Facebook Twitter Instagram
    • Privacy Policy
    • Contact Us
    Facebook Twitter Instagram Pinterest Vimeo
    AI Home SecurityAI Home Security
    • Home
    • Home Security
    • Cyber Security
    • Biometric Technology
    Contact
    AI Home SecurityAI Home Security
    Home Security

    Amazon, other Pentagon cloud service providers face zero-trust test

    justmattgBy justmattgJanuary 21, 2023No Comments3 Mins Read

    [ad_1]

    WASHINGTON — Hackers backed by the U.S. Department of Defense will attack networks run by Amazon, Google, Microsoft and Oracle to better understand zero-trust cybersecurity in commercial cloud environments.

    So-called red teams of ethical hackers from the National Security Agency will test the digital strength of the four cloud service providers, or CSPs, starting in the spring. The Defense Department in December selected the companies for its $9 billion Joint Warfighting Cloud Capability, a follow-up to the failed $10 billion Joint Enterprise Defense Infrastructure arrangement.

    “We’re going to have the NSA red team, and perhaps even service red teams, attack,” Zero Trust Portfolio Management Office Director Randy Resnick said at a Jan. 19 event hosted by Billington Cybersecurity. “That would be a realistic adversary attack, a controlled attack, and we would determine whether or not the red teams could get and exploit data.”

    The operation — of mutual agreement and not a requirement tied to the JWCC deal — will inform how the Defense Department proceeds with zero trust. It could also prove the vigor of the cloud providers and lay the foundation for future zero-trust-enabled storage and computing.

    Unlike older cybersecurity models, zero trust assumes networks are always at risk or are already comprised. The new paradigm, as a result, is inherently distrustful and requires constant validation of users, devices and general access.

    Resnick previously described the concept as enhanced home security: “We have identified the items of value within the house, and we’ve placed guards and locks with each one of those items inside the house, as well.”

    Amazon, Google, Microsoft and Oracle each told the Defense Department they could instate at least basic levels of zero trust, according to Resnick.

    RELATED
    A view of an art installation made by the Argentine conceptual artist Leandro Erlich, in the framework of his exhibition entitled "A Tension," at the Centro Cultural Banco do Brasil in Belo Horizonte, Brazil.

    “To our satisfaction, at least on paper, they said to us that all of them could meet target-level zero trust and that many of them could approach almost the entirety, if not the entirety, of full zero trust, which we’re calling advanced,” Resnick said.

    “What we plan on doing,” he added, “is actually testing their assertions.”

    Zero trust implementation comprises a little more than 150 activities, which were detailed in the Defense Department’s related strategy, published in November.

    The Pentagon hopes to institute the lower threshold, 91 activities, by 2027. The department has since 2015 experienced more than 12,000 cyber incidents, according to a Government Accountability Office evaluation.

    “Our objective in the DoD … is to stop the adversary from exploiting our data,” Resnick said Thursday. “In order to to do that, our North Star was to stop, contain, frustrate, limit lateral movement of the adversary. That’s our success point.”

    An addendum to the Defense Department zero-trust strategy is in the works, following a cybersecurity summit involving the U.S. and its intelligence-sharing Five Eyes partners Australia, Canada, New Zealand and the U.K.

    Colin Demarest is a reporter at C4ISRNET, where he covers military networks, cyber and IT. Colin previously covered the Department of Energy and its National Nuclear Security Administration — namely Cold War cleanup and nuclear weapons development — for a daily newspaper in South Carolina. Colin is also an award-winning photographer.

    [ad_2]

    Source link

    Previous ArticleGamaredon Group Launches Cyberattacks Against Ukraine Using Telegram
    Next Article The biometrics technology shaping ticketing, payments, security, more
    justmattg
    • Website

    Related Posts

    Home Security

    Ultimate Guide To Best Security Cameras in 2024 | THSS

    March 21, 2024
    Home Security

    The Benefits of A Stun Baton | THSS

    February 24, 2024
    Home Security

    Keeping Your Pet Safe at Home | THSS

    February 17, 2024
    Add A Comment

    Leave A Reply Cancel Reply

    Facebook Twitter Instagram Pinterest
    • Privacy Policy
    • Contact Us
    AI Home Security © 2025 All rights reserved | Designed By ESmartsSolution

    Type above and press Enter to search. Press Esc to cancel.

    ↑