Risks to Zero Trust in a Federated Mission Partner Environment

11/30/2022
by   Keith Strandell, et al.
0

Recent cybersecurity events have prompted the federal government to begin investigating strategies to transition to Zero Trust Architectures (ZTA) for federal information systems. Within federated mission networks, ZTA provides measures to minimize the potential for unauthorized release and disclosure of information outside bilateral and multilateral agreements. When federating with mission partners, there are potential risks that may undermine the benefits of Zero Trust. This paper explores risks associated with integrating multiple identity models and proposes two potential avenues to investigate in order to mitigate these risks.

READ FULL TEXT
research
09/22/2022

Zero Trust Federation: Sharing Context under User Control toward Zero Trust in Identity Federation

To securely control access to systems, the concept of Zero Trust has bee...
research
05/25/2023

Distributed Trust Through the Lens of Software Architecture

Distributed trust is a nebulous concept that has evolved from different ...
research
03/29/2021

Privacy and Trust Redefined in Federated Machine Learning

A common privacy issue in traditional machine learning is that data need...
research
09/18/2020

The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures

Public Key Infrastructures (PKIs) with their trusted Certificate Authori...
research
07/15/2019

Confidentiality and linked data

Data providers such as government statistical agencies perform a balanci...
research
10/15/2018

Review of Barriers for Federated Identity Adoption for Users and Organizations

A look at Identity as a Service (IDaaS) and Federated Identity Managemen...
research
12/21/2021

Exploring Spreadsheet Use and Practices in a Technologically Constrained Setting

This paper explores the impacts of spreadsheets on business operations i...

Please sign up or login with your details

Forgot password? Click here to reset