• Archives
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home General Government

White House Instructs U.S Agencies To Adopt “Zero Trust” Cybersecurity

Olagoke Ajibola by Olagoke Ajibola
January 27, 2022
in Government, Security
Share on FacebookShare on Twitter

White House wants US govt to use a Zero Trust security model

Cyber-attacks continue to be a threat that is aimed daily at not only multinational firms but also aimed at government agencies and many other vulnerable entities. In a bid to curb these attacks, the United States White House has released a new cybersecurity strategy for all government infrastructures and entities. In a statement by The White House, it said that the “growing threat of sophisticated cyber-attacks has underscored that the Federal Government can no longer depend on conventional perimeter-based defences to protect critical systems and data.”

 The new strategy discusses the administration’s vision for seeing all government agencies embrace a “zero trust” architecture. The “zero trust” cybersecurity model has been identified as a system that accommodates and grant users or devices access to the specific network resources necessary for the task at hand. What this means is that permissions and authentication will not run as usual but will only be granted on a case-by-case basis. The new cybersecurity document was published in a memorandum by the administration’s policy arm of the Office of Management and Budget (OMB), all heads of executive departments and agencies were addressed in it.

The memorandum highlighted that for a shift towards zero trust architecture to take effect, implementation of stronger enterprise identity and access controls is required as well as the use of multi-factor authentication. Authentication is expected to be carried out specifically through a hardware-based authentication token like access cards, instead of through SMS push notifications. The new strategy requires federal officials to use several layers of security when they sign on to agency networks, and it requires agencies to boost internal network protection through various methods, such as inviting independent experts to assess levels of security. According to the Cybersecurity and Infrastructure Security Agency (CISA), guidelines have been laid down for US Agencies and executive departments to complete an inventory of every device authorized and operated for official business for monitoring and compliance with the new strategies.

Acting OMB Director Shalanda Young in a statement said “In the face of increasingly sophisticated cyber threats, the Administration is taking decisive action to bolster the Federal Government’s cyber defences,” He added that “This zero-trust strategy is about ensuring the Federal Government leads by example, and it marks another key milestone in our efforts to repel attacks from those who would do the United States harm.”

Log4j security vulnerability a bug in a widely used piece of computer code was last year cited by The White House as “the latest evidence” adversaries have explored to get their foot in the door. The vulnerability which is considered one of the most serious cybersecurity threats to have hit in recent times first began to be exploited in December 2021. At the time, CISA instructed government agencies to patch vulnerable assets immediately or apply other mitigation measures. The FTC also subsequently warned private companies to remediate the vulnerability to avoid potential legal action for putting consumers at risk.

CISA director Jen Easterly disclosed that “As our adversaries continue to pursue innovative ways to breach our infrastructure, we must continue to fundamentally transform our approach to federal cybersecurity.” He added that “Zero trust is a key element of this effort to modernize and strengthen our defences.” He also touched on CISA efforts to always get ahead of these adversaries, he said “CISA will continue to provide technical support and operational expertise to agencies as we strive to achieve a shared baseline of maturity.” The new strategy reiterates one thing and that is, as adversaries continue to explore vulnerable ways to breach security in cyberspace, it’s expedient for organizations to never rest when it comes to boosting their defences in order not to prey on the hands of cybercriminals.

An initial draft of cybersecurity strategy was released in September 2021 to the public for comments and opinion, these inputs have since then been shaped by the cybersecurity industry as well as other fields of the public and private sector. With the final strategy reached and now released to government agencies and organizations involved, the OMB has issued a 30 days ultimatum for agencies to designate a strategy implementation lead and another 60 days ultimatum for each organization to submit an implementation plan to the OMB. Agencies were given until the end of the fiscal year 2024 to meet the goals.

According to the National Cyber Director Christopher Inglis, he said that “This strategy is a major step in our efforts to build a defensible and coherent approach to our federal cyber defences.” He added “We are not waiting to respond to the next cyber breach. Rather, this administration is continuing to reduce the risk to our nation by taking proactive steps towards a more resilient society.”

Last year, a number of high-profile cyber-attacks were launched against private organizations, this includes attacks against the world’s largest beef supplier and a major fuel supplier, which slowed critical U.S. supply chains. The White House has warned that private companies boost their defences. 

Related Posts:

  • skynews-russia-hacker_5812455
    Russian Hackers Target WhatsApp for Data on Ukraine
  • GettyImages-2175312180
    UK Outlaws Ransomware Payments by Government Agencies
  • Nigeria Bureau of Statistics Data breach
    Hackers Compromised The NBS Sever, But No Ransomware Yet
  • router-595x335_0
    US And UK Warn Of Custom Malware Vulnerability On…
  • cyber-security-istock
    African SMEs Face a Host of Cybersecurity Challenges
  • White House Announces New Labelling For Reputable IT Gadgets
    White House Announces New Labelling For Reputable IT Gadgets
  • Copy-of-Blue-Modern-Gradient-Beauty-And-Fashion-Blog-Banner-2024-07-10T161619.685
    Kenya Reports 2.54 Billion Cyber Threats in Q1 of 2025
  • Robotics
    Nigeria Ranked As Africa’s Second Most Cyber-secure…

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: CISAcybercybersecuritydefencesfederalgovernmentsecuritystrategy
Olagoke Ajibola

Olagoke Ajibola

Olagoke Ajibola is a creative writer and content producer with an eye for details and excellence. He has a demonstrated history of telling stories for TV, Film and Online. Aside from being fascinated by the power of imagination, his other interest are travel, sport, reading and meeting people.

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Finally, Google Gives Reasons For The Gemini Usage Restrictions September 8, 2025
  • New OpenAI Jobs Platform Challenges LinkedIn With AI September 7, 2025
  • ChatGPT Users Get Memory Control and Access to Projects September 5, 2025
  • MTN Looking To Acquire Telkom September 5, 2025
  • Banks Arrange $38B Debt Package for Oracle-Linked Data Centres September 5, 2025
  • Google’s Antitrust AI Overviews Replace Links With Fast Search September 5, 2025

Browse Archives

September 2025
MTWTFSS
1234567
891011121314
15161718192021
22232425262728
2930 
« Aug    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.