GithubHelp home page GithubHelp logo

chughes757 / federalzerotrust Goto Github PK

View Code? Open in Web Editor NEW
38.0 5.0 10.0 82 KB

A repository of resources discussing the Public Sectors push for Zero Trust along with associated resources for learning on the topic.

federalzerotrust's Introduction

Federal-Zero-Trust

This repository is a collection of resources to understand the Federal governments push for Zero Trust along with associated resources for learning more about Zero Trust

image

"Please note that the "zero" in Zero Trust is a bit of a misnomer - it's not about literally "zero" trust, but about zero inherent or implicit trust. Zero Trust is about carefully building a foundation of trust, and growing that trust to ultimately permit an appropriate level of access at the right time" - Jason Garbis & Jerry Chapman - Zero Trust Security: An Enterprise Guide

Background

Zero Trust is far from being a new term or concept. The term itself dates back to 2010 when then Forrester analyst John Kindervag coined the term "Zero Trust" in research and publications. Going back even further, the Jericho Forum founded in 2004 was trying to define the problem and solutions to push for what they termed "de-perimiterization". Building on this, Google began to publish their BeyondCorp model which was founded on Google's own push to implement Zero Trust for their systems. That said, the Federal government, as often is the case, has taken some time to catch up to industry in its pursuit of Zero Trust. With the continued erosion of the legacy network perimiter and castle and moat approach to cybersecurity, agencies and Federal leaders have realized a need for a better security model that aligns with the modern threat landscape. This transition for the Government is accompanied by the increased adoption of a remote work paradigm as well as a broadscale push for digital modernization and cloud computing efforts.

The push for Zero Trust in the Federal government has really begun to get traction with the publication of Executive Order 14028 "Executive Order on Improving the Nation's Cybersecurity". This EO mentions the term "Zero Trust" 11 times and specifically states "The Federal Government must adopt security best practices and advance towards a Zero Trust Architecture".

The EO specifically required the head of each agency to develop a plan to implement Zero Trust Architecture, aligned with guidance published by NIST. It also required the agencies to provide reporting to the Director of Office Management & Budget (OMB) on the plans. There are also requirements to weave Zero Trust Architecture through the agencies cloud migration and maturity efforts as well. Subsequently a memo has pushed the EO to the National Security Systems (NSS) such as the Department of Defense (DoD) and Intelligence Community (IC). DoD is currently undergoing a pilot titled Thunderdome and has released a Reference Architecture, which is listed below. Federal agencies have begun to develop and implement plans to meet their respective ZT goals and requirements.

Table of contents

Definitions

To fully understand the context in which the Federal government views Zero Trust, we will completely lay out how they define it in the Cybersecurity EO

"The term “Zero Trust Architecture” means a security model, a set of system design principles, and a coordinated cybersecurity and system management strategy based on an acknowledgement that threats exist both inside and outside traditional network boundaries. The Zero Trust security model eliminates implicit trust in any one element, node, or service and instead requires continuous verification of the operational picture via real-time information from multiple sources to determine access and other system responses. In essence, a Zero Trust Architecture allows users full access but only to the bare minimum they need to perform their jobs. If a device is compromised, zero trust can ensure that the damage is contained. The Zero Trust Architecture security model assumes that a breach is inevitable or has likely already occurred, so it constantly limits access to only what is needed and looks for anomalous or malicious activity. Zero Trust Architecture embeds comprehensive security monitoring; granular risk-based access controls; and system security automation in a coordinated manner throughout all aspects of the infrastructure in order to focus on protecting data in real-time within a dynamic threat environment. This data-centric security model allows the concept of least-privileged access to be applied for every access decision, where the answers to the questions of who, what, when, where, and how are critical for appropriately allowing or denying access to resources based on the combination of sever."

Federal EO, Memos and Guidance

NIST

Vendor Specific Zero Trust Content

Forrester

Google

Microsoft

Amazon Web Services (AWS)

HashiCorp

Videos

Books

Newsletters

Creators

Chris Hughes

Thanks

Special thanks goes out to all of the Zero Trust pioneers who have contributed to this modernized approach to cybersecurity over the years. From the concept in a whitepaper, vendor specific implementations and pursuits all the way to those who have played a role it now being a published Federal strategy and implementation goal. Specically I would like to thank leaders like John Kindervag, Dr. Chase Cunningham, Jerry Chapman, Evan Gilman, Doug Barth and Jasob Garbis, who I've personally learned a lot from on the topic of Zero Trust.

federalzerotrust's People

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.