{"id":24336,"date":"2024-04-16T20:01:05","date_gmt":"2024-04-17T04:01:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/04\/16\/news-18066\/"},"modified":"2024-04-16T20:01:05","modified_gmt":"2024-04-17T04:01:05","slug":"news-18066","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/04\/16\/news-18066\/","title":{"rendered":"New Microsoft guidance for the DoD Zero Trust Strategy"},"content":{"rendered":"<p><strong>Credit to Author: Steve Faehl| Date: Tue, 16 Apr 2024 16:00:00 +0000<\/strong><\/p>\n<p>The Department of Defense (DoD) Zero Trust Strategy<sup>1 <\/sup>and accompanying execution roadmap<sup>2 <\/sup>sets a path for achieving enterprise-wide target-level Zero Trust by 2027. The roadmap lays out vendor-agnostic Zero Trust activities that DoD Components and Defense Industrial Base (DIB) partners should complete to achieve Zero Trust capabilities and outcomes.<\/p>\n<p>Microsoft commends the DoD for approaching Zero Trust as a mindset, not a capability or device that may be bought.<sup>1<\/sup> Zero Trust can\u2019t be achieved by a single technology, but through tight integration between solutions across product categories. Deciphering <em>how<\/em> security products achieve Zero Trust based on marketing materials alone is a daunting task. IT leaders need to select the right tools. Security architects need to design integrated solutions. Implementers need to deploy, configure, and integrate tools to achieve the outcomes in each Zero Trust activity.<\/p>\n<p>Today, we are excited to announce Zero Trust activity-level guidance for DoD Components and DIB partners implementing the DoD Zero Trust Strategy. To learn more, see <a href=\"https:\/\/aka.ms\/ZTforDoD\" target=\"_blank\" rel=\"noreferrer noopener\">Configure Microsoft cloud services for the DoD Zero Trust Strategy<\/a>.<\/p>\n<p>In this blog, we\u2019ll review the DoD Zero Trust Strategy and discuss how our new guidance helps DoD Components and DIB partners implement Zero Trust. We\u2019ll cover the Microsoft Zero Trust platform and relevant features for meeting DoD\u2019s Zero Trust requirements, and close with real-world DoD Zero Trust deployments.<\/p>\n<h2 class=\"wp-block-heading\" id=\"microsoft-supports-the-dod-s-zero-trust-strategy\">Microsoft supports the DoD\u2019s Zero Trust Strategy<\/h2>\n<p>The DoD released its formal Zero Trust Strategy in October 2022.<sup>1<\/sup> The strategy is a security framework and mindset that set a path for achieving Zero Trust. The strategy outlines strategic goals for adopting culture, defending DoD Information Systems, accelerating technology implementation, and enabling Zero Trust.<\/p>\n<p>The DoD Zero Trust Strategy includes <strong>seven pillars<\/strong> that represent protection areas for Zero Trust:<\/p>\n<ol>\n<li>User<\/li>\n<li>Device<\/li>\n<li>Applications and workloads<\/li>\n<li>Data<\/li>\n<li>Network<\/li>\n<li>Automation and orchestration<\/li>\n<li>Visibility and analytics<\/li>\n<\/ol>\n<p>In January 2023, the DoD published a capabilities-based execution roadmap for implementing Zero Trust.<sup>2<\/sup> The roadmap details<strong> 45 Zero Trust capabilities<\/strong> spanning the seven pillars. The execution roadmap details the Zero Trust activities DoD Components should perform to achieve each Zero Trust capability. There are <strong>152 Zero Trust activities<\/strong> in total, divided into <strong>Target Level Zero Trust <\/strong>and <strong>Advanced Level Zero Trust <\/strong>phases with deadlines of 2027 and 2032, respectively.<\/p>\n<p>The Zero Trust activity-level guidance we\u2019re announcing in this blog continues Microsoft\u2019s commitment to supporting DoD\u2019s Zero Trust strategy.<sup>3<\/sup> It serves as a reference for <em>how<\/em> DoD Components should implement Zero Trust activities using Microsoft cloud services. Microsoft product teams and security architects supporting DoD worked in close partnership to provide succinct, actionable guidance side-by-side with the DoD Zero Trust activity text and organized by product with linked references.