Page 36 - Cyber Defense eMagazine Special RSA Conference Annual Edition for 2022
P. 36

Quantum technology and the potential of Zero Trust

            Quantum Day or “Q-Day,” while 5-10 years out, is coming faster than we would like and it represents the
            day that quantum computers will reliably use the superpositioning power of qubits (i.e., information bits
            that can assume multiple states at once) to compute the codes needed to break asymmetric encryptions.
            With that said, the arrival of Q-Day may rely on Zero Trust strategies as nations work to prepare for the
            cyber risks that will inevitably accompany these computing advancements. We can no longer have this
            ‘castle-and-moat’ mindset, where we are hyper-focused on defending the perimeter, believing everybody
            and everything already inside our network belongs there. We must assume that the bad guys are already
            inside, accessing our data, and using “collect now, decrypt later” strategies.

            Zero Trust teaches us important security concepts and ideas, such as:



               ●  “Never trust, always verify”

               ●  A "you've been breached" mentality

               ●  The replacement of traditional perimeter-based security

               ●  An introduction to micro-segmentation and multi-factor authentication

               ●  The incorporation of contextual analysis into the IT resource access decision-making process



            Outlining a Plan of Action


            In response to the challenges that Zero Trust holds, Raytheon Intelligence & Space (RI&S) offers the
            expertise and flexible solutions to rapidly develop and implement a future-proof Zero Trust strategy that
            will best fit an organization. For example, its highly scalable and extensible Zero Trust security platform
            called REDPro ZTX (short for Raytheon Enterprise Data Protection with Zero Trust Extended) monitors
            users, devices, networks, workloads, and data in real-time. It enables plug-and-play of multi-vendor Zero
            Trust solutions; enforces least-privilege access; continuously verifies access requests; and facilitates
            real-time, multi-level cyber response.


            An  effective  and  comprehensive  Zero  Trust  solution  must  seamlessly  provide  multi-level  Zero  Trust
            monitoring  and  policy  enforcement  at  the  edge,  on  premise,  and  in  the  cloud.  RI&S’s  REDPro  ZTX
            solution even goes a step further by combining cross-platform Zero Trust security with cyber resiliency.
            Cyber  resiliency  adds  important  security  features,  such  as  independent  hardware  and  software
            attestation, self-healing, and deception.

            REDPro ZTX allows customers to interchangeably plug-and-play defense-grade Zero Trust and cyber
            resiliency  technologies  from  RI&S  and  industry  partners.  Having  modular  building  blocks  allows
            customers to decide which pillars of the Zero Trust model – users, devices, networks, workloads, and
            data – they would like to focus on first and how to achieve comprehensive Zero Trust coverage over time.
            RI&S’s modular and extensible REDPro ZTX platform was designed to speed up the deployment of Zero






                                                                                                              36
   31   32   33   34   35   36   37   38   39   40   41