Description: Zero-trust is at the foundation of security transformation and operational resilience in the face of major cybersecurity threats. Building secure systems, such as weapons systems and critical infrastructure control systems, needs to address hardware, software, and protocols and their interplay. Hardware security issues need to protect against attacks in which a hacker can physically update a system to compromise security or cause damage. Under a zero-trust paradigm for cyber resilience, we assume all defensive actions against an opponent's penetration activities may fail. One important aspect in resilience is to have a very fast and computationally inexpensive way to recover the original state. It is a little more difficult to extend ZT principles to Weapon Systems (WS), as they have lots of embedded systems without direct access and a reliance on system-to-system access. WS frequently have high availability requirements and deterministic processing. With proper engineering and security architecture constructs - ZT can be implemented in a meaningful way.
Join Dr. Jacobson to better understand these constructs for your DoD ZT implementation plans.