Listen in to gain insight on why the opening line of the newly published Department of Defense (DoD) Zero Trust Strategy should be a warning to all: “Our adversaries are in our networks, exfiltrating our data, and exploiting the Department’s users.” In its roadmap for the future, the ZT PfMO identified multiple targets across the seven tenets of Zero Trust. In the Application and Workload tenet, the ZT PfMO targeted: Application Inventory, Secure Software Development and Integration, and Continuous Monitoring and Ongoing.
Attendees learned why for the first time Application Programming Interfaces (APIs) were highlighted as a key control point throughout multiple tenants. There are recurring requirements for agencies to control APIs by establishing and enforcing API standards and governance over API development and monitoring. API visibility and control are called out in multiple sections as well as a dedicated section 6.6 titled API Standardization.
Attendees in this webinar tuned in to learn:
- How APIs are a growing attack vector and how API security fits into Zero Trust
- The importance of a shift left methodology to apply security controls earlier in the application lifecycle
- How the Executive Order (EO), Cybersecurity, and Infrastructure Security Agency’s (CISA) Binding Operational Directive 23-01 provide guidance for API security within Zero Trust