Strategies to Meet the US Presidential Executive Order for Zero Trust
The new U.S. Presidential Cybersecurity Executive Order for Zero Trust requires US Federal agencies to transition to a Zero Trust Architecture (ZTA). These new ZTA recommendations still do not effectively address the data security challenges. In this new Technology Brief we discuss the ramifications of this executive order and how to extend zero trust to the data itself.
Read this Technology Brief to learn:
- How traditional zero trust architecture addresses network and application security, not the data that sits behind them.
- How this zero trust 'blindspot' leaves agencies vulnerable to insider threats.
- The benefits of combining Multi-level Security and attributed-based access control (ABAC) to extend zero trust to safeguard sensitive and classified data.
- Solutions to fast track 'Zero Trust Data Security' to comply with mandates.