How Okta, CrowdStrike, and Zscaler Are Better Together

In the face of a widening threat landscape and increased numbers of cybersecurity attacks in both the public and private sectors, the United States federal government is required to take action through several executive orders and memorandums. To keep pace and outsmart ever-evolving cybercriminals, modern security measures must include robust enforcement of identity, device, and network/environment.

Responding to Cybersecurity Threats

Federal agencies are working hard to prioritize cybersecurity and safeguard the public and workforce—and for good reason. In the first three months of 2022, 92% of data breaches were the result of cyberattacks, as reported by the Identity Theft Resource Center (ITRC), making 2022 the third consecutive year that data breaches have increased compared to Q1 of the previous year.

Okta + Zscaler + Crowdstrike Better Together Blog Embedded Image 2022

In addition to other laws, policies, and recommendations, such as FedRAMP, federal agencies are now required to use vendors that meet Cloud Smart initiatives after the release of Executive Order 14028 on Improving the Nation’s Security (EO 14028). Federal agencies also need to pay attention to Memorandum M-22-09, “Moving the U.S. Government Toward Zero Trust Cybersecurity Principles,” issued by the Office of Management and Budget, which outlines key goals they must meet by the September 2024 deadline.

Pursuant to EO 14028, the Cybersecurity and Infrastructure Security Agency (CISA) is required to develop architectural documentation and a cloud-service governance framework, and the National Institute of Standards and Technology (NIST) is required to develop Zero Trust best practices, guidelines, and recommendations.

For these reasons, security technology providers, Okta, CrowdStrike, and Zscaler, offer solutions that, when used together, give federal agencies access to resources that provide protection in the simplest way possible.

By utilizing these security technology providers, federal agencies can make significant progress in building the security posture they need to protect the public and their workforces against current–and future–cyber threats.

Why the Zero Trust Approach?

Zero Trust is not a technology, nor is it a product. It is a strategic, architectural approach to security enabled by technology. It builds on existing security concepts and does not introduce a radical new approach to cybersecurity. The market is driven by the need to protect enterprise digital environments by averting lateral movement, leveraging network segmentation, simplifying granular user-access control, and implementing Layer 7 threat prevention.

Zero Trust approach is a complete shift from the old, legacy security architectures.

On a grand scale, it means federal agencies need to evolve their approach and mindset when implementing security practices. Every area of the organization needs to break out of siloed security approaches and come together for a holistic approach by implementing tools and solutions that improve their security posture at all levels. Adopting Zero Trust means adopting a framework that is agile enough to maintain security measures while adapting to constantly changing environments and influxes of different users.

A Simple Solution: Okta, CrowdStrike, and Zscaler

A complete Zero Trust approach relies on technologies working together. Solutions offered by Okta, the world’s leading identity authentication provider, CrowdStrike, a global cybersecurity leader in endpoint security, and Zscaler, the leader in securing networks and the environment, have technical integrations designed to scale and align with NIST SP 800-207 Zero Trust components—Policy Decision Point (PDP)/Policy Enforcement Point (PEP). This gives federal agencies confidence that, when implemented together, they will also be on their way to meeting three of the five pillars of the Zero Trust Architecture (ZTA), including identity, device management, and network/environment.

Plus, as federal agencies turn to Okta, CrowdStrike, and Zscaler for help tackling these pillars, they can use the solutions to comply with the laws, mandates, policies, and recommendations that are required for the integration and implementation of new technology in their agency’s IT infrastructures.

Supporting the Public and Agency Workforces

Besides helping tackle the first three pillars, Okta, CrowdStrike, and Zscaler can help meet the needs of federal agencies’ workforces and the public at large.

For most federal government agencies, the mission is to serve the public with digital experiences that match the level of quality they’re used to experiencing in the private sector, i.e., digital experiences that are non-intrusive, secure, simple, and scalable. But as federal agencies begin to implement ZTA in their IT infrastructures, it’s crucial that they maintain the quality of these digital experiences and continue to serve the public and workforce. And, when utilized together, the solutions from Okta, CrowdStrike, and Zscaler empower them to do just that.

By bringing federal agencies modern, identity-centric security that’s both agile and scalable, these solutions ensure a security architecture that will not only meet but will exceed the workforce and the public’s expectations for frictionless digital experiences through products such as single sign-on when accessing content.

Complementary Zero Trust Implementation

Okta, CrowdStrike, and Zscaler can help implement a Zero Trust strategy. When these strategies are put to work, federal agencies have the solutions to modernize their security, enabling simplified, centralized identity and context-rich multi-factor access management. In addition, agencies can trust secure service delivery of data and assets, endpoint and ID security, and secure communication and connection between user-app, app-app, and machine-machine.

Download Okta’s Zero Trust Architecture Solution Brief and contact us today to speak to a member of our team and learn more about how Okta, CrowdStrike, and Zscaler can help federal agencies successfully transition to Zero Trust.

Building a More Secure Cloud

Government officials nationwide had to accelerate modernization initiatives to ensure that teleworking employees could access networks and data from remote locations. For many agencies, that meant a higher reliance on cloud technology and a possible expansion of their cybersecurity vulnerabilities in an environment already attractive to hackers. In response to the security challenges raised by the cloud, the federal government has provided myriad foundational documents, guidelines and strategies to help agencies create a strong security posture, including the Cloud Smart strategy and Federal Risk and Authorization Management Program (FedRAMP). Cloud technology has a crucial role to play in agencies’ ability to modernize IT systems and take advantage of the latest technological innovations. Given this importance, cloud adoption must keep pace with security efforts. Read the latest insights from industry thought leaders in government cloud security and FedRAMP in Carahsoft’s Innovation in Government® report.

IIG FCW July 2020 Blog ImageCloud and the Customer Experience  

“The emphasis on user-centered design is changing the way applications are created. In the past, many government applications were built from the perspective of the agency rather than from the perspective of the end user. The flexible, innovative nature of cloud technology makes it easier for agencies to improve the efficacy of their applications and what they ultimately deliver. In addition, cloud technologies can help agencies start getting a 360-degree view of how they interact with citizens, business partners and other agencies and even begin personalizing those experiences. In addition, software that manages, authenticates and verifies people’s credentials can ensure privacy while streamlining the customer experience. IDEA codifies the use of secure credentials across platforms and therefore will accelerate the use of trusted credentials in multiple environments so that people will be even more willing to conduct online transactions with the government.”

Read more insights from Acquia’s Vice President of Federal Sector, Peter Durand.

Why MultiCloud and Zero Trust Are Now Essential   

“The coronavirus pandemic has underscored the government’s need to offer a secure cloud environment that allows employees to access their data and applications anywhere, anytime and at virtually infinite scale. Many agencies found themselves unprepared to support the sudden move to telework in response to the pandemic. Some didn’t have enough VPNs or smart-card readers for their employees’ remote devices, for example. Google Cloud customers that were already using G Suite or Cloud Identity were able to make the transition to telework smoothly without the need for VPNs or other special technology. That was due in part to G Suite’s reliance on a zero trust architecture, which shifts access control from the network’s perimeter to individual users and devices.”

Read more insights from Google Cloud’s Director of Federal, Shannon Sullivan.

The Route to Secure, Fast Cloud Adoption

“SASE and CNAP pull together a number of different technologies and categories. But those are point-in-time definitions. Technologies evolve and their functions change over time, so rather than think about what category of product they need, agencies should focus on what they’re trying to accomplish and the business outcomes they want to achieve. Agencies should look for a platform that was built natively in the cloud. It should apply persistent protection to sensitive information no matter where it goes; offer complete visibility into data, context and user behavior across the entire environment; and take real-time action to correct policy violations and stop security threats.”

Read more insights from McAfee’s Senior Vice President of the Cloud Security Business Unit, Rajiv Gupta.

Cloud Security Considerations for DOD Mission Partners   

“Moving to the cloud requires a considerable level of effort and expense. Ensuring the security of applications or services running in a cloud adds another layer of complexity. When choosing a cloud service provider, organizations need to understand what security controls they will effectively inherit from that provider and what controls they will have to build and deploy on their own. For government agencies, FedRAMP provides a host of security levels and a robust number of security controls in a well-documented package, but Defense Department agencies also need to understand if they have any additional impact-level requirements for their applications and mission-critical data. As mission partners move to the cloud, they need to make sure that approved cloud providers can meet those baseline security and impact-level requirements.”

Read more insights from GDIT’s milCloud® 2.0 Cloud Services Portfolio Lead, Jeffrey Phelan.

The Evolution of Trusted Connections    

“Under TIC 3.0, agencies can still use network proxies, cloud access security brokers, and security information and event management (SIEM) tools to build a strong security framework, but they don’t have to run everything through a TIC. And users don’t have to struggle with increased latency and network complexity. Instead, the end-user experience is streamlined because cloud-native tools are handling processes and workloads. Agencies end up with a clean omnichannel experience for employees because their location no longer matters. Whether they are working on an iPad at home or a desktop computer at a government office, the security level and user experience are the same.”

Read more insights from Okta’s Solution Engineer, Habib Hourani.

Cloud: One Size Does Not Fit All

“Cloud is not a one-size-fits-all solution. Instead, finding the right fit depends on knowing agencies’ customers, the type of information they’re processing and their user base. Then it’s a question of aligning what the customer needs with the cloud offerings that are available. FedRAMP has been very successful at making that fit easier. The program brings transparency and consistency to the government’s use of cloud technology. Agencies know that an authorized company’s product or service has been rigorously reviewed under FedRAMP and that the government’s continuous monitoring program will provide information about how vulnerabilities are mitigated during the term of service.

Read more insights from SAP National Security Services’ Vice President and CISO, Ted Wagner.

How Cloud Makes Telework Smarter

“Smartsheet Gov enables employees to complete tasks more easily, efficiently and securely by working with systems on an automated or integrated basis. In addition, employees can access Smartsheet from wherever they are. They can share information and the results of their work via dashboards that multiple employees can view at one time and continue that seamless collaboration with their colleagues even when everyone is working from home. Smartsheet datasets are housed in a secure, FedRAMP-authorized cloud environment, which assures agencies that they can adhere to the same security protocols from outside the office. For example, if an agency needs to conduct a yearly audit that would normally take place with all the participants at a physical location, they can do the work remotely using Smartsheet Gov to run the same playbook, the same audit and the same workflow regardless of where those employees reside. Such borderless teams can reduce costs while increasing employee satisfaction and productivity.”

Read more insights from Smartsheet’s Vice President of Security, Risk and Compliance, Ignacio Martinez.

Visibility is Essential for Cloud Security

“The nature of an agency’s mission, data protection needs and other requirements suggest that multi-cloud and hybrid environments will be the norm. As we migrate to these new locales, there is an exponential deluge of data scattered across multiple systems and endpoints. It is critical that agencies have granular visibility into all the devices, workloads and applications running across these environments so that they can gain operational and security insights. The fidelity of data is another crucial factor because without it any technology has its limits and decisions may not ensure successful outcomes. To allay any fears about security, FedRAMP, a standardized framework for security assessments, was introduced. It has grown to be the gold standard for cloud security today.

Read more insights from Splunk’s Director of Industry Marketing for Public Sector and Education, Ashok Sankar.

How the Cloud is Redefining Security

“The Trusted Internet Connections Initiative was created in 2007 after the Office of Management and Budget conducted a study that found thousands of unprotected internet connections at agencies. Back then, we were using the internet mainly for email and web browsing, so when the government mandated that all internet traffic must go through a trusted connection, it made sense. But over the years, agencies have moved workloads to the cloud, and now employees’ activities rarely travel through an agency’s data center. As a result, TIC became a barrier to cloud adoption. The TIC 3.0 draft guidance, however, is a crucial step toward removing those obstacles.”

Read more insights from Zscaler’s Vice President of Global Government, Stephen Kovac.

 

Download the full Innovation in Government® report for more insights from these government cloud security thought leaders and additional industry research from FCW.

Your Guide to Mission-Driven Cybersecurity

Over the years, the federal government has created a series of mandates to promote better cybersecurity practices and solutions. Today, three such mandates guide most agency efforts: the Federal Risk and Authorization Management Program (FedRAMP) for cloud security; the Continuous Diagnostics and Mitigation (CDM) program for network visibility and data security; and the Trusted Internet Connections (TIC) program for internet-based security. These mandates are increasingly seen as interlocking pieces of a larger puzzle. That puzzle is this: How can agencies create a more agile IT environment without compromising the security of their networks, systems and data? Learn more insights on how these mandates support flexible cybersecurity strategies in “Your Guide to Mission-Driven Cybersecutity”, a guide created by GovLoop and Carahsoft featuring insights from the following technology thought leaders. Continue reading