<\/p>\n<p>We scoped the guidance to features available today (including public preview) for Microsoft 365 DoD and Microsoft Azure Government customers. As the security landscape changes, Microsoft will continue innovating to meet the needs of federal and DoD customers.<sup>4<\/sup> We\u2019re excited to bring entirely new Zero Trust technologies like <a href=\"https:\/\/www.microsoft.com\/security\/business\/ai-machine-learning\/microsoft-copilot-security\">Microsoft Copilot for Security<\/a> and Security Service Edge to United States Government clouds in the future.<sup>5<\/sup><\/p>\n<p>Look out for announcements in the Microsoft Security Blog and check Microsoft\u2019s <a href=\"https:\/\/aka.ms\/ZTforDoD\" target=\"_blank\" rel=\"noreferrer noopener\">DoD Zero Trust documentation<\/a> to see the latest guidance.<\/p>\n<h2 class=\"wp-block-heading\" id=\"microsoft-s-zero-trust-platform\">Microsoft\u2019s Zero Trust platform<\/h2>\n<p>Microsoft is proud to be recognized as a Leader in the Forrester Wave\u2122: Zero Trust Platform Providers, Q3 2023 report.<sup>6<\/sup> The <a href=\"https:\/\/www.microsoft.com\/security\/business\/zero-trust\/\">Microsoft Zero Trust platform<\/a> is a modern security architecture that emphasizes proactive, integrated, and automated security measures. <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/enterprise\/e5\">Microsoft 365 E5<\/a> combines best-in-class productivity apps with advanced security capabilities that span <strong>all seven pillars <\/strong>of the DoD Zero Trust Strategy.<\/p>\n<blockquote class=\"wp-block-quote blockquote\">\n<p>\u201cSingle products\/suites can be adopted to address multiple capabilities. Integrated vendor suites of products rather than individual components will assist in reducing cost and risk to the government.\u201d<\/p>\n<p> <cite>\u00a0\u2014Department of Defense Zero Trust Reference Architecture Version 2.0<em><sup>7<\/sup><\/em><\/cite><\/p><\/blockquote>\n<div class=\"wp-block-msxcm-kicker-container\">\n<div class=\" wp-block-msxcm-kicker-block wp-block-msxcm-kicker--align-left\" data-bi-an=\"Kicker Left\">\n<p class=\"wp-block-msxcm-kicker__title small text-neutral-400 text-uppercase\"> \t\t\tZero Trust Rapid Modernization Plan\t\t<\/p>\n<p> \t\t<a \t\t\tclass=\"wp-block-msxcm-kicker__cta btn btn-link p-0 text-decoration-none\" \t\t\thref=\"https:\/\/learn.microsoft.com\/en-us\/security\/zero-trust\/zero-trust-ramp-overview\" \t\t\ttarget=\"_blank\"\t\t> \t\t\t<span>Read more<\/span> <span class=\"glyph-append glyph-append-xsmall wp-block-msxcm-kicker__glyph glyph-append-go\"><\/span> \t\t<\/a> \t<\/div>\n<\/p><\/div>\n<p>Microsoft 365 is a comprehensive and extensible Zero Trust platform.<sup>8<\/sup> It\u2019s a hybrid cloud, multicloud, and multiplatform solution. Pre-integrated extended detection and response (XDR) services coupled with modern cloud-based device management, and a cloud-based identity and access management service, provide a direct and rapid modernization path for the DoD and DIB organizations.<\/p>\n<p>Read on to learn about Microsoft cloud services that support the DoD Zero Trust Strategy.<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/04\/Picture1-1-1024x534.webp\" alt=\"diagram\" class=\"wp-image-133979 webp-format\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/04\/Picture1-1-1024x534.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/04\/Picture1-1-300x157.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/04\/Picture1-1-768x401.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/04\/Picture1-1-1536x802.webp 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/04\/Picture1-1.webp 1604w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/04\/Picture1-1-1024x534.webp\"><\/figure>\n<p><em>Figure 1. Microsoft Zero Trust Architecture.