Question Everything
A set of policies … would have identified, I believe, a pattern of activity here …
–Navy CTO Don Yeske
The US military is in the process of moving to a Zero Trust networking framework. But before they began that process in November, a Cape Cod-stationed National Guardsman leaked 350 classified documents over the course of between six and fourteen months before his detection and arrest. And Zero Trust – that enforces stringent policies or rules over permitted network activities – might have stopped the rogue airman sooner (he was serving as an IT admin without need to access those military secrets).
This type of breach is called an insider attack. Insider breaches make up 20% of all breaches. Zero Trust is useful to handle these and many of the other attacks that begin outside an organization’s network … [5 min. read]