Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
    • By Category
      • AI/Hyperautomation
      • Cloud/Cloud Wars
      • Cybersecurity
      • Data
    • By Interest
      • Leadership
      • Office of the CFO
      • Partners Ecosystem
      • Sustainability
    • By Industry
      • Financial Services
      • Healthcare
      • Manufacturing
      • Retail
    • By Type
      • Courses
        • Understanding the New Executive Buying Committee
      • Guidebooks
      • Digital Summits
      • Practitioner Roundtables
    • By Language
      • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
Twitter Instagram
  • CIO Summit
  • Summit NA
  • Dynamics Communities
Twitter LinkedIn
Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
        • By Category
          • AI/Hyperautomation
          • Cloud/Cloud Wars
          • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
          • Data
        • By Interest
          • Leadership
          • Office of the CFO
          • Partners Ecosystem
          • Sustainability
        • By Industry
          • Financial Services
          • Healthcare
          • Manufacturing
          • Retail
        • By Type
          • Courses
            • Understanding the New Executive Buying Committee
          • Guidebooks
          • Digital Summits
          • Practitioner Roundtables
        • By Language
          • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
    • Login / Register
Acceleration Economy
    • Login / Register
Home » How Biden Cybersecurity Strategy Leans On Zero Trust, Cloud Software Providers
Cybersecurity as a Business Enabler

How Biden Cybersecurity Strategy Leans On Zero Trust, Cloud Software Providers

Bill DoerrfeldBy Bill DoerrfeldMarch 31, 20236 Mins Read
Facebook Twitter LinkedIn Email
national cybersecurity
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Retaining the online digital ecosystem’s integrity is paramount to the U.S. economy. However, that ecosystem’s safety has lately been under scrutiny, due to rising cyber threats and malicious actors working both domestically and abroad.

Software supply chain risks, known and unknown vulnerabilities, and a general lack of visibility into open-source software dependencies compound the issues. There’s also the chance of hackers working inside an organization, using stolen credentials, and exploiting known vulnerabilities.

To respond to these national cyber risks, the Biden-⁠Harris administration recently unveiled an updated National Cybersecurity Strategy. Announced on March 2, 2023, the presidential decree aims to increase cybersecurity defense for critical U.S. infrastructure. The strategy incorporates tenets from several Executive Orders (EOs) issued within the Biden term and outlines how to standardize cybersecurity practices across agencies.

The National Cybersecurity Strategy will not only raise the bar for government agencies but also for businesses contracting with the U.S. government, as well as its partners and allies. Most notably, the strategy stresses that the market must shift security responsibility from end users and small businesses to cloud software providers — as well as hold them more accountable for breaches. It’s also evident that a zero-trust approach will be necessary to meet these secure-by-design requirements.

Which companies are the most important vendors in cybersecurity? Check out
the Acceleration Economy Cybersecurity
Top 10 Shortlist
.

5 Key Takeaways From the Strategy

Our digital technologies can connect society and be used for good, but unfortunately, they also can have darker repercussions. They can enable transnational repression, disinformation, stolen data, harassment and abuse, ransomware, and criminal enterprises. To counteract these threats, the National Cybersecurity Strategy aims to set forth more defensible, resilient, and values-aligned measures. 

“We must make fundamental shifts in how the United States allocates roles, responsibilities, and resources in cyberspace,” says the Strategy. These fundamental shifts include moving responsibility to larger organizations most equipped to secure identity, making sound long-term security investments, and encouraging global participation.

The Strategy is organized into five pillars, summarized below.

1. Defend Critical Infrastructure: The plan recognizes that “too much of the responsibility for cybersecurity has fallen on individual users and small organizations.” As such, the organizations best equipped to manage cybersecurity will come to bear more responsibility. This will be enacted through sector-specific regulations and cybersecurity requirements in critical sectors, like oil and gas, water, aviation, and rail.

2. Disrupt and Dismantle Threat Actors: The strategy aims to disrupt adversaries that threaten digital systems. This means responding to cyber incidents like ransomware, prosecuting criminals, and even imposing sanctions on threatening nation-states. This will involve increasing intelligence regarding vulnerabilities and knowledge sharing among the public and private sectors.

3. Shape Market Forces to Drive Security and Resilience: Next, the strategy stresses the need to shape market forces by holding software providers more accountable for protecting the privacy and security of personal data. Other actions include mandating the use of Software Bill of Materials (SBOMs) and establishing Internet of Things (IoT) security labels to uphold accountability.

4. Invest in a Resilient Future: The federal government will also focus on reducing systemic technical vulnerabilities by prioritizing cybersecurity research and development. Some actions include more proactive vulnerability identification, investing in quantum-resistant cryptography, securing our clean energy future, and supporting strong digital identity ecosystems.

5. Forge International Partnerships to Pursue Shared Goals: Lastly, the strategy outlines the U.S.’s goals to collaborate with partner nations on strengthening global cybersecurity. One example initiative is the Declaration for the Future of the Internet. At the time of this writing, 60 member countries have signed the Declaration to promote a “common, democratic vision for an open, free, global, interoperable, reliable, and secure digital future.”