<\/em><\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/business\/identity-access\/microsoft-entra-id\"><strong>Microsoft Entra ID<\/strong><\/a> is an integrated multicloud identity and access management solution and identity provider. Microsoft Entra ID is tightly integrated with Microsoft 365 and Microsoft Defender XDR services to provide a comprehensive suite Zero Trust capabilities including strict identity verification, enforcing least privilege, and adaptive risk-based access control.<\/p>\n<p>Microsoft Entra ID is built for cloud-scale, handling billions of authentications every day. It uses industry standard protocols and is designed for both Microsoft and non-Microsoft apps. Establishing Microsoft Entra ID as your organization\u2019s Zero Trust identity provider lets you configure, enforce, and monitor adaptive Zero Trust access policies in a single location. Conditional Access is the Zero Trust authorization engine for Microsoft Entra ID. It enables dynamic, adaptive, fine-grained, risk-based, access policies for any workload.<\/p>\n<p>Microsoft Entra ID is essential to the <em>user<\/em> pillar and has a role in all other pillars of the DoD Zero Trust Strategy.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/business\/endpoint-management\/microsoft-intune\"><strong>Microsoft Intune<\/strong><\/a><strong> <\/strong>is a multiplatform endpoint and application management suite for Windows, MacOS, Linux, iOS, iPadOS, and Android devices. Microsoft Intune configuration policies manage devices and applications. <a href=\"https:\/\/www.microsoft.com\/security\/business\/endpoint-security\/microsoft-defender-endpoint\">Microsoft Defender for Endpoint<\/a> helps organizations prevent, detect, investigate, and respond to advanced threats on devices. Microsoft Intune and Defender for Endpoint work together to enforce security policies, assess device health, vulnerability exposure, risk level, and configuration compliance status. Conditional Access policies requiring a compliant device help achieve comply-to-connect &nbsp;outcomes in the DoD Zero Trust Strategy.<\/p>\n<p>Microsoft Intune and Microsoft Defender for Endpoint help achieve capabilities in the <em>device<\/em> pillar.<\/p>\n<p><a href=\"https:\/\/docs.github.com\/en\/get-started\/start-your-journey\/about-github-and-git\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>GitHub<\/strong><\/a><strong> <\/strong>is a cloud-based platform where you can store, share, and work together with others to write code. GitHub Advanced Security includes features that help organizations improve and maintain code by providing code scanning, secret scanning, security checks, and dependency review throughout the deployment pipeline. <a href=\"https:\/\/www.microsoft.com\/security\/business\/identity-access\/microsoft-entra-workload-id\">Microsoft Entra Workload ID<\/a> helps organizations use continuous integration and continuous delivery (CI\/CD) with GitHub Actions.<\/p>\n<p>GitHub and Azure DevOps are essential to the <em>applications and workloads<\/em> pillar.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-purview\"><strong>Microsoft Purview<\/strong><\/a><strong> <\/strong>is a range of solutions for unified data security, data governance, and risk and compliance management. <a href=\"https:\/\/www.microsoft.com\/security\/business\/information-protection\/microsoft-purview-information-protection\">Microsoft Purview Information Protection<\/a> lets you define and label sensitive information types. Auto-labeling within Microsoft 365 clients ensure data is appropriately labeled and protected. <a href=\"https:\/\/www.microsoft.com\/security\/business\/information-protection\/microsoft-purview-data-loss-prevention\">Microsoft Purview Data Loss Prevention<\/a> integrates with Microsoft 365 services and apps, and Microsoft Defender XDR components to detect and prevent data loss.<\/p>\n<p>Microsoft Purview features align to the <em>data<\/em> pillar activities.