Cybersecurity_Deep_Dive
Cybersecurity_Deep_Dive
Cybersecurity_Deep_Dive
• This castle and moat idea of we put everything in the middle, we protect it, and
then we put a protection line around it with water to make sure nobody can get
into that castle, allowed us to centralize our controls.
• Inside of that castle, we held our core assets, things like our money, our gold,
our wheat, our food stores, our people, things that were important to the
longevity of that castle, that kingdom, and ultimately your business.
• If you wanted to extend that and enable a third party, a new employee, to
connect, you needed to open up a drawbridge and allow someone to come in.
You had to provide controls to ensure that they could securely access the
resources they required without putting your castle and business at risk.
• They would've built a road between their empires and castles to protect
communication. Their trade, much like you and your branches, would extend
your branches with a secure network so you can enable connectivity between
your ecosystems.
• The more you expand, the bigger the challenges to protecting those services.
• Shadow IT, you see people using personal devices, BYOD.
• When you have this expanse of various network and security controls, a weak
link will be exploited.
• We have a diverse way of working, a diverse set of services, and a diverse set
of ecosystems we need to work in. It's no longer centralized.
That's why our enterprises need to start looking into new ways of working so
they're not creating multiple weak links or replicating the historical mistakes of
legacy infrastructure. We must move away from our historical mindset of a trusted
ecosystem and castle where we are protected.
● What is Security Service Edge?
○ Security service edge (SSE), as defined by Gartner, is a convergence
of network security services delivered from a purpose-built cloud
platform. SSE can be considered a subset of the secure access
service edge (SASE) framework with its architecture squarely focused
on security services. SSE consists of three core services: a secure
web gateway (SWG), a cloud access security broker (CASB), and a
zero trust network access (ZTNA) framework.
● In the SASE framework, network and security services should be consumed
through a unified, cloud-delivered approach. The networking and security
aspects of SASE solutions focus on improving the user-to-cloud-app
experience while reducing costs and complexity.
● You can look at a SASE platform in two slices. The SSE slice focuses on
unifying all security services, including SWG, CASB, and ZTNA. The other,
the WAN edge slice, focuses on doing so for networking services, including
software-defined wide area networking (SD-WAN), WAN optimization, quality
of service (QoS), and other means of improving routing to cloud apps.
● Delivered from a unified cloud-centric platform, SSE enables organizations to
break free from the challenges of traditional network security. SSE provides
four primary advantages:
● 1. Better Risk Reduction
○ SSE enables cybersecurity to be delivered without being tied to a
network. Security is delivered from a cloud platform that can follow the
user-to-app connection regardless of location. Delivering all security
services in a unified way reduces risk because it eliminates the gaps
often seen between point products.
○ SSE also improves visibility across users—wherever they are—and
data, regardless of the channels accessed. Additionally, SSE
automatically enforces security updates across the cloud without the
typical lag time of manual IT administration.
● 2. Zero Trust Access
○ SSE platforms (along with SASE) should enable least-privileged
access from users to cloud or private apps with a strong zero trust
policy based on four factors: user, device, application, and content. No
user should be inherently trusted, and access should be granted based
on identity and policy.
○ Securely connecting users and apps using business policies over the
internet ensures a more secure remote experience because users are
never placed on the network. Meanwhile, threats cannot move
laterally, and applications remain protected behind the SSE platform.
Apps are not exposed to the internet and thus can't be discovered,
which reduces the attack surface, increasing your security and further
minimizing business risk.
● 3. User Experience
○ By Gartner's definition, SSE must be fully distributed across a global
footprint of data centers. The best SSE architectures are purpose-built
for inspection in every data center, as opposed to vendors hosting their
SSE platforms in IaaS infrastructures.
○ Distributed architecture improves performance and reduces latency
because content inspection—including TLS/SSL decryption and
inspection—occurs where the end user connects to the SSE cloud.
Combined with peering across the SSE platform, this gives your
mobile users the best experience. They no longer need to use slow
VPNs, and access to apps in public and private clouds is fast
and seamless.
● 4. Consolidation Advantages
○ With all key security services unified, you'll see lower costs and less
complexity. SSE can deliver many key security services—SWG,
CASB, ZTNA, cloud firewall (FWaaS), cloud sandbox, cloud data loss
prevention (DLP), cloud security posture management (CSPM), and
cloud browser isolation (CBI)—all in one platform. Plus, if you don't
need everything right away, you can easily add any of these services
as your organization grows.
○ With all protection unified under one policy, all channels your users
and data traverse get the same consistent protection.
● 1. Secure Access to Cloud Services and Web Usage
○ Enforcing policy control over user access to the internet, web, and
cloud applications (historically performed by a SWG) is one of the
primary use cases for the security service edge. SSE policy control
helps mitigate risk as end users access content on- and off-network.
Enforcing corporate internet and access control policies for compliance
is also a key driver for this use case across IaaS, PaaS, and SaaS.
