ALWAYS VERIFY - ExpertFocus - The tenets of zero trust for secure access and software-defined perimeter - Pulse Secure

Page created by David Knight
 
CONTINUE READING
ALWAYS VERIFY - ExpertFocus - The tenets of zero trust for secure access and software-defined perimeter - Pulse Secure
ExpertFocus
Brought to you by Pulse Secure                                       January 2019

                NEVER TRUST,
             ALWAYS VERIFY
                         The tenets of zero trust for secure access
                              and software-defined perimeter
ALWAYS VERIFY - ExpertFocus - The tenets of zero trust for secure access and software-defined perimeter - Pulse Secure
ExpertFocus

Building zero trust for secure
access and exploring the
software-defined perimeter
Our dynamic world of mobile and cloud computing requires advancing secure access capabilities based on
continuous verification and authorization — the old moat-and-castle perimeter model is as outdated as, well,
moats and castles. Here’s why and how to apply Zero Trust model for Hybrid IT access and how software-defined
perimeter adoption will expand in the years ahead. Steve Zurier explains.

W         hen China started building its Great Wall more
          than two millennia ago, the technology was
          appropriate to keep invaders out and protect the
Chinese people’s lives and property. Today, that technology
is, for the most part, obsolete. Functionally it would
                                                                               cation controls to users, devices,
                                                                               applications and network resources
                                                                               as part of perimeter-based access
                                                                               security. This is all about prov-
                                                                               ing identity, location, device, and
                                                                               security state before and after being
                                                                               granting access based on least privi-
keep out only the most basic ground attacks, not unlike
                                                                               lege to applications and resources in
the traditional technology designed to protect network                         the data center and multi-cloud.
perimeters.                                                                      Scott Gordon (CISSP), chief
                                                                               marketing officer at Pulse Secure
  But basic network devices from           While traditional perimeter de-     shared that “the dynamic provision-
just a decade ago are hardly a          fenses are still crucial to set cor-   ing of virtual network and cloud
match for today’s sophisticated at-     porate boundaries on the internet,     applications and resources, as well
tacker in this age of mobile devices,   along with the use of firewalls,       as the diversity of users and devices
cloud applications and anywhere         virtual private networks (VPNs)        requesting access have materially
anytime access. How can securi-         and network access control (NAC)       contributed to the security breaches
ty managers protect the company         technologies to assure role-based      and identity theft that are in the
when such a large percentage of the     and segmented access to network        headlines. One gap is visibility.
staff works outside the corporate       resources, the security industry has   Enterprises do not have accurate
environment and the vast majority       been implementing a Zero Trust         data or insight into who or what is
of users now run cloud apps, mobile     model to mitigate malware, attack,     accessing their resources. IT can not
devices and other non-corporate         breach and data leakage risks. A       see the insecure devices and connec-
computing technologies? Clearly,        Zero Trust model applies authen-       tions that are propagating viruses or
something has to change.                tication, authorization and verifi-    leaking sensitive data. IT can only

                                                                                                www.pulsesecure.net • 2
ALWAYS VERIFY - ExpertFocus - The tenets of zero trust for secure access and software-defined perimeter - Pulse Secure
ExpertFocus

                            “Think of Zero Trust as a security model and
                            SDP as the upcoming security architecture that
                            companies will use to manage access security
                            for hybrid IT”
                                                                     – Rob Koeten, chief software architect, Pulse Secure

account for 70% of devices on their      lost passwords, and unavailable            Perimeter (SDP). SDP leverages the
network and are thus susceptible to      services.”                                 Zero Trust tenet of ‘never trust, al-
IoT exploits. Another gap is access        Gordon adds: “So where is this           ways verify’ by essentially enabling
policy granularity and enforcement       all heading and how can secure             secure access directly between the
consistency. When IT staff have          access be fortified? As businesses         user and their device to the appli-
many disparate security systems and      take advantage of mobile workforce         cation and resource no matter the
policy components to manage, an          and consumers, they have also been         underlying infrastructure - but in a
enterprise’s secure access controls      actively migrating their data centers      scalable way and according to pol-
can not be broadly instrumented,         and “webifying” applications to the        icy. In a sense, SDP enables Secure
and orchestration becomes cumber-        cloud. To this end, security profes-       Access elasticity as users gain easy
some if not piecemeal. This also im-     sionals have been building out an          means for access protection which
pacts user productivity as employees     application-based access security ar-      travels with them everywhere they
content with multiple login requests,    chitecture called Software Defined         go, with what devices they use, and

How does your company deliver/consume                      When do you expect to fully deploy a Software Defined
corporate applications and computing resources?            Perimeter platform across your hybrid IT environment?