<\/p>\n<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/networking\/fundamentals\/networking-overview\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Azure networking services<\/strong><\/a><strong> <\/strong>include a range of software-defined network resources that can be used to provide networking capabilities for connectivity, application protection, application delivery, and network monitoring. Azure networking resources like Microsoft Azure Firewall Premium, Azure DDoS Protection, Microsoft Azure Application Gateway, Azure API Management, Azure Virtual Network, and Network Security Groups, all work together to provide routing, segmentation, and visibility into your network.<\/p>\n<p>Azure networking services and network segmentation architectures are essential to the <em>network<\/em> pillar.<\/p>\n<div class=\"wp-block-msxcm-kicker-container\">\n<div class=\" wp-block-msxcm-kicker-block wp-block-msxcm-kicker--align-right\" data-bi-an=\"Kicker Right\">\n<p class=\"wp-block-msxcm-kicker__title small text-neutral-400 text-uppercase\"> \t\t\tAutomate threat response with playbooks in Microsoft Sentinel\t\t<\/p>\n<p> \t\t<a \t\t\tclass=\"wp-block-msxcm-kicker__cta btn btn-link p-0 text-decoration-none\" \t\t\thref=\"https:\/\/learn.microsoft.com\/en-us\/azure\/sentinel\/automate-responses-with-playbooks\" \t\t\ttarget=\"_blank\"\t\t> \t\t\t<span>Learn more<\/span> <span class=\"glyph-append glyph-append-xsmall wp-block-msxcm-kicker__glyph glyph-append-go\"><\/span> \t\t<\/a> \t<\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/business\/siem-and-xdr\/microsoft-defender-xdr\"><strong>Microsoft Defender XDR<\/strong><\/a><strong> <\/strong>is a unified pre- and post-breach enterprise defense suite that natively coordinates detection, prevention, investigation, and response actions. It correlates millions of signals across endpoints, identities, email, and applications to automatically disrupt attacks. Microsoft Defender XDR\u2019s automated investigation and response and Microsoft Sentinel playbooks are used to complete security orchestration, automation, and response (SOAR) activities.<\/p>\n<p>Microsoft Defender XDR plays a key role in <em>automation and orchestration<\/em> and <em>visibility and analytics<\/em> pillars.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/business\/siem-and-xdr\/microsoft-sentinel\"><strong>Microsoft Sentinel<\/strong><\/a> is a cloud-based security information and event management (SIEM) you deploy in Azure. Microsoft Sentinel operates at cloud scale to accelerate security response and save time by automating common tasks and streamlining investigations with incident insights. Built-in data connectors make it easy to ingest security logs from Microsoft 365, Microsoft Defender XDR, Microsoft Entra ID, Azure, non-Microsoft clouds, and on-premises infrastructure.<\/p>\n<p>Microsoft Sentinel is essential to <em>automation and orchestration<\/em> and <em>visibility and analytics<\/em> pillars along with any activities requiring SIEM integration.<\/p>\n<h2 class=\"wp-block-heading\" id=\"real-world-pilots-and-implementations\">Real-world pilots and implementations<\/h2>\n<p>The DoD is embracing Zero Trust as a continuous modernization effort. Microsoft has partnered with DoD Components for several years, onboarding Microsoft 365 services, integrating apps with Microsoft Entra, migrating Azure workloads, managing devices with Microsoft Intune, and building security operations around Microsoft Defender XDR and Microsoft Sentinel.<\/p>\n<p>One such example is the United States Navy\u2019s innovative Flank Speed program. The Navy\u2019s large-scale deployment follows Zero Trust capabilities put forth in the DoD\u2019s strategy. These capabilities include comply-to-connect, continuous authorization, least-privilege access, and data-centric security controls.<sup>9<\/sup> To date, Flank Speed has onboarded more than 560,000 users and evaluated the effectiveness of its robust cybersecurity tools through Purple Team assessments.