Perimeter
Guest Blog // Selected Security Content Provided By Sophos
What's This?
11/14/2012
06:08 PM
Dark Reading
Dark Reading
Security Insights
Connect Directly
RSS
E-Mail
50%
50%

DoD's Bold Initiative: Secure The User, Not The Device

Joint Information Environment effort under way to improve its ability to share information between the services, industry partners, and other government agencies

Not all great ideas come out of the private sector. Occasionally some originate in the public sector. Or, as the following example shows, some are by-products based on partnerships between both.

The U.S. Department of Defense is planning the Joint Information Environment -- effectively a meaningful way to improve its ability to share information between the services, industry partners, and other government agencies. The Joint Information Environment will take all of those separate networks and collect them into a shared architecture.

As a Pentagon spokesman put it, information is meaningless unless it is delivered into the hands of those who need it. And because there are so many separate networks, information sharing isn't as efficient as it could be.

Sound familiar?

When it's complete, the Joint Information Environment will enable every user to get onto an approved device, from anywhere -- at home, at work, or on the move -- and get the information they need in a secure, reliable fashion.

The services will continue to support their own networks under the aegis of the Defense Information Systems Agency. The Joint Information Environment will eliminate redundancies in those networks, however. For example, instead of operating a parallel Army-only network for Army units that are stationed at a predominantly Air Force joint base, the Air Force will operate a single shared network for all personnel assigned to the base.

Developing the Joint Information Environment also involves moving toward DOD-wide services rather than every component buying, operating, and maintaining their own services, the Pentagon spokesman said.

"For example, rather than having every command operate their own email system, today the services have been combining those into a more efficient way of offering those things up at the service level," according to the DOD press release.

The enterprise email system, spearheaded by the Army, currently supports more than 550,000 users. The DOD intends to develop that system further by eventually providing every DOD user with an email address that is his regardless of command or location.

Ultimately, DOD users will have access to their email anywhere in the world, on any network operated by a DOD agency.

So let's regroup and figure out what this means for civilian information security professionals:

1. Enable every user to securely access data from any device, anywhere he is.
Hypothetically speaking, if you're working from home on your laptop and using your company's VPN to access your email, then switching over to your smartphone or BlackBerry to access your resources from the road, your ability to access information is seamless. In other words, it's no longer the device that becomes the first line of identity and authentication -- it's the user. Your policy and privileges follow you wherever you go regardless of the type of device used to access the network.

2. Authenticate users equally.
This is the ability for disparate divisions of the same company, even remote locations and offices of affiliates, agents, and partners, to be defined as a user in Active Directory and authenticated to the same shared network. I can't say conclusively whether the traditional VPN tunnels will be history given this type of environment (based on the Joint Base Air Force example of a shared network included in the press release, it seems likely), but, if so, it takes a lot of the upkeep and maintenance out of the equation.

3. Centralize users into a common directory.
As for security, sometimes centralization of users into a common directory like the kind suggested by the Joint Information Environment can actually be a positive development. Ultimately it requires fewer high-value IT staff of the DOD (in this case) to perform authentication checks and, as outlined in the press release itself, will allow the DOD to actually reduce the number of data centers over 10 years, from 1,500 to 250. It will also, of course, reduce infrastructure, such as computer systems, power supplies, and other equipment and applications required for their operation.

4. Achieve common ground.
Remaining data centers will share a common architecture and similar rate structure, again increasing the efficiency of the data center and, by default, how the data stored there is accessed, used, and accounted for.

5. Simplify services.
By reconfiguring how services are deployed (including email, natively developed DOD specific applications, etc.), including how they are operated, purchased, and maintained, the Joint Information Environment can help the DOD scale services based on an enterprise-wide model that's dependent on the number of users rather than the net number (or type) of devices.

Based on these outcomes alone, I think the implications presented by this technology are bold, even game-changing, both for the public as well as private sectors.

Brian Royer, a security subject matter expert, Sophos U.S., is partnering with SophosLabs to research and report on the latest trends in malware, web threats, endpoint and data protection, mobile security, cloud computing and data center virtualization.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
AnonymousMan
100%
0%
AnonymousMan,
User Rank: Moderator
11/15/2012 | 2:27:22 PM
re: DoD's Bold Initiative: Secure The User, Not The Device
We have learned nothing from the anarchy of the last 5 years. Users/Machines compromised in the millions (especially consumers) and yet we still travel down this "BYOD" road towards fantasy land where the security of the endpoint doesn't matter. -áWe are either ignoring or pretending to have solved a problem that just keeps getting worse.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5485
Published: 2014-09-30
registerConfiglet.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via unspecified vectors, related to the admin interface.

CVE-2012-5486
Published: 2014-09-30
ZPublisher.HTTPRequest._scrubHeader in Zope 2 before 2.13.19, as used in Plone before 4.3 beta 1, allows remote attackers to inject arbitrary HTTP headers via a linefeed (LF) character.

CVE-2012-5487
Published: 2014-09-30
The sandbox whitelisting function (allowmodule.py) in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain privileges to bypass the Python sandbox restriction and execute arbitrary Python code via vectors related to importing.

CVE-2012-5488
Published: 2014-09-30
python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via a crafted URL, related to createObject.

CVE-2012-5489
Published: 2014-09-30
The App.Undo.UndoSupport.get_request_var_or_attr function in Zope before 2.12.21 and 3.13.x before 2.13.11, as used in Plone before 4.2.3 and 4.3 before beta 1, allows remote authenticated users to gain access to restricted attributes via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
In our next Dark Reading Radio broadcast, we’ll take a close look at some of the latest research and practices in application security.