FB pixel

US federal agencies shift focus from perimeter to data to implement zero trust

US federal agencies shift focus from perimeter to data to implement zero trust
 

Data is the new security perimeter. That notion is the foundation of a new document from the U.S. executive branch on how agencies can adopt zero-trust cybersecurity practices.

The draft Federal Zero Trust Data Security Guide is a 42-page report that tells federal agencies how to define and secure the data they hold. More than 30 federal agencies and department participated in its development. The guide is accompanied by a 28-page volume of appendices that address how agencies can implement the guidance in their operations.

Cybersecurity Executive Order 14028 directed the move towards zero trust led to OMB M-22-09, on “Moving the U.S. Government Towards Zero Trust Cybersecurity Principles.” That memo mandated federal officials to develop the Zero Trust Data Security Guide.

The guide’s release comes just ahead of the November 7 deadline for federal agencies to submit their zero-trust implementation plans to the Office of the National Cyber Director and the Office of Management and Budget.

The new guide begins with a case for the importance of data management for zero trust security, and an elucidation of zero trust data security principles.

Federal bodies are instructed to set up a data inventory and a data catalogue. The data catalogue is a distinct document to help users find a particular data asset, the companion document explains.

The guide also sets out essential identity, credential and access management (ICAM) practices, stating the importance of continuous monitoring, authentication, identity federation and single sign-on (SSO) systems.

The importance of access controls based on users’ role, attributes and context is explained, and the role of security operations centers in vulnerability monitoring and response is set out.

A section on data management has not yet been developed, and is left blank.

The appendix on ICAM notes the importance of the identity assurance levels (IALs) set by NIST in SP 800-63 for identity verification and validation. It also advises implementing the principle of least privilege and behavior analytics and adaptive authentication.

Zero trust adoption is picking up steam, motivated by fear of costly breaches, deepfakes and synthetic identities, but the U.S. is behind the curve, according to survey results released earlier this year by Ponemon and Entrust.

Related Posts

Article Topics

 |   |   |   |   |   | 

Latest Biometrics News

 

Biometrics back digital government gains around the world

Digital government was in the spotlight this week on Biometric Update with the release of the OECD rankings and a…

 

MOSIP delves into biometric data quality considerations

Biometric data quality was in focus at MOSIP Connect 2026 in Rabat, Morocco, from policies for ensuring good enrollment practices…

 

NIST nominee pressed on AI standards, facial recognition oversight

The Senate Committee on Commerce, Science and Transportation on Thursday considered the nomination of Arvind Raman to serve as Under…

 

Trulioo’s Hal Lonas on how he applies aeronautics principles to fighting fraud

Rocket science is routinely held up as the ultimate example of a highly complex discipline. But Trulioo’s Hal Lonas found…

 

Vouched donates MCP-I framework to Decentralized Identity Foundation

An announcement from Seattle-based Vouched says it has formally donated its Model Context Protocol – Identity (MCP-I) framework to the…

 

California’s OS-based age verification law challenges open-source community

California’s new online safety bill, AB 1043 (the Digital Age Assurance Act), adopts a declared age model for operating systems….

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events