The Big Truth Salt Typhoon Reveals About Network Security
What You'll Learn:
Join us on January 23rd for an informative discussion, "What the Salt Typhoon Hack Reveals About Network Security" regarding how you can safeguard your data against Salt Typhoon with high-performance encryption. Register here.
End-to-end encryption has taken on new importance following recent guidance from the FBI and CISA urging organizations to make securing network communications a critical priority. The shift stems from a newly uncovered hack by Salt Typhoon, a group associated with China’s Ministry of Public Security — now being called one of the largest hacks of U.S. infrastructure in history.
The campaign, which compromised major trusted telecoms including AT&T, Verizon, and others, prompted U.S. government agencies to do a 180 on their previous guidance discouraging the use of encrypted messaging platforms (think WhatsApp, etc.). Encrypted communications have historically put strain on regulators who are less able to gain access to their contents during the course of criminal investigations. The fact that the agencies are now reversing course on their previous advice shows just how potent this newly discovered threat is.
While we do have practical advice for businesses looking to implement end-to-end encryption within their network communications — which we’ll dive into below — this event is truly a wake-up call for businesses concerned with the security of their information. The scale and scope of this hack, as well as the major players and providers affected, shine a light on vulnerabilities that can exist within even the largest organizations. Ultimately, it’s up to each company to understand and take responsibility for their own security posture. Organizations who trusted “private circuits” from service providers like Verizon and others to protect their data and didn’t invest in encryption need to look into ways to encrypt those circuits.
?? Key Alert: Even "private circuits" from major telecoms like AT&T and Verizon were compromised in the Salt Typhoon hack. Private doesn't mean secure - encryption is essential regardless of your connection type.
The Fallacy of Private Circuits
Many customers trust private circuits from their providers, assuming that because they are not on the internet, they inherently secure traffic. This perception drives the use of private connectivity solutions like AWS DirectConnect and Azure ExpressRoute. However, this is a fallacy — and in the end, many customers fail to encrypt data on these circuits because they trust the provider. While Media Access Control Security (MACsec) is sometimes used for encryption, it is often complicated, expensive, and seems unnecessary. Ultimately, what “private” does not equate to “secure”, and organizations must take control of their privacy with encryption.
You may ask: If private circuits aren’t private, why use them at all? If encryption is the answer either way, why not just do it over the internet instead of private circuits?
There are three main reasons companies pair private circuits with MACsec:
Security Risks Associated with MACsec
While MACsec provides encryption, it can also introduce vulnerabilities due to its operational design, if you don’t own all the hops. Each physical router along the data path must decrypt your data, and because those physical routers may be owned by another entity, the decrypted data is not under your control.
This process of decryption and re-encryption at every hop leaves the data unencrypted, exposing it to potential interception and exploitation when the data traverses third-party networks, where the routers involved are often outside your ownership or control, making it difficult to ensure consistent security measures.
This security shortcoming, combined with hardware dependencies, licensing costs, and operational complexities, raises significant concerns about MACsec’s overall effectiveness. To protect your network, you must critically assess whether MACsec aligns with your organization’s security needs and explore more secure alternatives.
MACsec’s encryption method leaves gaps that hackers could exploit:
?
MACsec Encryption Increases Complexity and Costs
MACsec encryption also intensifies the challenges of cloud complexity — already an issue for overworked networking teams — and high costs:
?
You Can Do Better than MACsec: Recommended Alternatives
Aligned with CISA’s guidance, organizations should:
?
MACsec’s limitations in security, cost, and operational complexity make it an ineffective solution for today’s hyper-connected cloud applications. By integrating end-to-end high-performance encryption (HPE) at the network layer in place of MACsec, organizations can better secure their networks, meet stringent compliance requirements, and gain operational efficiency.
Understanding MACsec and how to improve your organization’s encryption is a solid first step toward building your in-house network security muscle and taking back control of your overall network security posture. Another great step? Connect with our cloud networking experts to discuss your unique security challenges. You can also:
Network & Cyber Transformation / Strategic GTM / Helping People & Companies Solve Big Problems / Category Creation / Advisor
2 个月Good to learn about