Pentagon trusted computing experts eye zero-trust architecture to improve critical information security

Oct. 12, 2020
The DOD Joint Information Environment (JIE) was developed to address inefficiencies of siloed architectures, and collapse network security boundaries.

WASHINGTON – The U.S. Department of Defense (DOD) is set to adopt an initial zero-trust architecture by the end of the calendar year, switching from a network-centric to a data-centric modern information security model. C4ISRnet reports. Continue reading original article

The Military & Aerospace Electronics take:

12 Oct. 2020 -- Zero trust means an organization does not inherently trust any user. Trust must be continually assessed and granted in a granular fashion. This allows defense agencies to create policies that provide secure access for users connecting from any device, in any location.

Understanding how the DOD will benefit from this new zero-trust security model involves the intent and weaknesses of the department’s current Joint Information Environment (JIE) architecture.

The JIE framework was developed to address inefficiencies of siloed architectures. The goal of developing one trusted-computing architecture with JIE was to collapse network security boundaries, reduce the DOD’s external attack surface and standardize management operations.

Related: Researchers seek to develop small, low-cost, and energy-efficient cryptography for IoT trusted computing

Related: Air Force trusted computing experts eye potential $950 million project for cyber enabling technologies

Related: Packet Forensics pursues DARPA trusted computing project to devise cyber security for network botnet attacks

John Keller, chief editor
Military & Aerospace Electronics

Voice your opinion!

To join the conversation, and become an exclusive member of Military Aerospace, create an account today!