ÎÞÓÇ´«Ã½

Enabling Secure Data Sharing with Zero Trust

The Challenge: Secure Data Sharing

An intelligence community (IC) client was looking for a method to exchange data with multiple groups, organizations, and countries in a secure effective manner. The organization had good tagging and labeling policies and standards for data that were generated by individuals. But the organization lacked the ability to allow individuals to dynamically label and encrypt data, while dynamically enforcing a policy on which individuals could access that data. The organization was looking for the development and implementation of an entitlements manager.

The Approach: An Integrated Solution Using Commercial Off-the-Shelf Tech

We integrated multiple commercial off-the-shelf (COTS) products to provide an end-to-end secure method of exchanging data, allowing only individuals who have the appropriate rights/attributes to view parts or all the data. The entitlement manager grants, resolves, enforces, revokes, and administers fine-grained access entitlements to users. The solution provides a method for tagging and labeling data using the Trusted Data Format (TDF). Data is encrypted at the data element (e.g., structured, unstructured, and streaming) end to end and control is retained even if the data leaves the enterprise environment.

The Impact: Fixing a Gap in the IC Client’s Mission

Our solution resolved a gap in the IC client’s operational mission, transitioning the prototype we produced into a production implementation within their operational networks. This improved performance, while applying security to the edge. We moved from a pilot to full production and expanded the scope from one network classification to two.

Explore Our Insights on Zero Trust

Tech to Propel Your Mission and Business

ÎÞÓÇ´«Ã½ is the top provider of zero trust solutions to the U.S. government with unprecedented experience driving ZTA implementation at scale. Defense and intelligence organizations, federal agencies, and critical infrastructure businesses can implement zero trust cybersecurity with greater confidence and speed using our proven approach.