Thursday, June 26, 2025

Comply-to-Join and Cisco ISE: Revolutionizing the Division of Protection


The Protection Data Techniques Company (DISA) performs a basic position in guaranteeing that the U.S. Division of Protection (DoD) has the required data know-how and communications help to satisfy its mission. Amongst its many initiatives, DISA’s Comply-to-Join (C2C) is an important framework that enhances community safety. On this weblog, we are going to discover how DISA’s C2C strategy is transformative, with simplified compliance and a centralized platform. Particularly, one which automates the invention of endpoints – all accomplished with using Cisco’s Id Providers Engine (ISE).


If it’s linked, it’s protected

As Cisco’s Space Chief for Cybersecurity supporting United States Nationwide Safety entities and the DoD, I’ve the privilege of witnessing an evolution in how our authorities is securing its most important data belongings. I even have the distinct honor of nonetheless carrying the uniform, serving as a Lieutenant Colonel with the Military Nationwide Guard. In my army position, I function my Commander’s G6, or Chief Data Officer, overseeing all features of mission important data; from dissemination to move to storage and the whole lot in between.

Why Cisco ISE is important

DISA’s Comply-to-Join strategy is designed to scale back vulnerabilities and improve the resilience of the DoD’s data community towards more and more refined cyber threats. That’s the place Cisco ISE may also help. It’s the business’s most generally adopted and awarded community entry and management (NAC) resolution, but it surely’s a lot greater than that. It permits the creation and enforcement of safety and entry insurance policies for endpoint units linked to the companies’ networks. Not solely, that however ISE could be deployed within the cloud as nicely and is filled with all the identical enhancements and options discovered within the on-premises model.

Cisco ISE is an important part within the implementation of DISA’s C2C strategy. For Cisco’s Federal Clients, Cisco ISE has maintained market dominance with a platform strategy to securing entry that’s built-in, not bolted into the community. I encourage you to observe my temporary dialogue on how they’re higher collectively:

Comply-to-connect ISE for DoD

How Cisco ISE enhances DISA’s Comply-to-Join mandate

With Cisco ISE, our Nationwide Safety & Protection groups are closing the gaps in gadget visibility by enabling and enhancing DoD community administration and safety methods. Within the area, I’ve seen how Cisco ISE has assisted the Division of Protection within the following methods.

  • System Profiling: Cisco ISE excels at figuring out and profiling units making an attempt to entry the community. It will possibly dynamically classify endpoints into particular teams, providing granular management over community entry.
  • Coverage Enforcement: Cisco ISE automates the enforcement of safety insurance policies, ensuring that every one units adjust to the required safety necessities earlier than they’ll hook up with the community. This adherence to coverage enforcement is important in sustaining the integrity of DISA’s C2C strategy as a result of if these units don’t comply, they’re not getting on the community. Easy as that.
  • Menace Containment: When a menace is detected, Cisco ISE can rapidly comprise it by limiting community entry or fully blocking the gadget from the community. This speedy response diminishes the catastrophes {that a} dangerous actor can do whereas considerably decreasing the potential harm from any safety breaches.
  • Steady Monitoring: Cisco ISE constantly screens the safety posture of linked units, guaranteeing that they continue to be compliant with the newest safety updates and insurance policies. This fixed monitoring is important for sustaining the continued safety of the community below the C2C framework. Even after a tool is let on to the community, it nonetheless will get rechecked each time to ensure that it’s protected.
  • Scalability: Cisco ISE could be scaled to accommodate giant, numerous networks. This scalability is important for a large group just like the DoD, guaranteeing that every one units, no matter quantity or location, could be securely managed below the C2C framework.

Assembly DoD Zero Belief mandates

Cisco ISE with Comply-to-Join is the bridge that helps our mission centered stakeholders meet their five-year zero-trust technique as a result of it’s the very best Zero Belief coverage choice level. Cisco ISE makes use of adaptive insurance policies to repeatedly confirm belief, implement trust-based entry, and rapidly reply to adjustments in belief for resilient incident response.

As outlined within the DoD Zero Belief Technique doc,[1] adopting zero belief requires a shift from a perimeter-based mannequin for belief to a “multi-attribute-based” mannequin for belief utilizing authentication and authorization that enforces least privileged entry. By simply integrating into present environments, Cisco ISE simplifies the transition to zero belief entry – particularly for complicated and huge networks just like the DoD.

Conclusion

I really like that I’m part of the Cisco workforce as a result of Cisco’s Safety options are an indispensable device in our Nationwide Safety and Protection arsenal towards cyber threats. And with the combination of Cisco ISE with DISA’s Comply-to-Join strategy, we’re serving to to supply a strong and complete resolution for managing community entry and enhancing cybersecurity. One that’s enabling the DoD with the important functionality to profile units, implement insurance policies, comprise threats, and constantly monitor safety compliance.

By guaranteeing that every one units adjust to the newest safety updates earlier than accessing the community, the C2C strategy is considerably bolstered by Cisco Safety’s capabilities, enhancing the resilience of DISA’s data community towards cyber threats.

Subsequent steps for Comply-to-Join success

 

Reference

[1] DoD Zero Belief Technique (October 2022) – PDF

 

 

Share:

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles