Yeske helped change what complying with zero trust means
The Cybersecurity and Infrastructure Security Agency developed a zero trust architecture that features five pillars.
The Defense Departmentβs zero trust architecture includes seven pillars.
The one the Department of Homeland Security is implementing takes the best of both architectures and adds a little more to the mix.
Don Yeske, who recently left federal service after serving for the last two-plus years as the director of national security in the cyber division at DHS, said the agency had to take a slightly different approach for several reasons.

βIf you look at OMB [memo] M-22-09 it prescribes tasks. Those tasks are important, but that itself is not a zero trust strategy. Even if you do everything that M-22-09 told us to do β and by the way, those tasks were due at the beginning of this year β even if you did it all, that doesnβt mean, goal achieved. Weβre done with zero trust. Move on to the next thing,β Yeske said during an βexitβ interview on Ask the CIO. βWhat it means is youβre much better positioned now to do the hard things that you had to do and that we hadnβt even contemplated telling you to do yet. DHS, at the time that I left, was just publishing this really groundbreaking architecture that lays out what the hard parts actually are and begins to attack them. And frankly, itβs all about the data pillar.β
The data pillar of zero trust is among the toughest ones. Agencies have spent much of the past two years focused on other parts of the architecture, like improving their cybersecurity capabilities in the identity and network pillars.
Yeske, who now is a senior solutions architect federal at Virtru, said the data pillar challenge for DHS is even bigger because of the breadth and depth of its mission. He said between the Coast Guard, FEMA, Customs and Border Protection and CISA alone, there are multiple data sources, requirements and security rules.
βWhatβs different about it is we viewed the problem of zero trust as coming in broad phases. Phase one, where youβre just beginning to think about zero trust, and youβre just beginning to adjust your approach, is where you start to take on the idea that my network boundary canβt be my primary, let alone sole line of defense. Iβve got to start shrinking those boundaries around the things that Iβm trying to protect,β he said. βIβve got to start defending within my network architecture, not just from the outside, but start viewing the things that are happening within my network with suspicion. Those are all building on the core tenants of zero trust.β
Capabilities instead of product focused
He said initial zero trust strategy stopped there, segmenting networks and protecting data at rest.
But to get to this point, he said agencies too often are focused on implementing specific products around identity or authentication and authorization processes.
βItβs a fact that zero trust is something you do. Itβs not something you buy. In spite of that, federal architecture has this pervasive focus on product. So at DHS, the way we chose to describe zero trust capability was as a series of capabilities. We chose, without malice or forethought, to measure those capabilities at the organization, not at the system, not at the component, not as a function of design,β Yeske said. βOrganizations have capabilities, and those capabilities are comprised of three big parts: People. Whoβs responsible for the thing youβre describing within your organization? Process. How have you chosen to do the thing that youβre describing at your organization and products? What helps you do that?β
Yeske said the third part is technology, which, too often, is intertwined with the product part.
He said the DHS architecture moved away from focusing on product or technology, and instead tried to answer the simple, yet complex, questions: Whatβs more important right now? What are the things that I should spend my limited pool of dollars on?
βWe built a prioritization mechanism, and we built it on the idea that each of those capabilities, once we understand their inherent relationships to one another, form a sort of Maslowβs hierarchy of zero trust. There are things that are more basic, that if you donβt do this, you really canβt do anything else, and there are things that are really advanced, that once you can do basically everything else you can contemplate doing this. And there are a lot of things in between,β he said. βWe took those 46 capabilities based on their inherent logical relationships, and we came up with a prioritization scheme so that you could, if youβre an organization implementing zero trust, prioritize the products, process and technologies.β
Understanding cyber tool dependencies
DHS defined those 46 capabilities based on the organizationβs ability to perform that function to protect its data, systems or network.
Yeske said, for example, with phishing-resistant, multi-factor authentication, DHS didnβt specify the technology or product needed, but just the end result of the ability to authenticate users using multiple factors that are resistant to phishing.
βWeβre describing something your organization needs to be able to do because if you canβt do that, there are other things you need to do that you wonβt be able to do. We just landed on 46, but thatβs not actually all that weird. If you look at the Defense Departmentβs zero trust roadmap, it contains a similar number of things they describe as capability, which are somewhat different,β said Yeske, who spent more than 15 years working for the Navy and Marine Corps before coming to DHS. βWe calculated a 92% overlap between the capabilities we described in our architecture and the ones DoD described. And the 8% difference is mainly because the DHS one is brand new. So just understanding that the definition of each of these capabilities also includes two types of relationships, a dependency, which is where you canβt have this capability unless you first had a different one.β
Yeske said before he left DHS in July, the zero trust architecture and framework had been approved for use and most of the components had a significant number of cyber capabilities in place.
He said the next step was assessing the maturity of those capabilities and figuring out how to move them forward.
If other agencies are interested in this approach, Yeske said the DHS architecture should be available for them to get a copy of.
The post Yeske helped change what complying with zero trust means first appeared on Federal News Network.

Β© Getty Images/design master