02.05.2019 Views

Cyber Defense eMagazine May 2019

Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Legacy Infrastructure<br />

Legacy infrastructure and network devices are most certainly not zero trust-aware. They have no concept<br />

of least privilege or lateral movement, and they do not possess authentication models that dynamically<br />

allow for modifications based on contextual usage.<br />

Any zero trust implementation requires a layered, or wrapper, approach to enable these systems.<br />

However, a layered approach entails wrapping the external access to the resource and rarely can interact<br />

with the system itself. This defeats the premise of zero trust. You cannot monitor the behavior within a<br />

non-compatible application. You can screen scrape, keystroke log, and monitor logs and network traffic<br />

to look for potentially malicious behavior, but your reaction is limited. You can only limit the external<br />

interaction of the legacy device to the user or other resources—but not the runtime itself.<br />

This limits the coverage of zero trust, and based on the characteristics of legacy infrastructure,<br />

organizations may find that even monitoring network traffic is not feasible due to heavy encryption<br />

requirements, including emerging standards like TLS 1.3.<br />

P2P Communication<br />

If you think your organization does not use peer-to-peer (P2P) networking technology, you are probably<br />

unaware of the default settings in Windows 10.<br />

Starting in 2015, Windows 10 enabled a P2P technology to share Windows Updates among peer systems<br />

to save internet bandwidth. While some organizations turn this off, others are not even aware it exists.<br />

This represents privileged lateral movement between systems that is fundamentally uncontrolled. While<br />

no vulnerabilities and exploits have materialized for this feature, it does present communications that<br />

violate the zero trust model. There should be no unauthorized lateral movement—even within a specified<br />

micro perimeter.<br />

In addition, if you use mesh network technology, you will find that they operate completely counter to zero<br />

trust. They require P2P communications in order to operate, and the trust model is based strictly on keys<br />

or passwords with no dynamic models for authentication modifications.<br />

Therefore, if you decide to embrace zero trust, you need to investigate if your organization has P2P or<br />

mesh network technologies, even for wireless networks. These present a huge stumbling block to<br />

embracing the access, segmentation, and microperimeter controls required for zero trust.<br />

Digital Transformation<br />

Even for organizations that are in a position to build a brand-new datacenter, implement a role-based<br />

access model, and embrace zero trust 100%, there is the challenge posed by digital transformation.<br />

43

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!