Zscalerのブログ

Zscalerの最新ブログ情報を受信

News & Announcements

Why Government Agencies Need FedRAMP & TIC to Harmonize

image
STEPHEN KOVAC
January 22, 2019 - 3 分で読了

Government agencies have been encouraged to modernize their IT infrastructures so they can operate more efficiently and deliver services more effectively. At the same time, keeping their networks secure is an absolute priority. It’s possible to accomplish both, but only if IT policymakers reconcile Trusted Internet Connection (TIC) mandates with FedRAMP standards.

Right now, TIC and FedRAMP controls are based on different standards. This disparity creates a challenge for agencies trying to introduce secure cloud platforms into their IT environments.

When the federal government mandates that internet traffic goes through a TIC, the process is cumbersome. Users have to get on a TIC for every application and then exit the TIC when they’re done with the original application.

In an ideal process, when users enter through a cloud-based TIC, they’d enter a trusted cloud environment. They should be free to seamlessly float between applications without exiting.

FedRAMP makes this possible. It’s an effective standard because it defines a common playing field for technology suppliers. The controls required by FedRAMP encourage a community of trust as software and hardware vendors interact to provide cloud solutions to agencies. Different apps living up to the same standards and controls can sit side-by-side in the same data centers. Agencies can count on a trusted cloud environment.

Enabling Zero Trust

Ensuring that TIC and FedRAMP work together is key to securing remote networks. The ways that agency employees access networks have changed completely in the past decade. Consequently, agencies are rethinking their approaches to security to account for employees who telecommute, travel, and use a variety of different devices.

The current interest in "zero trust" approaches is a result of these trends. Agencies are emphasizing user management. If they know the users and can secure the users, then the application is secure.

Practically speaking, network security is secondary to user security. What matters is that the agency can validate a user as a trusted source and create an inside-out connection. When you have two trusted sources connecting with each other, the nature of the network and the device is irrelevant.

Strictly speaking, the internet is used as a signal to help create the connections, but the user isn’t on the open internet. This murky area is where the TIC mandate creates a challenge.

Going forward, coordination between the two policies is essential. As the governing entities, GSA FedRAMP PMO and DHS have to coordinate on policy initiatives to ensure that one standard doesn’t interfere with the other.

For more information about implementing the right defenses and controls to secure your cloud-enabled architecture, visit https://www.zscaler.com/solutions/government.

This article originally appeared on the Carahsoft website: https://www.carahsoft.com/

- - - - - - - - - - - -

Stephen Kovac is Vice President of Global Government and Compliance at Zscaler

form submtited
お読みいただきありがとうございました

このブログは役に立ちましたか?

免責事項:このブログは、Zscalerが情報提供のみを目的として作成したものであり、「現状のまま」提供されています。記載された内容の正確性、完全性、信頼性については一切保証されません。Zscalerは、ブログ内の情報の誤りや欠如、またはその情報に基づいて行われるいかなる行為に関して一切の責任を負いません。また、ブログ内でリンクされているサードパーティーのWebサイトおよびリソースは、利便性のみを目的として提供されており、その内容や運用についても一切の責任を負いません。すべての内容は予告なく変更される場合があります。このブログにアクセスすることで、これらの条件に同意し、情報の確認および使用は自己責任で行うことを理解したものとみなされます。

Zscalerの最新ブログ情報を受信

このフォームを送信することで、Zscalerのプライバシー ポリシーに同意したものとみなされます。