Today’s federal IT leaders are faced with a broad range of challenges for securing their applications and environments. For example, agencies in the middle of migrating legacy applications to the cloud and/or deploying new cloud-native applications, as part of efforts to modernize government services, are under pressure to keep up with FISMA, DHS, NIST, and OMB guidelines. Agencies are strongly advised to obtain visibility into the open connections in these environments and to segment high value assets (HVAs) to maintain their security posture. This is also often referred to as zero-trust. The talent and resource constraints these agencies face add another dimension to these challenges.