oil & gas, power, and transportation.


Advertise

  • Privacy Policy
© 2021 Access Intelligence, LLC - All Rights Reserved.
  • × UPS Partners with Wingcopter to Develop, Certify Drone Delivery Fleet
    Read story View all articles
  • × How Industrial Managers Can Identify and Prevent Failures in Facilities
    Read story View all articles
  • × Federal Agencies Partner To Improve Cyber Security Cooperation In Energy Sector
    Read story View all articles
  • × New service lines can create opportunities for ORs
    Read story View all articles
  • × Equinor and Shell to collaborate on digital solutions
    Read story View all articles
  • × Dobroflot to Manage Fuel Savings With IOT Solution By Orange Business Services
    Read story View all articles
  • × The Future of 5G & IoT Technologies in the Transportation Industry
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles