FB pixel

US federal agencies shift focus from perimeter to data to implement zero trust

US federal agencies shift focus from perimeter to data to implement zero trust
 

Data is the new security perimeter. That notion is the foundation of a new document from the U.S. executive branch on how agencies can adopt zero-trust cybersecurity practices.

The draft Federal Zero Trust Data Security Guide is a 42-page report that tells federal agencies how to define and secure the data they hold. More than 30 federal agencies and department participated in its development. The guide is accompanied by a 28-page volume of appendices that address how agencies can implement the guidance in their operations.

Cybersecurity Executive Order 14028 directed the move towards zero trust led to OMB M-22-09, on “Moving the U.S. Government Towards Zero Trust Cybersecurity Principles.” That memo mandated federal officials to develop the Zero Trust Data Security Guide.

The guide’s release comes just ahead of the November 7 deadline for federal agencies to submit their zero-trust implementation plans to the Office of the National Cyber Director and the Office of Management and Budget.

The new guide begins with a case for the importance of data management for zero trust security, and an elucidation of zero trust data security principles.

Federal bodies are instructed to set up a data inventory and a data catalogue. The data catalogue is a distinct document to help users find a particular data asset, the companion document explains.

The guide also sets out essential identity, credential and access management (ICAM) practices, stating the importance of continuous monitoring, authentication, identity federation and single sign-on (SSO) systems.

The importance of access controls based on users’ role, attributes and context is explained, and the role of security operations centers in vulnerability monitoring and response is set out.

A section on data management has not yet been developed, and is left blank.

The appendix on ICAM notes the importance of the identity assurance levels (IALs) set by NIST in SP 800-63 for identity verification and validation. It also advises implementing the principle of least privilege and behavior analytics and adaptive authentication.

Zero trust adoption is picking up steam, motivated by fear of costly breaches, deepfakes and synthetic identities, but the U.S. is behind the curve, according to survey results released earlier this year by Ponemon and Entrust.

Related Posts

Article Topics

 |   |   |   |   |   | 

Latest Biometrics News

 

Scottish public split over use of live facial recognition by Police Scotland

The Scottish public are split over the use of live facial recognition (LFR) technology by police in Scotland. LFR uses…

 

Biometric verification slowing cash transfer program in Nigeria

The Nigerian government is handing out cash to 2.3 million households under a scheme that relies on biometric verification. It’s…

 

African Digital Identity Hackathon winners present diverse ideas: ID4Africa 2025

The winners of the African Digital Identity Hackathon, organized by Carnegie Mellon University Africa’s Upanzi Network, took the stage during…

 

Police use of facial recognition continues to raise public concerns

Should police use facial recognition technology? Two-thirds of Milwaukee’s Common Council says no. An article in the Milwaukee Journal-Sentinel says…

 

EU calls for public feedback on European Business Wallet

The European Commission has issued a call for feedback on the EU Business Wallet, a digital identity wallet intended for…

 

Strategies to get the most out of digital identity in focus at ID4Africa 2025

Making digital identity useful is one of the key themes of ID4Africa’s 2025 AGM in Addis Ababa, Ethiopia, and a…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events