[Info-vax] US Gov't "Zero Trust" Security Requirements

Phil Howell phow9917 at gmail.com
Tue Sep 20 23:02:56 EDT 2022


On Wednesday, 21 September 2022 at 4:25:05 am UTC+10, Simon Clubley wrote:
> > 
> > Nice post .. ZTA illustrates transformation from relying on network perimeters (e.g. local firewalls) to enterprise App/DB and IDM (identity management) architectures. 
> > 
> > More detailed whitepaper architecture pointer in the link above: 
> ><https://dodcio.defense.gov/Portals/0/Documents/Library/(U)ZT_RA_v1.1(U)_Mar21.pdf> 
> >
> I looked briefly at this document and it appears that VMS would fall 
> down hard when judged by the standards of section 2.1.1, which makes 
> it clear that systems in a zero trust environment have to operate in 
> what is assumed to be an actively hostile environment internally, and 
> not just protect against some external nebulous threats from the outside 
> world. 
> 
> Some people around here argue that VMS doesn't really need to be kept 
> to the same security standards as everything else "because it's run in 
> an isolated and controlled environment". For anyone new around here, 
> I disagree strongly with that statement. 
> 
> How do you see it as being viable to run VMS in such an actively hostile 
> environment ? 
> 
> Simon. 
> 
> -- 
Perhaps you should ask those who have run such systems in
"hostile environments" for at least 25 years, like Sydney ASX?
Average daily transaction value is over $50 billion (AU)
Hey, they even have a job on offer, you surely know pascal?

https://www2.asx.com.au/content/dam/asx/about/job-opportunities/securities-and-payments/senior-analyst-programmer%20-chess.pdf

Phil



More information about the Info-vax mailing list