אפס אמון היה עוזר למנוע דליפה של הפנטגון, אומר שרמן, CIO

אפס אמון היה עוזר למנוע דליפה של הפנטגון, אומר שרמן, CIO

צומת המקור: 2627997

BALTIMORE — The recent leak of national security documents would have been easier to discover and prevent had the U.S. Department of Defense already instituted the latest cybersecurity practices known as zero trust, according to Pentagon Chief Information Officer John Sherman.

The disclosure of the classified reports, allegedly spearheaded by a 21-year-old member of the Massachusetts Air National Guard, has prompted a hard look at the department’s information-security practices. The breach included insights about the ongoing Russia-Ukraine war.

Sherman on May 3 said a zero-trust approach “sure as heck would’ve made it a lot more likely that we would have caught this and been able to prevent it at the front end.” Prying eyes and ears are both an external threat — considering China, Russia and other nations — and an internal hazard.

“This is something we’ve grappled with for years,” אמר שרמן at the AFCEA TechNet Cyber conference in Baltimore. “We had the Snowden disclosures nearly 10 years ago. We’ve had other unfortunate events here.”

Edward Snowden was a former American intelligence contractor who in 2013 made public the existence of global surveillance dragnets. The U.S. government deemed him a traitor; he was later granted Russian citizenship.

אפס אמון הוא פרדיגמה אחרת לאבטחת סייבר, one which assumes networks are always at risk or already jeopardized, requiring constant validation of devices, users and their digital reach. Sherman previously likened zero trust to believing “no one or no thing.”

The Pentagon in November published its transition strategy, with eyes set on widespread implementation by fiscal 2027. Defense officials have said the timeline is challenging but doable.

Sherman’s remarks at the AFCEA conference echo those made by Navy Chief Technology Officer Don Yeske, who in April אמר ל-C4ISRNET the tenets of zero trust would have aided the department detect suspect behavior.

“You begin from the point of assuming your network has been compromised, and if it hasn’t been compromised, that compromise is inevitable,” Yeske said at the virtual C4ISRNET Conference. “Insider threats light up like a Christmas tree when that is your approach.”

The Pentagon last month announced it would conduct a comprehensive review of its policies and procedures. Sherman and Ronald Moultrie, the undersecretary of defense for intelligence and security, among others, are involved.

Initial results of the audit are expected within 45 days.

כתבת C4ISRNET קורטני אלבון תרמה למאמר זה.

קולין דמארסט הוא כתב ב-C4ISRNET, שם הוא מכסה רשתות צבאיות, סייבר ו-IT. קולין סיקר בעבר את משרד האנרגיה ואת המינהל הלאומי לביטחון גרעיני שלו - כלומר ניקוי המלחמה הקרה ופיתוח נשק גרעיני - עבור עיתון יומי בדרום קרוליינה. קולין הוא גם צלם עטור פרסים.

בול זמן:

עוד מ דיפנס ניוז אייר