Data Center
                                    67.14%
                                                           Currently deploying
                                                                                                     20%

                                                           Within 1-2 years
                                                                                                           25.71%
Public Cloud (SaaS)
                                        41.43%
                                                           Within 2-4 years
                                                                                                       21.43%

                                         48.57%
Public and

                                                                                                  32.86%
Private Cloud                                              No plans or
(IaaS)                                                     over 4 years

                                                                                                     www.pulsesecure.net • 3
ALWAYS VERIFY - ExpertFocus - The tenets of zero trust for secure access and software-defined perimeter - Pulse Secure
ExpertFocus

                           “SDP leverages the Zero Trust tenet of ‘never trust,
                           always verify’ by essentially enabling secure
                           access directly between the user and their device
                           to the application and resource no matter the
                           underlying infrastructure - but according to policy.”
                                                                    – Scott Gordon, chief marketing officer, Pulse Secure

where ever the application resides.”      cess until the users has been validat-     extends access all the way from the
  Rob Koeten, chief software archi-       ed by the SDP system.                      user and device through the data
tect at Pulse Secure, explains that          “Think of Zero Trust as a securi-       center or multi-cloud, leveraging
SDP works hand-in-glove with the          ty model and SDP as the upcoming           Zero Trust functionality,” says
Zero Trust architecture. With Zero        security architecture that compa-          Prakash Mana, Pulse Secure’s vice
Trust, the network treats everyone        nies will use to manage access secu-       president of product management.
the same — suspiciously and with          rity for hybrid IT,” Koeten says.          Before granting access, an SDP sys-
no trust — and does not grant ac-            “Pulse Secure’s approach to SDP         tem will take five distinct actions:

 Survey respondents optimistic about SDP
 A recent poll of security professionals by SC Media found that while security professionals believe that a software
 defined perimeter (SDP) can dramatically improve security, a transition to this new model will take several years.
   The survey found that 78 percent of respondents thought it was very likely or likely that SDP could isolate apps
 from an untrusted network. Seventy percent say SDP will improve DevOps security and 62 percent say it can
 improve IoT threat management.
   Overall, 64 percent of the respondents were either extremely confident or very confident that SDP could manage
 security access requirements from the data center and across the cloud.
   “The survey shows that the respondents think that security is gradually getting better,” says Chris Christiansen,
 a senior analyst with the Hurwitz Group. “I think if you separated it out by vertical, the financial sector would
 have much higher confidence and with manufacturing and medical it would be much lower.”
   Christiansen adds that like in many other situations a small percentage of early adopters will lead the way. He
 points out that while confidence remains high, roughly one-third still have no plans to deploy SDP in the next four
 years. Only 20 percent were currently deploying SDP and 26 percent planned to deploy it in the next two years.
   “SDP requires that people think about security in a different way,” Christiansen says. “Most people still view
 security as an obstacle. The way SDP will sell with people is if the vendors focus on what it will do for the busi-
 ness. In the future, security will be baked into the applications and it will let people do their jobs easier, faster and
 without fear that the lack of security will cripple their businesses, causing extended litigation and a costly foren-
 sics process.” — SZ

                                                                                                       www.pulsesecure.net • 4
ALWAYS VERIFY - ExpertFocus - The tenets of zero trust for secure access and software-defined perimeter - Pulse Secure
ExpertFocus

                         “Gradually evolving to the new SDP security
                         methodology is, in the long-term, best interests
                         of the business.”
                                                               – Chris Christiansen, senior analyst, the Hurwitz Group

