02.05.2019 Views

Cyber Defense eMagazine May 2019

Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Zero Trust Security<br />

Security for the Cloud-Native Era<br />

By Amir Sharif, Co-founder at Aporeto<br />

<strong>Cyber</strong>crime on the Rise<br />

Every day, hackers succeed at gaining access to the well-protected systems. Adversaries are more<br />

skilled and better funded than ever, and traditional security measures are ineffective. In 2018, cybercrime<br />

cost the global economy an estimated $600 billion – about 0.8 percent of global GDP. Security, previously<br />

an afterthought in the world of cloud-native applications, has come to the forefront with this barrage of<br />

data breaches that highlight critical flaws with legacy data center security systems.<br />

These flaws? In a word (or two): IP addresses, and IP-based security. In the cloud-native era “location”<br />

is no longer bound to a single data center; using IP address as a proxy for identity in an attempt to secure<br />

applications becomes a fool's errand.<br />

Castles and Moats<br />

While most data centers are virtualized, they operate with the assumption that what is inside the firewall<br />

can be trusted, and what is outside cannot. This is also referred to as the “castle-and-moat” mentality,<br />

which focuses on the defense of the perimeters and turns a blind eye to anything already inside the castle<br />

walls (presuming they have previously been cleared for access). This highlights a key failing of firewalls<br />

and traditional perimeter security at large. If a malicious presence manages to gain access to the<br />

infrastructure, it can easily begin both north/south and lateral attacks and wreak havoc before its presence<br />

is even questioned.<br />

Despite its present-day failings, this was an acceptable approach to security when applications were<br />

monolithic or had a classic three-tier architecture. With the dawn of the cloud-native era, however,<br />

applications have become disaggregated across public and private cloud, and using IP addresses to<br />

secure applications becomes risky business. Broad adoption of both mobile and cloud technology has<br />

begun to erase the data center perimeter. (One way to visualize this is as your handheld devices as<br />

60

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!