Securing Multi-Cloud Ecosystems Guidebook
Guidebook: Securing Multi-Cloud Ecosystems

Focus On Zero Trust 

Many of the above objectives will hinge on developing core information architectures that trust no one. Zero trust architecture (ZTA) assumes that threats may originate from within a network, and thus treats any request to a system with the same level of scrutiny, regardless of whether it’s an internal employee, external user, device, or server.

The National Cybersecurity Strategy recognizes zero trust as critical to modernizing connected digital systems. “This Administration is committed to improving Federal cybersecurity through long-term efforts to implement a zero trust architecture strategy and modernize IT and OT infrastructure,” it says.

The strategy document goes on to direct agencies “to implement multi-factor authentication, encrypt their data, gain visibility into their entire attack surface, manage authorization and access, and adopt cloud security tools.” Zero-trust principles have also arisen as requirements in EO 14028, “Improving the Nation’s Cybersecurity,” and the National Institute of Standards and Technology’s Secure Software Development Framework.

As one can see, a zero-trust approach incorporates many elements. And it’s good to recognize that zero trust cannot be orchestrated with a single technology but instead necessitates a cultural shift. Frank Domizio, Acceleration Economy cybersecurity practitioner analyst, explains it this way: “Zero trust is not a product that can be bought, a service that can be installed, or a server to put in a rack.” As such, organizations must take a comprehensive approach to instill the creed of “never trust, always verify” into all applications and remove legacy systems that cannot conform to a ZTA.

Final Thoughts: Trust No One

The risks facing digital ecosystems are countless. But most harrowing is the possibility of malicious actors disrupting critical infrastructure, like power plants, water management, or aviation systems. Too often, the underlying structural components of these systems and the cloud services integrated into them do not always embrace a zero-trust approach necessary that effectively thwart abuse. As such, the strategy places the onus on service providers, especially large cloud and software vendors, to fortify their systems.

“Holding vendors liable for software insecurity is a laudable goal and very likely to motivate action,” said Jon Geater, Chief Product, and Technology Officer at RKVST, a leading provider of supply chain integrity, transparency, and trust. However, the devil is in the details, and identifying the origin of security issues still will require additional forethought. “We need to make sure that the whole software and data supply chain is traceable and provable in order to efficiently demonstrate fault and bring issues to a conclusion quickly.”

Yet, not all agree that placing responsibility on large software providers ultimately will benefit end consumers. “This approach isn’t productive and will translate into inflated pricing that gets passed down to consumers,” said cybersecurity expert Cyrus Walker. “You can spend billions on a system, but all it takes is one person to give away the password and it’s over. It’s not about who’s using the devices, it’s about who’s using them securely.”


Want more cybersecurity insights? Subscribe to the Cybersecurity as a Business Enabler channel:

Acceleration Economy Cybersecurity

data featured IoT Ransomware supply chain
Share. Facebook Twitter LinkedIn Email
Analystuser

Bill Doerrfeld

Tech Journalist
Editor-in-Chief

Areas of Expertise
  • Cybersecurity
  • Low Code/No Code
  • LinkedIn

Bill Doerrfeld, an Acceleration Economy Analyst focused on Low Code/No Code & Cybersecurity, is a tech journalist and API thought leader. Bill has been researching and covering SaaS and cloud IT trends since 2013, sharing insights through high-impact articles, interviews, and reports. Bill is the Editor in Chief for Nordic APIs, one the most well-known API blogs in the world. He is also a contributor to DevOps.com, Container Journal, Tech Beacon, ProgrammableWeb, and other presences. He's originally from Seattle, where he attended the University of Washington. He now lives and works in Portland, Maine. Bill loves connecting with new folks and forecasting the future of our digital world. If you have a PR, or would like to discuss how to work together, feel free to reach out at his personal website: www.doerrfeld.io.

  Contact Bill Doerrfeld ...

Related Posts

How to Implement Zero Trust For Remote Endpoints in the Enterprise

May 28, 2023

Innovation Profile: How IBM watsonx Helps Organizations Manage Data, AI, and Governance

May 26, 2023

Innovation Profile: Celonis Demos The Benefits of Generative AI, Object-Centric Process Mining

May 26, 2023

Innovation Profile: How the Endor Labs Platform Leverages Generative AI for Cybersecurity

May 26, 2023
Add A Comment

Comments are closed.

Recent Posts
  • How to Implement Zero Trust For Remote Endpoints in the Enterprise
  • How Celonis Makes Process Mining More Accessible: Embracing Generative AI, Partners
  • C3 AI’s Thomas Siebel on How Generative AI Applies to Business Apps, Impacts Workers
  • Innovation Profile: How Generative AI Enhances ServiceNow Platforms to Enable Better Customer Experiences
  • Innovation Profile: How IBM watsonx Helps Organizations Manage Data, AI, and Governance

  • 3X a week
  • Analyst Videos, Articles & Playlists
  • Exclusive Digital Business Content
This field is for validation purposes and should be left unchanged.
Most Popular Guidebooks

The Ethical and Workforce Impacts of Generative AI

May 26, 2023

Co-Creation and Growth With Professional Services

May 24, 2023

The Business Impact and Opportunity of Generative AI

May 16, 2023

Healthcare Industry Clouds

May 10, 2023

Advertisement
Acceleration Economy
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Advertising Opportunities
  • Do not sell my information
© 2023 Acceleration Economy.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?

Connect with

Login with Google Login with Windowslive

Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.