{"id":603,"date":"2004-12-15T00:00:00","date_gmt":"2004-12-15T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/12\/15\/nsa-to-take-lead-on-defense-info-assurance-architecture\/"},"modified":"2021-12-30T11:37:47","modified_gmt":"2021-12-30T11:37:47","slug":"nsa-to-take-lead-on-defense-info-assurance-architecture","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/12\/15\/nsa-to-take-lead-on-defense-info-assurance-architecture\/","title":{"rendered":"NSA to take lead on Defense info assurance architecture"},"content":{"rendered":"<p>The National Security Agency is filling a new role in the Defense Department: leading the information assurance path DOD takes to becoming a network-centric workplace.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;We asked NSA to build an IA architecture.  NSA did a knock-your-socks-off job of doing this,&#8221; Guthrie said today at a lunch the American Council for Technology and Industry Advisory Council sponsored in Arlington, Va.<\/p>\n<p>The IA component calls for integrating security into the GIG by, among other things, authenticating credentials and security clearances.  NSA will put together a GIG Information Assurance Portfolio so DOD can have a go-to agency if portions of the grid lack adequate security, Guthrie said.<\/p>\n<p>&#8220;NSA will deliver a vision for what it&#8217;s going to take to secure the environment,&#8221; she said.  &#8220;This is a blueprint for us to effect this broad IA environment.&#8221;<\/p>\n<p>Guthrie also said the Pentagon is getting out of the business of application integration and moving more toward data-level integration.<\/p>\n<p>http:\/\/gcn.com\/vol1_no1\/daily-updates\/31383-1.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-603","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/603","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=603"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/603\/revisions"}],"predecessor-version":[{"id":3090,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/603\/revisions\/3090"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=603"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=603"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=603"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}