TLDR:
- The Army has selected Akamai to develop prototype cybersecurity software for combat units under the T-ICAM project.
- T-ICAM aims to bring modern “zero trust” cybersecurity to battlefield networks, allowing for individualized access based on user roles.
The Army has chosen cloud and edge-computing company Akamai to create prototype cybersecurity software for combat units as part of the T-ICAM project. This project, Tactical Identity Credential & Access Management, is a crucial step towards implementing “zero trust” cybersecurity measures in the military. By leveraging Akamai’s expertise in accelerating internet connections for civilian consumers and businesses, the Army aims to enhance the security of its tactical networks. The software will be tested by combat units in field trials and is scheduled for a larger rollout in 2025. This initiative represents a shift from traditional acquisition methods, utilizing the Software Acquisition Pathway and Other Transaction Authority contract to streamline the process.
The T-ICAM project focuses on modern cybersecurity techniques that assume network breaches are inevitable and therefore monitor user activity closely to ensure that access is granted only to necessary resources. This approach aims to mitigate risks associated with stolen or compromised credentials, a common vulnerability in traditional cybersecurity practices. The implementation of Identity, Credential, & Access Management (ICAM) in tactical settings presents unique challenges due to the rugged nature of devices and unreliable network connections in battlefield environments. The Army’s selection of Akamai for this project signals a strategic partnership aimed at enhancing cybersecurity measures for combat units operating in challenging operational environments.
The ultimate goal of the T-ICAM project is to extend commercial ICAM capabilities to tactical units, providing secure and efficient network and data access to authorized users even in harsh operational conditions. By integrating zero-trust cybersecurity principles into battlefield networks, the Army aims to bolster its defenses against cyber threats and ensure that sensitive data remains protected. This initiative represents a significant step towards modernizing the Army’s cybersecurity posture and aligning with evolving threats in the information age.