31.07.2023 Views

The Cyber Defense eMagazine August Edition for 2023

Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

somewhere–the hasty embrace of ZTNA was shortsighted, and has led to further complication, false<br />

starts, and budget waste <strong>for</strong> early adopters.<br />

99 Security Problems, Now ZTNA is 1<br />

While initial ZTNA solutions have undoubtedly marked a notable step <strong>for</strong>ward in addressing remote<br />

access security concerns and generally popularizing the concept of zero trust, the technology itself is<br />

problematic on several fronts:<br />

Implementation is a Bear<br />

If you’ve implemented a ZTNA solution, you know it’s not a “plug and play” operation. Far from it. Instead,<br />

you’ll be sidelined by the need to redesign your network architecture from the outset. That may sound<br />

dramatic, but it’s true. Chances are that your perimeter-based security apparatus can’t immediately<br />

secure individual applications and verify every access request no matter the network location of the user.<br />

So, you’re <strong>for</strong>ced to establish an encrypted tunnel between the user and the target application. This<br />

means sending traffic externally (likely to a third-party cloud service), and then back to your network to<br />

verify the request and authenticate the user.<br />

In short, you’ve got your work cut out <strong>for</strong> you from a re-engineering perspective. You also have a greater<br />

chance of dealing with latency due to the external traffic routing, which can disrupt productivity. For many,<br />

these issues make ZTNA implementation a non-starter, which means it’s actually hampering the growth<br />

of zero trust adoption.<br />

Physical Networks Are Ignored<br />

Sure, securing access <strong>for</strong> your remote work<strong>for</strong>ce needs to be a priority – that's not a question. People<br />

still work in the office and rely on your organization’s physical wired and wireless networks, however.<br />

While a balance has largely been struck on hybrid work across most industries, many companies have<br />

tamped down on full-time remote work.<br />

This is really just to say that ZTNA misses the mark when it comes to the reach of its zero trust coverage.<br />

<strong>The</strong> same “trust no one, ever” policy needs to be applied to those plugged into the ethernet or connected<br />

to the Wi-Fi at the office. Without support <strong>for</strong> these access layers, companies using ZTNA are <strong>for</strong>ced to<br />

adopt another tool (or set of tools) - primarily network access control (NAC) - to define and en<strong>for</strong>ce<br />

authentication, authorization, and accounting (AAA) policies <strong>for</strong> its on-site users. As anyone in IT knows,<br />

the more tools you have to manage, the greater the threat surface.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2023</strong> <strong>Edition</strong> 124<br />

Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!