2.4 Network Security Models Flashcards
Perimeter-based security
Mainframe computers could be accessed by only a relatively limited number of remote job entry (RJE) terminals that were directly connected in physically secured areas.
Why perimeter-based security is insufficient
- Fail to account for sophisticated cyberthreats to penetrate perimeter defenses.
- Malicious users can gain access to the internal network and sensitive resources by using stolen credentials.
The primary issue with a perimeter-based network security
The assumption that everything on the internal network can be trusted.
Shortcomings of the broken trust model (such as port-based firewalls)
- Definitively distinguish good applications from bad ones.
- Adequately account for encrypted application traffic.
- Accurately identify and control users.
- Filter allowed traffic not only for known application-porne threats but also for unknown ones.
Zero Trust security
Essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of location.
Benefits of implementing a Zero Trust network
- Clearly improved effectiveness in mitigating data loss.
- Greater efficiency for achieving and maintaining compliance with security and privacy mandates.
- Improved ability to securely enable transformative IT initiatives.
- Lower total cost of ownership with a consolidated and fully integrated security operating platform.
Core Zero Trust design principles
- Ensure that all resources are accessed securely, regardless of location.
- Adopt a least privilege strategy and strictly enforce access control.
- Inspect and log all traffic.
Main components of a Zero Trust conceptual architecture
- Zero Trust Segmentation Platform.
- Trust zones (micro core and perimeter, MCAP)
- Management infrastructure (centralized mgmt)
Zero Trust Segmentation Platform
Network segmentation gateway used to define internal trust boundaries.
Ability to:
- Enable secure network access
- Granularly control traffic flow to and from resources
- Continuously monitor allowed sessions for any threat activity
Key Zero Trust criteria and capabilities
- Secure access
- Inspection of all traffic
- Least privileges access control
- Cyberthreat protection
- Coverage for all security domains
Implementing a Zero Trust design
- Collect traffic flows
- Define trust zones and incrementally establish corresponding trust boundaries based on relative risk and/or sensitivity.
- Deploy devices in appropriate locations to establish internal trust boundaries for defined trust zones.
- Configure the appropriate enforcement and inspection policies - Establish trust zones and boundaries for other segments.
- IT Mgmt
- Partner resources (B2B)
- High-profile customer-facing resources and connections(B2C)
- Branch offices in risky countries
- Guest access network
- Campus networks