○ Another key capability is cloud security posture management (CSPM),
which protects your organization from risky misconfigurations that can
lead to breaches.
● 2. Detect and Mitigate Threats
○ Detecting threats and preventing successful attacks across the
internet, web, and cloud services are key drivers for adopting SSE and,
to a lesser extent, SASE. With end users accessing content across any
connection or device, organizations need a strong defense-in-depth
approach to malware, phishing, and other threats.
○ Your SSE platform must have advanced threat prevention capabilities,
including cloud firewall (FWaaS), cloud sandbox, malware detection,
and cloud browser isolation. CASBs enable inspection of data within
SaaS apps and can identify and quarantine existing malware before it
inflicts damage. Adaptive access control, whereby an end user's
device posture is determined and access is adjusted accordingly, is
also a key component.
● 3. Connect and Secure Remote Workers
○ The modern remote workforce needs remote access to cloud services
and private applications without the inherent risks of VPN. Enabling
access to applications, data, and content without enabling access to
the network is a critical piece of zero trust access because it eliminates
the security ramifications of placing the user on a flat network.
○ Providing secure access to private and cloud apps without needing to
open firewall ACLs or expose apps to the internet is key here. SSE
platforms should enable native inside-out app connectivity, keeping
apps "dark" to the internet. A ZTNA approach should also offer
scalability across a global network of access points, giving all your
users the fastest experience regardless of connectivity demands.
● 4. Identify and Protect Sensitive Data
○ SSE enables you to find and control sensitive data no matter where it
resides. By unifying key data protection technologies, an SSE platform
provides better visibility and greater simplicity across all data channels.
Cloud DLP enables sensitive data (e.g., personally identifiable
information [PII]) to be easily found, classified, and secured to support
Payment Card Industry (PCI) standards and other compliance policies.
SSE also simplifies data protection, as you can create DLP policies
just once and apply them across inline traffic and data at rest in cloud
apps via CASBs.
○ The most effective SSE platforms also deliver high-
performance TLS/SSL inspection to address encrypted traffic (that is,
most data in transit). Also key for this use case is shadow IT discovery,
which allows organizations to block risky or sanctioned applications
across all endpoints.
• This Training will cover the three main components of a successful zero-trust
architecture.
• (Animation) Verify Identity and Context
• (Animation) Control Risk
• (Animation) And Enforce Policy
● So let's get into the details of connectivity and why this is important.
• (Animation) When you look at, we have initiators, these are the requesters
of the connection, what needs to get access. That's the crux of the beginning.
• (Animation) Then we have the destinations, the applications we're trying to
connect to. This is the service that needs to be consumed.
● Historically, these initiators and destinations had to share the same network in
order to get access. If you wanted to provide a service to initiators in some
sort of ecosystem, there needed to be a way to get access to that. That
network had to be shared.
●
● And that's the crux of what we're talking about here, is that no longer has to
happen. In a zero trust world those initiators and destinations can be
anywhere and there's no reliance on that network as a control point anymore.
And then with a true zero trust architecture, we're not reliant on that network
anymore, but we're reliant on providing a true, secure, functional path by
verifying the initiator, controlling the access, and then ultimately delivering a
policy controller enforces the access as required. This connectivity really
needs to be anywhere regardless of location.
● Zero trust security is a big buzzword these days. While many organizations
have shifted their priorities to adopt zero trust, zero trust network access
(ZTNA) is the strategy behind achieving an effective zero trust model.
● The path to zero trust as an ideology is vague, so ZTNA provides a clear,
defined framework for organizations to follow. It's also a component of
the secure access service edge (SASE) security model, which, in addition to
ZTNA, comprises next-gen firewall (NGFW), SD-WAN, and other services in a
cloud native platform.
● While the need to secure a remote workforce has become critical, network-
centric solutions such as virtual private networks (VPNs) and firewalls create
an attack surface that can be exploited. ZTNA takes a fundamentally different
approach to providing secure remote access to internal applications based on
four core principles:
1. ZTNA completely isolates the act of providing application access from
network access. This isolation reduces risks to the network, such as
infection by compromised devices, and only grants access to specific
applications for authorized users who have been authenticated.
2. ZTNA makes outbound-only connections ensuring both network and
application infrastructure are made invisible to unauthorized users. IPs
are never exposed to the internet, creating a “darknet” that makes the
network impossible to find.
3. ZTNA’s native app segmentation ensures that once users are
authorized, application access is granted on a one-to-one basis.
Authorized users have access only to specific applications rather than
full access to the network. Segmentation prevents overly permissive
access as well as the risk of lateral movement of malware and other
threats.
4. ZTNA takes a user-to-application approach rather than a traditional
network security approach. The network becomes deemphasized, and
the internet becomes the new corporate network, leveraging end-to-
end encrypted TLS micro-tunnels instead of MPLS.