{"id":20661,"date":"2022-01-27T19:25:46","date_gmt":"2022-01-27T19:25:46","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=20661"},"modified":"2022-01-27T19:25:46","modified_gmt":"2022-01-27T19:25:46","slug":"white-house-zero-trust-cybersecurity-strategy","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/white-house-zero-trust-cybersecurity-strategy\/","title":{"rendered":"White House Boosts Zero Trust with New Cybersecurity Strategy"},"content":{"rendered":"<p>The Biden Administration is pushing federal agencies to adopt a <a href=\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/\">zero-trust security architecture<\/a> to protect themselves and their data from \u201cincreasingly sophisticated and persistent threat campaigns,\u201d according to a new strategy issued this week by the Office of Management and Budget (OMB).<\/p>\n<p>According to the White House <a href=\"https:\/\/www.whitehouse.gov\/wp-content\/uploads\/2022\/01\/M-22-09.pdf\">order<\/a>, agencies have until the end of the government\u2019s fiscal year 2024 to reach the target goals laid out in the strategy and based on a zero-trust model developed by the U.S. Cybersecurity and Infrastructure Security Agency (CISA).<\/p>\n<p>The 29-page memorandum from Acting OBM Director Shalanda Young comes less than a year after President Biden issued his <a href=\"https:\/\/www.esecurityplanet.com\/networks\/cisa-fbi-colonial-pipeline-ransomware\/\">executive order<\/a> calling for the improvement of the government\u2019s cybersecurity posture in the wake of a series of attacks that impacted agencies and endangered critical infrastructure, including those on <a href=\"https:\/\/www.esecurityplanet.com\/threats\/guarding-against-solorigate-ttps-solarwinds-hack\/\">SolarWinds<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/trends\/colonial-pipeline-ransomware-attack\/\">Colonial Pipeline<\/a>.<\/p>\n<p>An initial draft of the plan was released in September to gather public input, including from the cybersecurity industry.<\/p>\n<p>\u201cIn the current threat environment, the Federal Government can no longer depend on conventional perimeter-based defenses to protect critical systems and data,\u201d Young wrote. \u201cA transition to a \u2018zero trust\u2019 approach to security provides a defensible architecture for this new environment. &#8230; It is a dramatic paradigm shift in philosophy of how we secure our infrastructure, networks, and data, from verify once at the perimeter to continual verification of each user, device, application, and transaction.\u201d<\/p>\n<p>See the <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">Best Zero Trust Security Solutions<\/a><\/p>\n<h2><strong>Zero Trust Gains Momentum<\/strong><\/h2>\n<p>Zero-trust architecture efforts have gained momentum in an IT environment that is increasingly distributed and mobile, located not only within corporate data centers but increasingly spread among mobile devices, the <a href=\"https:\/\/www.esecurityplanet.com\/products\/cloud-security-companies\/\">cloud<\/a> and the <a href=\"https:\/\/www.esecurityplanet.com\/networks\/sase\/\">edge<\/a>.<\/p>\n<p>Central to a zero-trust architecture is the premise that anything and anyone trying to access a network or infrastructure cannot be trusted and must be verified, and that they must be continuously verified throughout the transaction \u2013 and given access to no more than the resources they need. <a href=\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-software\/\">Microsegmentation<\/a> has been one of the critical tools used to achieve zero trust, carving networks into small segments to limit risk.<\/p>\n<p>Zero trust is a fast-growing security technology, with KBY Research analysts predicting the market will grow an average of 18.8 percent a year through 2026, when it will <a href=\"https:\/\/www.kbvresearch.com\/zero-trust-security-market\/\">hit $54.6 billion<\/a>.<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-implement-microsegmentation\/\">How to Implement Microsegmentation<\/a><\/p>\n<h2><strong>Support for Zero Trust<\/strong><\/h2>\n<p>The government\u2019s embrace of a zero-trust strategy was applauded by many in the cybersecurity field.<\/p>\n<p>\u201cZero trust is becoming table stakes for organizations to protect themselves online,\u201d John Engates, field CTO for Cloudflare, a web infrastructure and security company, told <em>eSecurity Planet<\/em>. The &#8220;directive from the White House signals that the federal government is taking cybersecurity threats seriously and is adopting a strategy that will better protect the nation\u2019s cyber infrastructure, and by extension, United States national security. Zero trust shouldn\u2019t be seen as just another product or industry buzzword \u2013 it&#8217;s a fundamental shift in security philosophy.