5 questions to ask before implementing SDP
Chris Christiansen, a senior analyst with the Hurwitz Group says there’s a long laundry list of questions security
managers should ask before deploying a Zero Trust security stance with a software defined perimeter (SDP), along
with offering suggestions on how to move forward.
  1. Do you have a consensus on the level of risk the company is willing to take? Explain to management that in this
mobile world based on clloud applications the old way of doing security is no longer the recommended option. Ex-
plain that moving to SDP will take time and that while there’s a certain level of risk to deploying a new technology,
gradually evolving to the new SDP security methodology is, in the long-term, in the best interests of the business.
  2. What is your corporate access policy? Figure out what your policy is today and what you need it to be going
forward. Do you want to go from simple passwords to complex passwords and two-factor authentication? How
can you best do that?
  3. Have you talked to your DevOps people? Work with the DevOps team and get them on board with embedding
secure access into all the applications they develop. Odds are they will be receptive to working in this manner
because they are typically well-schooled technologists who understand what is at stake.
  4. What regulations impact the company? All public                What is the likelihood that the following
companies are subject to Sarbanes-Oxley Act (SOX)              vulnerabilities would be addressed by applying
and have requirements that specify different levels of           software-defined perimeter/hybrid IT secure
information access. SDP can play a huge role in helping a                   access technology? (Weighted avg.)
company meet those requirements in a much more secure Isolate apps from
way. The same holds true for companies that must abide        untrusted network                                 4.01%
by the Payment Card Industry Data Security Standard
(PCI DSS) and Health Insurance Portability and Ac-
                                                              Computing resource
                                                              segmentation                                     3.94%
countability Act (HIPAA) requirements. Only companies Improved DevOps security
                                                                                                               3.94%
that accept or process credit or debit cards must comply
with PCI DSS, but any company that offers medical ben-        App and resource
                                                              workload availability                           3.89%
efits or handles medical data must comply with HIPAA.
  5. Does our potential SDP vendor “talk techie” or do        Unauthorized data access                       3.84%
they focus on business benefits? Too many vendors lose
potential customers by explaining the intricacies of SDP.
                                                              Consistent hybrid
                                                              IT access policy                               3.84%
Find a vendor that has podcasts, videos, and webcasts
that can explain to the rank-and-file staff within the        Malware, ransomware                             3.83%
business how these new security measures will help them
do their jobs more efficiently and securely.
                                                              IOT threat management                          3.71%

                                                                                                   www.pulsesecure.net • 5
ALWAYS VERIFY - ExpertFocus - The tenets of zero trust for secure access and software-defined perimeter - Pulse Secure
ExpertFocus

                              “Pulse Secure’s approach to SDP extends
                              access all the way from the user and device
                              through the data center or multi-cloud,
                              leveraging Zero Trust functionality.”
                                                  – Prakash Mana, vice president of product management, Pulse Secure

   1. Identify and authenticate the          4. Assess the service request. For      always been protecting the private
user. Is the user an employee or a         which services (applications and          health records of its sensitive patient
third-party contractor and in what         resources) is the user authorized to      data. However, over the past sever-
department do they work? This step         access? Is the service from the data      al years, the physicians have been
identifies the user to ensure that         center, the cloud, or perhaps a cli-      looking for a way to view electronic
they have appropriate rights to ac-        ent-server application service? And       medical records remotely, so protect-
cess not only the network, but also        what access rights do they have? If       ing patient data is more problematic
the data they are requesting.              the user is a company salesperson,        since the user is often remote. Many
   2. Authenticate and assess the de-      for example, he or she should have        of the company’s employees work
vice. Is it a desktop computer that sits   access to client lists, sales forecasts   at different facilities and they all
on the internal network or perhaps a       and quarterly results reports, but        wanted the convenience of accessing
mobile device owned by an authenti-        not human resources information           work information at home or while
cated user? At this point the software     on employee salaries, sensitive           traveling from site to site.
identifies not only the device, own-       medical records, or any proprietary         While the hospital’s administra-
ership and operating system, it also       intellectual property.                    tors wanted to grant the medical
confirms compliance configuration            5. Establish secure connection. An      staff remote electronic access to
and if the device is authorized to         SDP Controller will communicate           patient information, they had to en-
access the app or resource. It deter-      to the endpoint and the network           sure that the technology was secure
mines the security state.                  resources closest to the application      and offered the ability to restrict
   3. Determine the network. How is        and data to determine if the access       access based on a person’s role
the user trying to access the net-         request should be granted according       within the hospital system. Doctors
work? Is the user coming from the          to policies maintained in the SDP         and nurses would get different lev-
corporate network, an airport, or          Controller. If access is granted and      els of access to patient information
a local coffee shop network where          the security state has not changed,       than administrative staff or medical
security is typically less secure? Per-    the SDP Controller will send in-          technicians, for example.
haps the user is trying to connect         structions to the respective entities       By implementing a zero trust-
from a home network with a router          in order to establish a protected         based approach, Borgess extended
issued by a cable company. Authen-         connection between the device and         data center and cloud access out to
ticating the user’s location can help      the application.                          1,200 employees, not just the med-
determine if this is really the user                                                 ical staff, also making it possible
or someone using compromised               Zero Trust in action                      for employees to work remotely.
credentials, trying to access from a         At Borgess Health Alliance in Ka-       Pulse Secure’s approach let them
location inappropriate to the user.        lamazoo, Mich., a top priority has        customize access policy based on

