{"id":11454,"date":"2022-12-05T12:46:51","date_gmt":"2022-12-05T15:46:51","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=11454"},"modified":"2022-12-05T12:46:51","modified_gmt":"2022-12-05T15:46:51","slug":"ciberseguridad-us-dod-confianza-cero","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=11454","title":{"rendered":"Ciberseguridad, US DoD confianza cero"},"content":{"rendered":"<p>A diferencia de los modelos de ciberseguridad m\u00e1s antiguos, Zero Trust asume que las redes siempre est\u00e1n en riesgo o ya est\u00e1n comprometidas.\u00a0Como resultado, se requiere una validaci\u00f3n continua de usuarios, dispositivos y acceso. El director de inform\u00e1tica del Pent\u00e1gono, John Sherman, lo compar\u00f3 con confiar en &#8220;nadie o nada&#8221;.<\/p>\n<hr \/>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">WASHINGTON \u2014 The U.S. Department of Defense on Tuesday unveiled its zero-trust strategy and road map, highlighting how the department plans to shield sensitive information from prying eyes.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">The documents detail the more than 100 activities, capabilities and pillars needed to achieve zero trust,\u00a0<a href=\"https:\/\/www.c4isrnet.com\/cyber\/2022\/11\/08\/pentagon-to-unveil-zero-trust-cyber-strategy\/\" target=\"_blank\" rel=\"noopener\">a new paradigm for cybersecurity<\/a>. The strategy fits into a larger constellation of security planning that includes the recently released National Defense Strategy, officials said.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">\u201cIf we compare this to our home security, we can say that we traditionally lock our windows and doors, and that only those with a key can gain access,\u201d Randy Resnick, the director of the zero trust portfolio management office, told reporters Nov. 22. \u201cWith zero trust, we have identified the items of value within the house and we\u2019ve placed guards and locks with each one of those items inside the house, as well.\u201d<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">Unlike older cybersecurity models, zero trust assumes networks are always at risk or are already compromised. As a result, continuous validation of users, devices and access is required. Pentagon\u00a0<a href=\"https:\/\/www.federaltimes.com\/smr\/cloud\/2022\/11\/07\/pentagon-closing-in-on-9b-cloud-contract-award-after-scuttling-jedi\/\" target=\"_blank\" rel=\"noopener\">Chief Information Officer John Sherman<\/a>\u00a0has likened it to trusting \u201cno one or no thing.\u201d<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">The transition to segmentation and inherent distrust comes as the U.S. prepares for a potential fight against China or Russia \u2014 world powers with histories of cyber aggression. Russia has deployed cyberattacks against Ukraine in its latest invasion, Western authorities say, and China leverages the digital domain to siphon intellectual property for its own gains.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">The Defense Department has since 2015 experienced more than 12,000 cyber incidents, with yearly totals steadily declining since 2017, according to\u00a0<a href=\"https:\/\/www.gao.gov\/assets\/gao-23-105084.pdf\" target=\"_blank\" rel=\"noopener\">a Government Accountability Office evaluation<\/a>. The federal government in early October said hackers infiltrated a defense industrial base organization, maintained \u201cpersistent, long-term\u201d access to its network and absconded with sensitive data. The victim \u2014 most likely a defense contractor \u2014 was not named.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">\u201cCyber threats and attacks are evolving at an ever-increasing pace and requiring a coordinated, defensive response that is adaptive, flexible, and agile,\u201d the zero-trust strategy states. \u201cTraditional perimeter or \u2018castle-and-moat\u2019 security approaches based on conventional authentication and authorization models do not work effectively to thwart current (and future) cyber-attack vectors.\u201d<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">Defense officials previously imposed a five-year deadline to implement zero trust. The strategy maintains the fiscal 2027 timeline, which\u00a0<a href=\"https:\/\/www.c4isrnet.com\/cyber\/\" target=\"_blank\" rel=\"noopener\">cybersecurity leaders<\/a>\u00a0described as challenging but important.<\/p>\n<figure id=\"attachment_11456\" aria-describedby=\"caption-attachment-11456\" style=\"width: 1440px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" class=\"size-full wp-image-11456\" src=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/12\/VEAL3MWMW5B6TAQB24LGLQ5BWE.webp\" alt=\"\" width=\"1440\" height=\"806\" srcset=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/12\/VEAL3MWMW5B6TAQB24LGLQ5BWE.webp 1440w, https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/12\/VEAL3MWMW5B6TAQB24LGLQ5BWE-300x168.webp 300w, https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/12\/VEAL3MWMW5B6TAQB24LGLQ5BWE-1024x573.webp 1024w, https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/12\/VEAL3MWMW5B6TAQB24LGLQ5BWE-768x430.webp 768w\" sizes=\"(max-width: 1440px) 100vw, 1440px\" \/><figcaption id=\"caption-attachment-11456\" class=\"wp-caption-text\">This chart was included in the Pentagon&#8217;s zero-trust strategy. It provides a look at what the new approach to cybersecurity comprises. (Photo provided\/U.S. Department of Defense)<\/figcaption><\/figure>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">\u201cImplementation of our zero-trust goals, to include educating every corner of the department, is an ambitious undertaking,\u201d acting Principal Deputy Chief Information Officer David McKeown said. \u201cWe recognized that from the beginning, and that has driven our pace and informed our strategy.\u201d<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">The Defense Information Systems Agency in late July extended\u00a0<a href=\"https:\/\/www.defensenews.com\/cyber\/2022\/08\/02\/pentagons-secret-communications-network-to-get-upgrade-from-booz-allen\/\" target=\"_blank\" rel=\"noopener\">a zero-trust agreement known as Thunderdome\u00a0<\/a>with Booz Allen Hamilton, the 22nd largest defense contractor in the world by revenue, according to a Defense News analysis.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">DISA at the time cited lessons learned from Russia\u2019s attack on Ukraine and the need to further harden the Secure Internet Protocol Router Network, or SIPRNet, a means of relaying secrets.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">DISA, the Pentagon\u2019s lead IT agency, in January\u00a0<a href=\"https:\/\/www.c4isrnet.com\/industry\/2022\/10\/18\/booz-allen-completes-everwatch-purchase-challenged-by-us\/\" target=\"_blank\" rel=\"noopener\">awarded Booz Allen<\/a>\u00a0the $6.8 million contract to develop a Thunderdome prototype. The subsequent extension stretches the pilot to a full year, with completion now expected at the start of 2023.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">The Defense Department in 2021 decided to sunset Joint Regional Security Stacks in favor of the zero-trust Thunderdome approach, C4ISRNET reported.<\/p>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/www.c4isrnet.com\/cyber\/2022\/11\/22\/pentagon-publishes-zero-trust-cyber-strategy-eyes-2027-implementation\/\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/www.c4isrnet.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A diferencia de los modelos de ciberseguridad m\u00e1s antiguos, Zero Trust asume que las redes siempre est\u00e1n en riesgo o ya est\u00e1n comprometidas.\u00a0Como resultado, se&hellip; <\/p>\n","protected":false},"author":1,"featured_media":11455,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,23],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/11454"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=11454"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/11454\/revisions"}],"predecessor-version":[{"id":11457,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/11454\/revisions\/11457"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/11455"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=11454"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=11454"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=11454"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}