DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Alerts

NSA provides guidance on ICAM maturity

March 16, 2023
Reading Time: 2 mins read
in Alerts

 

The National Security Agency (NSA) has published guidance on how to improve cybersecurity by integrating zero trust principles into enterprise networks.

The adoption of zero trust is mandated by the President’s executive order on improving the nation’s cybersecurity and National Security Memorandum 8. The NSA has identified seven different pillars, namely application/workload, automation and orchestration, device, data, network/environment, user, and visibility and analytics, that should be integrated to mature zero trust frameworks.

Additionally, the user pillar of zero trust refines capabilities associated with the Federal Identity, Credential, and Access Management (FICAM) framework established in 2009 to provide a common ICAM segment architecture for federal agencies to use.

Maturing identity management involves creating an inventory of users with access to critical resources, using standardized inventories that are centrally accessible, performing identity vetting, defining enterprise attribute standards, and defining risk-based attributes.

The access management aspect of zero trust covers the policies and mechanisms through which only authenticated users that are authorized can access protected resources.

At the same time, it involves minimizing privileges to specific roles, implementing least privilege access policies and just in time / just enough access policies, adopting privileged access management tools, providing privileged access devices/workstations to administrators, and implementing a risk adaptive access framework.

When implementing identity federation, organizations should inventory needed partner identities, map partner identity and credential assurance levels and access policies, and establish levels of trust for the federated identities.

Furthermore, expanding and refining the FICAM roadmap under the principles of a zero trust security model will provide an organization with tools and processes for resisting, detecting, and responding to ever increasing threats that exploit weaknesses or gaps in their ICAM programs.

The tools and processes support an operational mindset that threats exist within the nominal boundaries of their systems. Vigilance is required to ensure that risks are continually assessed and appropriate responses are enacted in a timely manner.

Read More

Tags: AlertsAlerts 2023CybersecurityGovernmentMarch 2023NSASecurity AdvisoryZero Trust
0
VIEWS
ADVERTISEMENT

Related Posts

Unpatched IBM file transfer software at Risk

Unpatched IBM file transfer software at Risk

March 31, 2023
Osprey Pump Controller Vulnerabilities

Osprey Pump Controller Vulnerabilities

March 31, 2023
Super FabriXss vulnerability in Azure

Super FabriXss vulnerability in Azure

March 31, 2023
Tool for Cloud Credential Harvesting

Tool for Cloud Credential Harvesting

March 31, 2023

More Articles

Course

Advanced Cloud Security Practitioner 2021

March 25, 2022

The Cyber Effect: A Pioneering Cyberpsychologist Explains How Human Behavior Changes Online

October 15, 2020
Certification

CBCI – Certification

June 17, 2022
Incidents

Pottawatomie County Fixing Systems After Ransomware Attack

October 4, 2021

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.