<sup>10<\/sup><\/p>\n<p>Another example is Army 365, the United States Army\u2019s Microsoft 365 environment.<sup>11<\/sup> Army 365 has onboarded more than 1.4 million users and migrated petabytes of data.<sup>12<\/sup> The secure collaboration environment incorporates Zero Trust principles in a secure collaboration environment with identity and device protections and includes support for bring your own device (BYOD) through Azure Virtual Desktop.<sup>13<\/sup><\/p>\n<div class=\"wp-block-msxcm-cta-block\" data-moray data-bi-an=\"CTA Block\">\n<div class=\"card d-block mx-ng mx-md-0\">\n<div class=\"row no-gutters material-color-brand-dark\">\n<div class=\"d-flex col-md\">\n<div class=\"card-body align-self-center p-4 p-md-5\">\n<h2>DoD Zero Trust Strategy and Roadmap<\/h2>\n<div class=\"mb-3\">\n<p>Learn how to configure Microsoft cloud services for the DoD Zero Trust Strategy.<\/p>\n<\/p><\/div>\n<div class=\"link-group\"> \t\t\t\t\t\t\t<a href=\"https:\/\/aka.ms\/ZTforDoD\" class=\"btn btn-primary bg-body text-body\" target=\"_blank\"> \t\t\t\t\t\t\t\t<span>Learn more<\/span> \t\t\t\t\t\t\t\t<span class=\"glyph-append glyph-append-chevron-right glyph-append-xsmall\"><\/span> \t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-md-4\"> \t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/04\/MSC24-China-business-Getty-1469706272-rgb-1024x1024.jpg\" class=\"card-img img-object-cover\" alt=\"MSC24-China-business-Getty-1469706272-rgb\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/04\/MSC24-China-business-Getty-1469706272-rgb-1024x1024.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/04\/MSC24-China-business-Getty-1469706272-rgb-300x300.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/04\/MSC24-China-business-Getty-1469706272-rgb-150x150.jpg 150w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/04\/MSC24-China-business-Getty-1469706272-rgb-768x768.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/04\/MSC24-China-business-Getty-1469706272-rgb-1536x1536.jpg 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/04\/MSC24-China-business-Getty-1469706272-rgb-2048x2048.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<h2 class=\"wp-block-heading\" id=\"learn-more\">Learn more<\/h2>\n<p>Embrace proactive security with <a href=\"https:\/\/www.microsoft.com\/security\/business\/zero-trust\">Zero Trust<\/a>.<\/p>\n<p>To learn more about Microsoft Security solutions, visit our&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\" target=\"_blank\" rel=\"noreferrer noopener\">website.<\/a>&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\">Microsoft Security<\/a>) and X (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>)&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<p><sup>1<\/sup><a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/Library\/DoD-ZTStrategy.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">DoD Zero Trust strategy<\/a>, DoD CIO Zero Trust Portfolio Management Office. October 2022.<\/p>\n<p><sup>2<\/sup><a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/Library\/ZTCapabilitiesActivities.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Zero Trust Capability Execution Roadmap<\/a>, DoD CIO Zero Trust Portfolio Management Office. January 2023.<\/p>\n<p><sup>3<\/sup><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/11\/22\/microsoft-supports-the-dods-zero-trust-strategy\/\">Microsoft supports the DoD\u2019s Zero Trust strategy<\/a>, Steve Faehl. November 22, 2022.<\/p>\n<p><sup>4<\/sup><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/10\/5-ways-to-secure-identity-and-access-for-2024\/\">5 ways to secure identity and access for 2024<\/a>, Joy Chik. January 10, 2024.<\/p>\n<p><sup>5<\/sup><a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-entra-blog\/microsoft-entra-expands-into-security-service-edge-with-two-new\/ba-p\/3847829\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Entra Expands into Security Service Edge with Two New Offerings<\/a>, Sinead O&#8217;Donovan. July 11, 2023.