The US Army has selected US cloud and edge computing company Akamai to develop a new cybersecurity software prototype for combat forces.
The software, part of the Tactical Identity Credential and Access Management (T-ICAM) project, is expected to significantly enhance the security of networks used by soldiers in the field.
“Zero Trust” cybersecurity principles will be implemented that assume the network has already been compromised and require continuous verification of users and devices.
“Key elements of ICAM provide Soldiers with authorized access to information through a new identity-based security model that incorporates authorized user identities and safeguards…” the Army said . said.
An initial prototype of the software is expected to undergo testing later this year. User feedback collected from the trial will be used to further configure the software, leading to a formal rollout in 2025.
“Zero Trust” Principle
With our “zero trust” principles, Akamai's cybersecurity software does not confer implicit trust in assets or users based solely on their physical or network location.
Instead, it continuously authenticates, authorizes, and validates access to systems, applications, and sensitive data.
The software also allows troops to see only what they personally need for a specific mission, reducing the risk of hackers stealing or forging credentials.
Most traditional cybersecurity systems allow soldiers to access everything on the network using only a unique ID and password, making them vulnerable to hackers.
“Malicious cyberattacks and degraded network environments must remain a constant threat in future large-scale combat operations,” said Program Executive Officer. Mark Kitts Said.
“T-ICAM helps our company by more securely and effectively providing access to networks and specific data to only authorized users, devices, applications, and services, even in the harshest operating environments. We strengthen our defenses while also preventing adversaries from accessing our network sites and services.”