top of page
Writer's pictureKristen

From the White House: Final zero trust strategy published

Updated: Mar 10, 2022

NOTE: This article was originally shared from FedScoop. Reprinting portions here with additional information.


While this article is still specific to federal agencies, I believe that many/most miss the fact that this will cascade to companies providing a service to government agencies (federal and local), and then to consumer software. I do not think that product teams have this in their 2022-2024 roadmaps.


—There is nothing groundbreaking/new in any of these new documents; most of the referenced best practices have been published for more than a decade. This is an escalation and acknowledgment that there is not a full understanding of how to implement the standards and/or the staff to get it done. (Given the disconnect in survey responses and actual assessment results, most businesses do not realize how far off they are.)


If you do not read the article, a few specific call-outs....

Included in the new document are a number of concrete deadlines by which senior technology leaders must ensure certain security measures are enacted.
Within 60 days of the memorandum being issued, agencies must incorporate the additional requirements identified in the document and submit an implementation plan for fiscal 2022-2024 to OMB and CISA for review.

And...

According to the new guidance, agencies must also create reliable asset inventories through participation in CISA’s Continuous Diagnostics and Mitigation program. They must ensure also that endpoint detection and response tools meet CISA’s technical requirements and are deployed widely.

 
 

Republished from FedScoop, ©2022. All rights reserved. Portions reprinted with additional information and context provided inline.

תגובות


© 2018-2023 By Kristen Swearingen - swearingen.me | MiddleChild Tech | eruditeMETA. All rights reserved.

This publication may not be reproduced or distributed in any form with the author's prior written permission. It consists of opinions of the author's research and experience, which should not be construed as statements of fact. While the information contained in this publication has been created and cited where obtained from sources believed to be reliable, the author disclaims all warranties as to the accuracy, completeness, or adequacy of such information. Although this post and cited research may address legal and financial issues, the author does not provide legal or investment advice and its publication should not be construed as such. Your access and use of this publication is governed by the Usage Policy for swearingen.me | MiddleChild Tech | eruditeMETA,, respectively. The author prides his/her/their self on his/her/their reputation for independence and objectivity. The research and publication(s) are produced independently by its authors and organization without input or influence from any third party. For further information, see the Guiding Principles on Independence and Objectivity.

bottom of page