<\/p>\n<p><sup>6<\/sup><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/09\/19\/forrester-names-microsoft-a-leader-in-the-2023-zero-trust-platform-providers-wave-report\/\">Forrester names Microsoft a Leader in the 2023 Zero Trust Platform Providers Wave\u2122 report<\/a>, Joy Chik. September 19, 2023.<\/p>\n<p><sup>7<\/sup><a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/Library\/(U)ZT_RA_v2.0(U)_Sep22.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Department of Defense (DoD) Zero Trust Reference Architecture Version 2.0<\/a>, Defense Information Systems Agency (DISA), National Security Agency (NSA) Zero Trust Engineering Team. July 2022.<\/p>\n<p><sup>8<\/sup><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/21\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions\/\">How Microsoft is partnering with vendors to provide Zero Trust solutions<\/a>, Vasu Jakkal. October 21, 2021.<\/p>\n<p><sup>9<\/sup><a href=\"https:\/\/www.govconwire.com\/2023\/06\/jane-rathbun-flank-speed-has-paved-the-way-for-navy-to-become-leaders-in-zero-trust-implementation\/\" target=\"_blank\" rel=\"noreferrer noopener\">Flank Speed Has Paved the Way for Navy to Become &#8216;Leaders in Zero Trust Implementation,&#8217; Says Acting CIO Jane Rathbun<\/a>, Charles Lyons-Burt, GovCon Wire. June 2023.<\/p>\n<p><sup>10<\/sup><a href=\"https:\/\/www.doncio.navy.mil\/CHIPS\/ArticleDetails.aspx?ID=16491\" target=\"_blank\" rel=\"noreferrer noopener\">Flank Speed makes significant strides in DOD Zero Trust Activity alignment<\/a>, Darren Turner, PEO Digital. December 2023.<\/p>\n<p><sup>11<\/sup><a href=\"https:\/\/www.army.mil\/article\/247666\/army_launches_upgraded_collaboration_platform_cybersecurity_at_the_forefront\" target=\"_blank\" rel=\"noreferrer noopener\">Army launches upgraded collaboration platform; cybersecurity at the forefront<\/a>, Alexandra Snyder. June 17, 2021.<\/p>\n<p><sup>12<\/sup><a href=\"https:\/\/www.army.mil\/article\/264963\/cohesive_teams_drive_netcoms_continuous_improvement_army_365_migration\" target=\"_blank\" rel=\"noreferrer noopener\">Cohesive teams drive NETCOM\u2019s continuous improvement, Army 365 migration<\/a>, Enrique Tamez Vasquez, NETCOM Public Affairs Office. March 2023.<\/p>\n<p><sup>13<\/sup><a href=\"https:\/\/www.army.mil\/article\/273423\/byod_brings_personal_devices_to_the_army_network\" target=\"_blank\" rel=\"noreferrer noopener\">BYOD brings personal devices to the Army network<\/a>, Army Office of the Deputy Chief of Staff, G-6. February 2024.<\/p>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/04\/16\/new-microsoft-guidance-for-the-dod-zero-trust-strategy\/\">New Microsoft guidance for the DoD Zero Trust Strategy<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/04\/16\/new-microsoft-guidance-for-the-dod-zero-trust-strategy\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Steve Faehl| Date: Tue, 16 Apr 2024 16:00:00 +0000<\/strong><\/p>\n<p>We are excited to announce new Zero Trust activity-level guidance for implementing the Department of Defense Zero Trust Strategy with Microsoft cloud services.<\/p>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/04\/16\/new-microsoft-guidance-for-the-dod-zero-trust-strategy\/\">New Microsoft guidance for the DoD Zero Trust Strategy<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[21481],"class_list":["post-24336","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-microsoft-365"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=24336"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24336\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=24336"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=24336"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=24336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}