\u201d<\/p>\n<h1><strong>Zero trust is a fundamental shift in security philosophy<\/strong><\/h1>\n<p>The FIDO Alliance, an open industry alliance aimed at creating improved authentication technologies that <a href=\"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/\">reduce the reliance on passwords<\/a>, also <a href=\"https:\/\/fidoalliance.org\/media-alert-the-fido-alliance-endorses-the-office-of-management-and-budgets-finalized-zero-trust-strategy\/\">endorsed the government\u2019s zero-trust strategy<\/a>, with alliance Executive Director Andrew Shikiar in a statement zeroing in on the requirement for using phishing-resistant authentication tools to protect against phishing attacks, with some becoming sophisticated enough to get around such even <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/multi-factor-authentication\/\">multi-factor authentication (MFA)<\/a> technologies.<\/p>\n<p>Tim Erlin, vice president of strategy at cybersecurity vendor Tripwire, told <em>eSecurity Planet<\/em> that shifting the entire government to a zero-trust architecture is an important but difficult task. That said, the strategy falls short in a couple of crucial ways.<\/p>\n<p>\u201cIt\u2019s unfortunate that this memorandum doesn\u2019t provide a clearer role for what NIST identifies as one of the key tenets for zero trust: integrity monitoring,\u201d Erlin said. \u201cDocuments from both CISA and NIST include integrity monitoring as a key component of zero trust, but the OMB memorandum doesn\u2019t include similar treatment.\u201d<\/p>\n<p>He also said that focusing so much on <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">endpoint detection and response (EDR)<\/a> \u2013 which is evolving into <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-mdr-solutions\/\">managed detection and response (MDR)<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/products\/xdr-security-solutions\/\">extended detection and response (XDR)<\/a> \u2013 may create an over-reliance on a technology that is already morphing into something newer and more comprehensive.<\/p>\n<h2><strong>Verification Over Trust<\/strong><\/h2>\n<p>According to the OMB memorandum, the goal is to get to a point where employees have enterprise-managed accounts that give them access to the applications and data they need while protecting them from outside threats, where the devices they use are consistently tracked and monitored, and where agency systems are isolated from each other.<\/p>\n<p>In addition, enterprise applications will be tested internally and externally and made available in a secure manner over the internet.<\/p>\n<p>\u201cA key tenet of a zero trust architecture is that no network is implicitly considered trusted \u2013 a principle that may be at odds with some agencies\u2019 current approach to securing networks and associated systems,\u201d Young wrote. \u201cAll traffic must be encrypted and authenticated as soon as practicable.\u201d<\/p>\n<p>The strategy will rely on five complementary pillars outlined in a zero-trust maturity model developed by CISA. The strategic goals include:<\/p>\n<ul>\n<li>enterprise-managed identities to access applications<\/li>\n<li>a complete inventory of devices authorized and used<\/li>\n<li>the ability to respond to and prevent incidents on those devices<\/li>\n<li>networks encrypting all DNS requests and HTTP traffic<\/li>\n<li>creating isolated environments<\/li>\n<\/ul>\n<p>In addition, all applications will be treated as internet-connected and consistently tested, and agencies will use data categorization as well as leverage cloud security services to monitor access to sensitive data. There also will be enterprise-wide logging and information-sharing.<\/p>\n<p>See also: <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/cnap-platforms-the-next-evolution-of-cloud-security\/\">CNAP Platforms: The Next Evolution of Cloud Security<\/a><\/p>\n<h2><strong>Fast Tracking Cybersecurity<\/strong><\/h2>\n<p>Government agencies now have 30 days to designate a lead for implementing the strategy within their organization and 60 days to submit an <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-implement-zero-trust\/\">implementation plan<\/a> to OMB.<\/p>\n<p>\u201cWhile the concepts behind zero trust architectures are not new, the implications of shifting away from \u2018trusted networks\u2019 are new to most enterprises, including many agencies,\u201d Young wrote. \u201cThis process will be a journey for the Federal Government, and there will be learning and adjustments along the way as agencies adapt to new practices and technologies.\u201d<\/p>\n<p>CISA Director Jen Easterly said in a <a href=\"https:\/\/www.whitehouse.gov\/omb\/briefing-room\/2022\/01\/26\/office-of-management-and-budget-releases-federal-strategy-to-move-the-u-s-government-towards-a-zero-trust-architecture\/\">statement<\/a> that \u201cas our adversaries continue to pursue innovative ways to breach our infrastructure, we must continue to fundamentally transform our approach to federal cybersecurity. Zero trust is a key element of this effort to modernize and strengthen our defenses. CISA will continue to provide technical support and operational expertise to agencies as we strive to achieve a shared baseline of maturity.