                                                                                                       www.pulsesecure.net • 6
ALWAYS VERIFY - ExpertFocus - The tenets of zero trust for secure access and software-defined perimeter - Pulse Secure
ExpertFocus

                           “You can call it SDP if you want, but the
                           bottom line emphasis will be less on firewalls
                           and more on access management.”
                                                                                 – Edward Amoroso, CEO, TAG Cyber

department, position and role with-     Use cases for SDP                       which an application gets divided
in the company, ensuring they were      Koeten outlines three use cases for     into two parts: the piece that is
continually protecting the private      companies to transition to a Zero       available to the user and the portion
medical information of the more         Trust security model based on an        that the administrator can access.
than 1 million patients Borgess         SDP architecture.                       In the SDP model, it is now possible
serves.                                   Secure cloud apps: As companies       for most any company to realize
   “Pulse Secure not only gener-        move applications such as email,        Zero Trust advantages with built-in
ated immediate cost savings for         timesheets, and travel and expense      security for everyone who accesses
our organization, but it also saved     reports to the cloud, the old perime-   an application. In many situations,
our physicians’ valuable time. The      ter methods of security do not work.    companies will increase the require-
benefits were also passed on to our     The security team can provide better    ments for administrators to get
patients – our top priority – en-       security by having a perimeter model    access to privileged segments. So
suring their private medical data       based on access rights that a compa-    based on access rights, users gain
remained secure, while at the same      ny can extend outside the traditional   access to the basic features of the
time enabling their doctors to focus    data center. Based on specifically      application, while administrators
more on care and less on logistics,”    assigned roles and permissions, users   can gain privileged access to update
said Jeff Johnson, information secu-    are granted access to each, discrete    tables, delete tables, or add another
rity technical specialist at Borgess    business application.                   databases instance.
Health Alliance.                          Secure DevOps teams: The rise of        Koeten says he expects compa-
   Pulse Secure’s granular access       the cloud has also seen the emer-       nies to migrate to SDP over several
policy engine supported data pri-       gence of the DevOps. With cloud         years, adding that it will not require
vacy compliance regulations and         apps, the gateway must be deployed      a rip-and-replace of the company’s
fostered a better work-life balance     dynamically within the apps as          security infrastructure.
for their practitioners. Medical        they are developed and deployed.          “Companies will take an evolu-
staff could now leave work at more      Based on this approach, security        tionary path to an SDP architec-
reasonable hours knowing that they      and access rights get rolled into the   ture,” Koeten says. “Certainly the
could check records and complete        application, so no application ever     early adopters will be more aggres-
paperwork from anywhere and on          gets deployed without building SDP      sive, but as companies deploy more
the device of their choice. More so,    in from the outset.                     cloud apps, they can simply build
they did not have to understand the       Secure privileged access: Start-up    SDP into the new apps. The idea is
intricacies behind the technology; it   companies that deliver cloud apps       that over time, the company can get
just worked with no disruption of       to customers have pioneered an          more consistent coding security into
workflow.                               approach of micro-segmentation in       the application and there will be

