The Defense Information Systems Agency (DISA) took a major step forward with the advent of Thunderdome Production Other Transaction Agreement (OTA), hereafter referred to as Thunderdome, an innovative early adoption toward zero trust architecture providing secure network and data access. This initiative marks a pivotal moment in the evolution of cybersecurity within the Department of Defense (DoD). In this TechSource article, we’ll delve into the transformative opportunity of Thunderdome and how it promises to shape the future of cybersecurity and defense for the DoD.
Thunderdome, part of DISA's Zero Trust Program, is set to disrupt the industry’s traditional approach to cybersecurity. The innovative program offers a comprehensive suite of solutions and partners to harden DoD networks and empower warfighters to proactively defend against adversarial activity.
The program integrates a range of commercial-off-the-shelf technologies, including Secure Access Service Edge (SASE), Zero Trust Edge (ZTE), Software-Defined Wide Area Networks/Customer Edge Security Stack (CESS), Application Security Stacks and visibility and Analytics. These elements work together seamlessly to enhance both security and network performance within the existing enterprise environment, thus presenting a comprehensive approach to cybersecurity and complying with the Zero Trust Executive Order 14028 and the DoD CIO Zero Trust Strategy.
Thunderdome accelerates the achievement of the nation's cybersecurity objectives, making it a dynamic component in modernizing and strengthening national defense.
At the core of Thunderdome lies a Zero Trust concentration, a paradigm that challenges previous cybersecurity perceptions. Zero trust embraces principles that include:
The key design principals of Thunderdome include:
Implementing Zero Trust architecture comes with its set of challenges, and Thunderdome was engineered to address these obstacles. Legacy infrastructure, data management, identity management, and the management of large volumes of logs are among the hurdles that defense departments and agencies will address to successfully implement a zero-trust approach.
With Thunderdome as part of DISA’s Zero Trust Architecture (ZTA) implementation, the goals tackle the following challenges to:
Thunderdome offers a unique level of flexibility in its deployment, catering to the diverse needs of DISA and DoD mission partners. The implementation of Thunderdome provides tailored deployment options, empowering each organization to choose the model that aligns best with their specific requirements and operational preferences.
Considerations for Choosing the Right Deployment Option
Thunderdome stands as a testament to the innovative nature of Zero Trust. It is not merely a technological modernization but a mindset shift in cybersecurity. By assuming the core tenets of Zero Trust’s "never trust, always verify" stance and allowing only least-privileged access, Thunderdome represents a comprehensive shift in how the DoD protects high-value assets in real time.
The at-scale deployment of Thunderdome signifies a significant leap forward in the DoD's journey toward a ZTA. As cybersecurity threats continue to evolve, Thunderdome's impact will be instrumental in safeguarding the nation's critical assets and data. Its ability to provide a proactive defense cyber strategy reflects the forward-thinking approach required to defend against modern threats. Thunderdome is not just a technology; it's a new way of thinking about cybersecurity that enables the DoD to meet zero trust implementation plans today.
Reach out to the Thunderdome Program Management Office at DISA:
disa-pmothunderdome@groups.mail.mil