\u201d<\/p>\n<p>Government officials pointed to attempts by <a href=\"https:\/\/www.esecurityplanet.com\/threats\/iran-based-apt35-group-exploits-log4j-flaw\/\">state-sponsored and other hacking groups<\/a> to exploit the <a href=\"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/\">flaw recently found in Log4j<\/a> as the latest example of threat actors trying to leverage new ways to get in the networks and other infrastructure of targets. The vulnerability \u2013 dubbed Log4Shell \u2013 is a significant threat because the Java logging tool is free and widely distributed, exposing large numbers of servers and cloud services to a vulnerability that is easily exploitable. <a href=\"https:\/\/www.esecurityplanet.com\/products\/threat-intelligence-platforms\/\">Threat intelligence<\/a> experts have found numerous incidents of cybercriminal groups trying to find ways to exploit the flaw since knowledge of it became public in early December.<\/p>\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">Top Vulnerability Management Tools<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6eb7f68fb0-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6eb7f68fb0\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6eb7f68fb0\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6eb7f68fb0\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6eb7f68fb0\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6eb7f68fb0\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6eb7f68fb0\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Biden Administration is pushing federal agencies to adopt a zero-trust security architecture to protect themselves and their data from \u201cincreasingly sophisticated and persistent threat campaigns,\u201d according to a new strategy issued this week by the Office of Management and Budget (OMB). According to the White House order, agencies have until the end of the [&hellip;]<\/p>\n","protected":false},"author":256,"featured_media":19537,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14,16],"tags":[30581],"b2b_audience":[33],"b2b_industry":[56],"b2b_product":[382,377],"class_list":["post-20661","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","category-trends","tag-zero-trust-security","b2b_audience-awareness-and-consideration","b2b_industry-government","b2b_product-application-security-vulnerability-management","b2b_product-gateway-and-network-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>White House Boosts Zero Trust with New Cybersecurity Strategy | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Zero trust is at the heart of a new government cybersecurity strategy, giving a boost to technologies like microsegmentation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/white-house-zero-trust-cybersecurity-strategy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"White House Boosts Zero Trust with New Cybersecurity Strategy | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Zero trust is at the heart of a new government cybersecurity strategy, giving a boost to technologies like microsegmentation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/white-house-zero-trust-cybersecurity-strategy\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-27T19:25:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/white-house-sunrise.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"530\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jeff Burt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Burt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/white-house-zero-trust-cybersecurity-strategy\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/white-house-zero-trust-cybersecurity-strategy\/\"},\"author\":{\"name\":\"Jeff Burt\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\"},\"headline\":\"White House Boosts Zero Trust with New Cybersecurity Strategy\",\"datePublished\":\"2022-01-27T19:25:46+00:00\",\"dateModified\":\"2022-01-27T19:25:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/white-house-zero-trust-cybersecurity-strategy\/\"},\"wordCount\":1196,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/white-house-zero-trust-cybersecurity-strategy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/white-house-sunrise.jpg\",\"keywords\":[\"zero trust security\"],\"articleSection\":[\"Networks\",\"Trends\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/white-house-zero-trust-cybersecurity-strategy\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/white-house-zero-trust-cybersecurity-strategy\/\",\"name\":\"White House Boosts Zero Trust with New Cybersecurity Strategy | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/white-house-zero-trust-cybersecurity-strategy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/white-house-zero-trust-cybersecurity-strategy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/white-house-sunrise.jpg\",\"datePublished\":\"2022-01-27T19:25:46+00:00\",\"dateModified\":\"2022-01-27T19:25:46+00:00\",\"description\":\"Zero trust is at the heart of a new government cybersecurity strategy, giving a boost to technologies like microsegmentation.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/white-house-zero-trust-cybersecurity-strategy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/white-house-zero-trust-cybersecurity-strategy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/white-house-zero-trust-cybersecurity-strategy\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/white-house-sunrise.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/white-house-sunrise.jpg\",\"width\":700,\"height\":530,\"caption\":\"white house cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/white-house-zero-trust-cybersecurity-strategy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"White House Boosts Zero Trust with New Cybersecurity Strategy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\",\"name\":\"Jeff Burt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"caption\":\"Jeff Burt\"},\"description\":\"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jburt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"White House Boosts Zero Trust with New Cybersecurity Strategy | eSecurity Planet","description":"Zero trust is at the heart of a new government cybersecurity strategy, giving a boost to technologies like microsegmentation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/white-house-zero-trust-cybersecurity-strategy\/","og_locale":"en_US","og_type":"article","og_title":"White House Boosts Zero Trust with New Cybersecurity Strategy | eSecurity Planet","og_description":"Zero trust is at the heart of a new government cybersecurity strategy, giving a boost to technologies like microsegmentation.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/white-house-zero-trust-cybersecurity-strategy\/","og_site_name":"eSecurity Planet","article_published_time":"2022-01-27T19:25:46+00:00","og_image":[{"width":700,"height":530,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/white-house-sunrise.jpg","type":"image\/jpeg"}],"author":"Jeff Burt","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Burt","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/white-house-zero-trust-cybersecurity-strategy\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/white-house-zero-trust-cybersecurity-strategy\/"},"author":{"name":"Jeff Burt","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e"},"headline":"White House Boosts Zero Trust with New Cybersecurity Strategy","datePublished":"2022-01-27T19:25:46+00:00","dateModified":"2022-01-27T19:25:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/white-house-zero-trust-cybersecurity-strategy\/"},"wordCount":1196,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/white-house-zero-trust-cybersecurity-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/white-house-sunrise.jpg","keywords":["zero trust security"],"articleSection":["Networks","Trends"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/white-house-zero-trust-cybersecurity-strategy\/","url":"https:\/\/www.esecurityplanet.com\/networks\/white-house-zero-trust-cybersecurity-strategy\/","name":"White House Boosts Zero Trust with New Cybersecurity Strategy | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/white-house-zero-trust-cybersecurity-strategy\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/white-house-zero-trust-cybersecurity-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/white-house-sunrise.jpg","datePublished":"2022-01-27T19:25:46+00:00","dateModified":"2022-01-27T19:25:46+00:00","description":"Zero trust is at the heart of a new government cybersecurity strategy, giving a boost to technologies like microsegmentation.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/white-house-zero-trust-cybersecurity-strategy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/white-house-zero-trust-cybersecurity-strategy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/white-house-zero-trust-cybersecurity-strategy\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/white-house-sunrise.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/white-house-sunrise.jpg","width":700,"height":530,"caption":"white house cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/white-house-zero-trust-cybersecurity-strategy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"White House Boosts Zero Trust with New Cybersecurity Strategy"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e","name":"Jeff Burt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","caption":"Jeff Burt"},"description":"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.","url":"https:\/\/www.esecurityplanet.com\/author\/jburt\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20661"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/256"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=20661"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20661\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/19537"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=20661"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=20661"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=20661"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=20661"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=20661"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=20661"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}