Zero Trust

 View Only
  • 1.  What are your top 3 priorities for Cyber-Physical Resilience?

    Posted May 07, 2023 06:02:00 AM

    The Whitehouse has created a working group on Cyber-Physical Resilience to build resilience into Critical Infrastructure. They are looking at ways to prevent failure, disruption, and degradation.

    If you had the opportunity, what would you want their top three priorities to be?

    https://www.whitehouse.gov/pcast/briefing-room/2023/03/15/pcast-initiating-working-group-on-cyber-physical-resilience/



    ------------------------------
    Alex Sharpe
    Principal
    Sharpe42
    [email protected]
    Co-Chair Philosophy & Guiding Principles Working Group
    Co-Chair Organizational Strategy & Governance Working Group
    ------------------------------


  • 2.  RE: What are your top 3 priorities for Cyber-Physical Resilience?

    Posted May 07, 2023 08:01:00 AM
    My inputs

    1. Policies/directives to enable enterprises to implement threat Intel enabled microsegmentation in cyber physical systems. This would enable them to protect, detect and respond to attacks on any cyber physical systems immediately. 
    2. Policies/directives to detect changes in ip connectivity in cyber physical networks and build network disconnection capabilities remotely.
    3. Policies/directives to build and continuously improve crisis management capabilities due to sudden disruption in cyber physical systems.

    Regards
    Agnidipta Sarkar





  • 3.  RE: What are your top 3 priorities for Cyber-Physical Resilience?

    Posted May 08, 2023 12:17:00 PM

    Nice find; thanks a lot for sharing. Concerning my priorities:

    1. Research on applying open source zero trust/SDP networking platforms into OT environments that sometimes may be partially / fully air-gapped and completely stop external network attacks. Note that we are already working on this topic with OpenZiti (https://github.com/openziti) and a few orgs including DoE, on applying zero trust principles to distributed energy resources (i.e., critical infrastructure). 
    2. Research on how application-embedded zero trust/SDP networking allows us not to trust any underlying networks, including WAN/internet, LAN and even host OS network, to stop side-channel attacks (e.g., malware on a device attacking any resources which are attached via the overlay network). This further allows us to run the zero trust overlay network within applications/run time environments that do not trust the underlying OS/bare-metal for distributed confidential systems. This is something OpenZiti can do today and which we are developing with several companies/providers.
    3. Research on how zero trust and SDP systems also require a smart routing mesh network to provide resilience across any underlying network (incl. internet, satellite, 4/5G, etc.) so that regardless of the underlay, we have a private overlay which picks the best path, from source to destination according to the best performance and lowest cost. Again, something we do today with OpenZiti and want/need to turn into the defacto standard that any solution should implement.


    ------------------------------
    Philip Griffiths
    Head of Business Development
    NetFoundry
    ------------------------------