{"id":1118755,"date":"2023-10-20T06:15:06","date_gmt":"2023-10-20T10:15:06","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/uncategorized\/nsa-shares-recommendations-to-advance-device-security-within-national-security-agency\/"},"modified":"2023-10-20T06:15:06","modified_gmt":"2023-10-20T10:15:06","slug":"nsa-shares-recommendations-to-advance-device-security-within-national-security-agency","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/nsa-shares-recommendations-to-advance-device-security-within-national-security-agency\/","title":{"rendered":"NSA Shares Recommendations to Advance Device Security Within &#8230; &#8211; National Security Agency"},"content":{"rendered":"<p><p>      FORT MEADE, Md. - The National Security Agency (NSA) has      released a       Cybersecurity Information Sheet (CSI) to enable federal      agencies, partners, and organizations to assess devices in      their systems and be better poised to respond to risks      associated with critical resources.            Cybersecurity threats continue to increase, and traditional      defenses cannot scale to provide effective security against      these threats. Transitioning to a Zero Trust security      framework places defenders in a better position to secure      sensitive data, systems, applications, and services against      nation-state actors and malicious actors seeking quick      financial gains.            The Advancing      Zero Trust Maturity Throughout the Device Pillar CSI      provides recommendations to effectively ensure all devices      meet an organizations access criteria and security policies.      The NSA advises National Security System (NSS), Department of      Defense (DoD), and Defense Industrial Base (DIB) network      owners and operators to implement the recommendations in the      CSI to increase maturity levels of the device pillar      capabilities. These include device identification, inventory,      and authentication, device authorization using real time      inspection, and remote access protection.            Traditional security defenses have been shown to be      insufficient to address the current threat environment said      Alan Laing, NSAs Vulnerability Analysis Subject Matter      Expert. Government organizations and critical system owners      need to enhance management of their device inventories to      improve detection of sophisticated threats as part of      comprehensive cybersecurity strategy integrating effective      and scalable solutions to secure sensitive data, applications      and services.            As indicated in the CSI, the device pillar is a foundational      component of the Zero Trust security framework. It ensures      devices within an environment or attempting to connect to      resources in such environment are located, enumerated,      authenticated, and assessed. A device is only authorized      access if it meets the environments security policies.            The device pillar is one of the seven pillars defined in the            DoD Zero Trust Reference Architecture. The capabilities      discussed in this CSI complement on the Advancing Zero Trust      Maturity Throughout the User Pillar published on 14 March      2023. NSA advises progression of the capabilities in each of      the seven pillars in the Zero Trust security framework should      be seen as a cycle of continuous improvement based on      evaluation and monitoring of threats.            The NSA Zero Trust security framework adheres to the      Presidents Executive Order of Improving the Nations      Cybersecurity (EO 14028) and National Security Memorandum 8      (NSM-8), which direct Federal Civilian Executive Branch      (FCEB) agencies and NSS owners and operators to develop and      implement strategic plans to adopt a Zero Trust cybersecurity      framework.                  Read the full report here.                  Visit our full library for more cybersecurity information      and technical guidance.    <\/p>\n<p>      NSA Media Relations      <a href=\"mailto:MediaRelations@nsa.gov\">MediaRelations@nsa.gov<\/a>      443-634-0721    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Visit link:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.nsa.gov\/Press-Room\/Press-Releases-Statements\/Press-Release-View\/Article\/3562460\/nsa-shares-recommendations-to-advance-device-security-within-a-zero-trust-frame\/\" title=\"NSA Shares Recommendations to Advance Device Security Within ... - National Security Agency\" rel=\"noopener\">NSA Shares Recommendations to Advance Device Security Within ... - National Security Agency<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> FORT MEADE, Md.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/nsa-shares-recommendations-to-advance-device-security-within-national-security-agency\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-1118755","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1118755"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=1118755"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1118755\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=1118755"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=1118755"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=1118755"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}