A New Fence: The Software-Defined Perimeter

  /     /     /  
Publicated : 22/11/2024   Category : security


A New Fence: The Software-Defined Perimeter


The network perimeter is dead: Long live the new perimeter! The boundary of your enterprise network can now be defined by software – but is that the right answer for your organization?



In todays digital environment, the user experience is everything. Thanks to the anytime/anywhere access theyve come to expect from consumer apps on tablets and smartphones, workers want the same no-fuss experience in their business applications. They dont want anything to change because theyre out of the office or using a phone, compared to being at their desks.
Add in the need for speed, and you can see why businesses are embracing the flexibility and agility of the cloud. But with more and more applications moving off the corporate network, and more employees working remotely, youre faced with a challenge: the systems designed to securely connect those users to their apps are ineffective in the cloud. In fact, theyre practically irrelevant.
Lets look at how businesses offer secure remote access. Whether your apps are in the data center or cloud, users access them using 20-year-old virtual private network (VPN) technology. (VPNs were never meant to connect users to applications –- they were intended to connect networks to networks.) The problem is that bringing users from a remote network (via the Internet) onto a trusted or secure network just to access an application within is inefficient at best, and risky at worst.
If you grant outside users access to your network by way of a VPN, you are significantly broadening your attack surface and elevating risk. A partner or employee whose system has been compromised can infect your network, and malware can then move laterally, scanning for other resources and other vulnerabilities to exploit.
For example, weve all seen what happens when a remote user is compromised and they connect back to a network that has lateral access to a credit card payment processing environment or can communicate with sensitive back end financial systems. These types of breaches can, and have, put companies in the headlines and cost them fortunes.
In addition, many companies use a VPN to secure access to applications that are not even in the data center; instead, theyve migrated to an infrastructure-as-a-service (IaaS) provider like AWS or Azure. To make this access possible, traditional VPNs require painful, hairpin-type traffic routing that moves traffic from the user to the corporate data center where the VPN concentrator is and out via another VPN to the IaaS provider before making its return trip back to the user. Its a slow and miserable experience for the user, an ongoing challenge for the administrator, and an expensive piece of technology that raises security concerns of its own.
Traditional VPNs are laborious, requiring users to take different actions depending on where they are and what applications they are accessing. Some examples are:
When outside the office, users must connect to a VPN before attempting access to applications, but when inside the office theres no need to connect.
Or, a user may attempt to access an application from a tablet, but is denied because there is no VPN client configured on the device.
Then there is the issue of a network that they are connecting from simply not supporting the communication requirements (ports and protocols) for a corporate VPN.
Sometimes the VPN doesnt work.
Sometimes users just need more. A very common scenario is clicking on a link within a corporate email account only to have the page that was attempted to load not work because they arent on the corporate network and its not something that is exposed externally.
Defining the perimeter differently
Its no longer enough to create a secure perimeter around your network assets. You need to flip the security model, basing it not on the location of the network but on policies tied to the user and application. This approach lets you provide fast, secure and efficient access that connects the right user to the right app, so youre not exposing your network and internal users to risk. With direct access to the applications needed, youre also providing a far superior user experience.
We can no longer risk the security of our networks by using outdated, inefficient and ineffective methods that dont adapt to new technological realities. Software-defined perimeters (SDP) offer a way of keeping networks safe and agile, while keeping employees satisfied and productive and helping you meet desired business outcomes.
Please join us for the remainder of this series on the software-defined network. In the following weeks, well offer insights on application invisibility, using the Internet as a secure network and application segmentation without network segmentation. (For more insights on the SDP approach, check out the Cloud Security Alliances
SDP Security Model
.)
Related posts:
KRACK Attack: How Enterprises Can Protect Their WiFi
Where Should Security Live?
Simple Steps to Online Safety for Cybersecurity Awareness Month
— Patrick Foxhoven is CIO and VP of Emerging Technologies at Zscaler.

Last News

▸ Travel agency fined £150,000 for breaking Data Protection Act. ◂
Discovered: 23/12/2024
Category: security

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
A New Fence: The Software-Defined Perimeter