{"id":1723,"date":"2025-06-20T07:27:31","date_gmt":"2025-06-20T05:27:31","guid":{"rendered":"https:\/\/thedefencenews.com\/?p=1723"},"modified":"2025-06-08T10:00:58","modified_gmt":"2025-06-08T08:00:58","slug":"us-army-looks-for-zero-trust-capabilities-to-ensure-its-data-is-secure-in-tactical-network-architectures","status":"publish","type":"post","link":"https:\/\/thedefencenews.com\/?p=1723","title":{"rendered":"US Army looks for zero trust capabilities to ensure its data is secure in tactical network architectures"},"content":{"rendered":"<p><strong>The US Army is on the hunt for zero trust\u00a0capabilities to ensure its data is secure in tactical network architectures,\u00a0according to a\u00a0request for information\u00a0published Monday.<\/strong><\/p>\n<p>The service\u2019s\u00a0C5ISR Center is soliciting information from interested businesses to help find zero-trust solutions that can \u201cintegrate seamlessly\u201d into the Army\u2019s existing infrastructure while operating in denied, degraded, intermittent or limited (DDIL) environments. The service is calling such capabilities\u00a0Tactical Data in Use Security (DUCES) solutions.<\/p>\n<p>\u201cThis constrained, highly dynamic, and adversarial-susceptible tactical environment will be a challenge to implement ZT solutions that meet mission needs,\u201d the RFI reads.<\/p>\n<p>The Army is turning to zero trust to protect its data as it has found that \u201ctraditional\u201d security models aren\u2019t cutting anymore given the ever-increasing complexity of cyber threats, according to the RFI.<\/p>\n<p>The solicitation is specifically looking for solutions that offer advanced capabilities in encryption and anomaly detection in addition to \u201csecure communication protocols\u201d that protect against current and future threats.<\/p>\n<p>The concept of zero trust has gained considerable momentum in recent years as data leaks and the proliferation of adversarial attacks on critical infrastructure have surmounted. At its core, zero trust follows the philosophy \u201cnever trust, always verify\u201d and assumes that the network is always compromised. This means that instead of allowing users to have free reign over a network, there are constant checks to make sure that users are allowed to access what they are trying to access. This verification happens through\u00a0identity, credential, and access management, or ICAM.<\/p>\n<div id=\"div-id-for-TL-inline-1\" class=\"sponsor-inline\">\n<div class=\"widget sponsored-inline\">\n<div class=\"sponsored-inline__content\">\n<h3 class=\"sponsored-inline__title show-on-tablet\"><a href=\"https:\/\/breakingdefense.com\/2024\/10\/take-lessons-learned-from-joint-exercises-and-turn-them-into-capabilities\/\">Enabling seamless operations across land, air, sea, space, and cyber<\/a><\/h3>\n<div class=\"sponsored-inline__excerpt standard-excerpt\">\n<p>the RFI is not the first time the Army has searched for zero-trust solutions at the tactical edge. Last spring the service chose cloud and edge-computing company Akamai to develop prototype Tactical ICAM<del>\u00a0<\/del>capabilities for its combat units. However, the service didn\u2019t go through the typical procurement process or fire out an RFI for Akamai\u2019s prototypes. Instead, it used the streamlined Software Acquisition Pathway\u00a0and a flexible\u00a0Other Transaction Authority\u00a0contract to get Akamai\u2019s products in the hands of the warfighters much quicker.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The US Army is on the hunt for zero trust\u00a0capabilities to ensure its data is secure in tactical network architectures,\u00a0according to a\u00a0request for information\u00a0published Monday. The service\u2019s\u00a0C5ISR Center is soliciting [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1751,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[43,28],"tags":[410,77],"class_list":["post-1723","post","type-post","status-publish","format-standard","has-post-thumbnail","category-army","category-military-tech","tag-tactical-network-architectures","tag-us-army"],"jetpack_featured_media_url":"https:\/\/thedefencenews.com\/wp-content\/uploads\/2025\/03\/US-ATMY-RFI.png","_links":{"self":[{"href":"https:\/\/thedefencenews.com\/index.php?rest_route=\/wp\/v2\/posts\/1723","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedefencenews.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedefencenews.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedefencenews.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedefencenews.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1723"}],"version-history":[{"count":3,"href":"https:\/\/thedefencenews.com\/index.php?rest_route=\/wp\/v2\/posts\/1723\/revisions"}],"predecessor-version":[{"id":2016,"href":"https:\/\/thedefencenews.com\/index.php?rest_route=\/wp\/v2\/posts\/1723\/revisions\/2016"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedefencenews.com\/index.php?rest_route=\/wp\/v2\/media\/1751"}],"wp:attachment":[{"href":"https:\/\/thedefencenews.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1723"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedefencenews.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1723"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedefencenews.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1723"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}