Cyber Defense eMagazine May 2019
Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group
Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Legacy Infrastructure<br />
Legacy infrastructure and network devices are most certainly not zero trust-aware. They have no concept<br />
of least privilege or lateral movement, and they do not possess authentication models that dynamically<br />
allow for modifications based on contextual usage.<br />
Any zero trust implementation requires a layered, or wrapper, approach to enable these systems.<br />
However, a layered approach entails wrapping the external access to the resource and rarely can interact<br />
with the system itself. This defeats the premise of zero trust. You cannot monitor the behavior within a<br />
non-compatible application. You can screen scrape, keystroke log, and monitor logs and network traffic<br />
to look for potentially malicious behavior, but your reaction is limited. You can only limit the external<br />
interaction of the legacy device to the user or other resources—but not the runtime itself.<br />
This limits the coverage of zero trust, and based on the characteristics of legacy infrastructure,<br />
organizations may find that even monitoring network traffic is not feasible due to heavy encryption<br />
requirements, including emerging standards like TLS 1.3.<br />
P2P Communication<br />
If you think your organization does not use peer-to-peer (P2P) networking technology, you are probably<br />
unaware of the default settings in Windows 10.<br />
Starting in 2015, Windows 10 enabled a P2P technology to share Windows Updates among peer systems<br />
to save internet bandwidth. While some organizations turn this off, others are not even aware it exists.<br />
This represents privileged lateral movement between systems that is fundamentally uncontrolled. While<br />
no vulnerabilities and exploits have materialized for this feature, it does present communications that<br />
violate the zero trust model. There should be no unauthorized lateral movement—even within a specified<br />
micro perimeter.<br />
In addition, if you use mesh network technology, you will find that they operate completely counter to zero<br />
trust. They require P2P communications in order to operate, and the trust model is based strictly on keys<br />
or passwords with no dynamic models for authentication modifications.<br />
Therefore, if you decide to embrace zero trust, you need to investigate if your organization has P2P or<br />
mesh network technologies, even for wireless networks. These present a huge stumbling block to<br />
embracing the access, segmentation, and microperimeter controls required for zero trust.<br />
Digital Transformation<br />
Even for organizations that are in a position to build a brand-new datacenter, implement a role-based<br />
access model, and embrace zero trust 100%, there is the challenge posed by digital transformation.<br />
43