After a number of high-profile incidents, cybersecurity is now being recognized as an issue of national security. The need to establish dependable, secure access to Federal Government resources is more apparent than ever before, and new and evolving policies make it clear that to do this, agencies must elevate their identity technologies and processes.
For example, under Executive Order 14028, identity, credential, and access management (ICAM) components have been designated “critical software.”1 In addition, Memorandum M-22-09 dictates requirements around how Civilian, Department of Defense and Intelligence Community agencies must implement Zero Trust Architecture (ZTA) and by when.
Zero Trust is the identity-centric security framework that assumes the network is hostile and that users cannot be implicitly trusted. It embodies the risk-based, adaptable approach that agencies need in order to offer not just dependable, but also secure access to resources.
Unfortunately, many agencies struggle with this due to a long history of fragmented ICAM infrastructures. Disparate authentication systems have made it challenging for agencies to offer that dependable access to resources. And even if they have overcome that challenge, the legacy technologies at the core of ICAM infrastructures do not enable the sophisticated authentication and access mechanisms needed to improve the security of those processes.
With the evolution of modern, standards-based identity solutions that can easily plug into established environments, implementing ZTA—without needing to rip and replace existing ICAM infrastructures—is no longer the pipe dream it has been in the past.
Read on to learn:
What is ICAM and the history behind it
Why traditional ICAM approaches resulted in fragmented, siloed identity infrastructures
How agencies can pave the way for ZTA by modernizing three ICAM components