                                                                                                 www.pulsesecure.net • 7
ALWAYS VERIFY - ExpertFocus - The tenets of zero trust for secure access and software-defined perimeter - Pulse Secure
ExpertFocus

                           “Pulse Secure not only generated immediate
                           cost savings for our organization, but it also
                           saved our physicians’ valuable time.”
                                                               – Jeff Johnson, information security technical specialist,
                                                                                               Borgess Health Alliance

less room for errors. This will lead    ly because many of the audits are          eter that goes with employees and
to many fewer misconfigurations.”       based on firewall logs; companies          business partners wherever they go.
   Edward Amoroso, CEO of secu-         just cannot go off that system all         Moving forward, company networks
rity consultancy TAG Cyber, says,       at once. It is going to take them          will trust no one and users will only
“Secure access is the new perimeter.    time to adjust to the new model as         have access to the applications and
You can call it SDP if you want, but    they migrate more of their business        data set in policy rules.
the bottom line emphasis will be        applications to the cloud.                    The raison d’etre for Zero Trust
less on firewalls and more on access      “The perimeter works about as            and SDP, the company maintains,
management.”                            well as police tape around a phys-         is that if you cannot prove who
   Amoroso explains that enterprises    ical crime scene” Amoroso says.            you are, prove the device is yours,
will find that rehosting enterprise     “It prevents honest people from            prove you are running over a secure
workloads, one-by-one, into a           entering a clearly delineated space        network, and prove you are allowed
virtualized data center or cloud eco-   but does nothing to stop determined        to use that service or application,
system, will become the best way        and capable actors from climbing           you should not gain network access.
to manage data and applications.        underneath or going around. The            This will make life much more
Each time a workload gets hosted,       new solution requires distributed,         difficult for the hackers who have
it should receive micro-segmented       virtualized, compartmentalized data        preyed on misconfigurations and
security protection, which allows       protection. So people ask me ‘Is the       poor access and password manage-
security pros to simplify the DMZ       perimeter dead?’ I tell them, ‘No, it’s    ment.
firewall ruleset. The end goal          not dead; it’s just changed.’”                With SDP, supporters of a Zero
becomes zero-trust, with device-to-       Effectively the perimeter exists         Trust model maintain, the hackers
cloud access of hosted workloads in     wherever people work. Security pro-        will have to wind their way through
the cloud with no perimeter in the      fessionals cannot build a line in the      multiple access barriers, something
traditional sense.                      sand and guarantee that from a cer-        that will knock out many of the
   Amoroso agrees with Koeten that      tain point at the edge of the network      low-level players. While there will
companies will migrate to SDP over      bad threat actors cannot penetrate         always be threats, Zero-Trust offers
time. He says there is no reason to     the corporate network. One can             companies a fighting chance to stay
take all the firewalls down main-       think of SDP as an extended perim-         secure. n

                                                                                                    www.pulsesecure.net • 8
ExpertFocus

    Pulse Secure offers easy, comprehensive Secure Access solutions
    that provide visibility and seamless, protected connectivity between
    users, devices, things and services. The company delivers suites that
    uniquely integrate cloud, mobile, application and network access to
    enable hybrid IT. More than 20,000 enterprises and service providers
    across every vertical entrust Pulse Secure to empower their mobile
    workforce to securely access applications and information in the data
    center and cloud while ensuring business compliance. Learn more at
    www.pulsesecure.net
Get Your Head
                                                                                                 out of the Clouds.
                                                                     Zero Trust Access Security for Hybrid IT

Your business is taking advantage of cloud, and taking on increased
malware, IOT, availability and data leakage risks.

More than 20,000 enterprises entrust Pulse Secure to deliver Zero Trust
security to empower their mobile workforce to access resources from the
data center to the cloud while ensuring business compliance.

Learn why at pulsesecure.net/zerotrust

Copyright 2018 Pulse Secure, LLC. All rights reserved. Pulse Secure and the Pulse Secure logo are registered trademarks or Pulse Secure, LLC.   pulsesecure.net
You can also read