Citizen confidence in government institutions and public servants depends on trust. Citizens need to trust that the individuals and agencies representing them will act in good faith to protect their interests. Whether it’s the safety of food, medications, infrastructure, information, or national security, the sustainability of the social contract between the government and its constituents requires persistent attention to retain the public’s trust.
For governments to function, the flow of data on a massive scale is required—including sensitive information about critical infrastructure, public safety, and security. The higher the stakes in data sensitivity, the more attractive the information is to malefactors for reasons that range from financial gain to political influence. It should come as no surprise that the security of government information systems is subject to constant attempted attacks.
The Zero Trust model
The Zero Trust security model adheres to three pillars:
- Explicit verification of every access request.
- Use of least privileged access with just-in-time adaptive risk-based access policies.
- Assume breach mentality to minimize potential damage to, or loss of data from, additional parts of the organization.
The rest of the post:Government data protection—earning and retaining the public’s trust with Microsoft 365 is inside the hyperlink.