Rethinking on Zero Trust Architecture Solutions
There is a lot of news about massive data breaches. Look at the list of data breaches in Aug 2021 alone here: https://www.itgovernance.co.uk/blog/list-of-data-breaches-and-cyber-attacks-in-august-2021-61-million-records-breached
And some breaches seem to be via lateral attacks. Zero trust security is supposed to treat every system and user untrusted until verification. If that is the case, why were these lateral attacks so successful? Answer may lie in the following.
Let us dig further
Many organizations went with perimeter security by deploying this security at the edge of their private clouds or VPCs of public clouds. Intention was that if the entire private cloud/VPC is protected from threats coming from the Internet, it is good enough.
The way this N-S security works is as follows:
Application is not one monolith. It consists of multiple services. Traditionally, one used to think of an application consisting of three tiers - Front end tier (that terminates the user sessions), backend tier (that does most of the business logic) and database tier. Even within these tiers, it may not be one entity. In the microservice architecture pattern, there could be multiple microservices in each tier. Due to this, there is a lot of E-W traffic, that is, one single N-S user request may result in multiple E-W transactions across microservices.
I think E-W traffic is not addressed well in ZTA solutions today. Good number of breaches have this sequence.
ZTA solutions are supposed to stop even if attackers get control of the frontend system, they shall not be able to attack other services. Based on few examples of massive data breaches, it appears that backend services are trusting the frontend services for all types of connections/traffic. One would imagine that each service via ZTA authenticates each client microservice and authorizes specific resources to be accessed based on the type of client microservice. But, it does not seem so. Possible causes (Repeating here).
My understanding, good number of ZTA solutions are deployed in this fashion:
Some important points to note from above picture are:
领英推荐
Let us see a few challenges with this model.
As shown above, there are few challenges in the current model.
One solution that addresses the above challenges is shown below. This solution treats every entity as suspicious and does not trust anybody until verified. It avoids any middle security functions. It does not depend on application developers to implement any security logic. It provides superb control to DevSecOps and that control is uniform across all applications.
In this model, there is a N-S proxy for protecting frontend services from the external users. Also there is a sidecar proxy associated with each microservice to protect services from others. All the security functionality is taken care of by the proxies. Service Mesh is already becoming popular in Microservice architecture patterns by taking care of Mutual TLS, Authentication, Authorization and traffic management. We believe that by enhancing service mesh with threat security & contextual RBAC based authorization, this can truly become ZTA for modern applications. Some of the enhancements we believe are required are shown in dark color in the below picture.
This solution, with its comprehensive security (ZTA, threat security, communication security) along with the application microservice (yet outside of the business logic) provides following benefits
In summary, I believe that the service mesh technology such as ISTIO/Envoy with few enhancements can be a comprehensive ZTA solution.
Father | Nerd | Veteran
3 年Ron Kearns, CISSP ? CCSP ? SSCP
Sr. Director, High Tech Semiconductor Industry Security Multi-Cloud Security | Telco/Edge Cloud | Private 5G Networks | Cyber Physical IoT/OT/Product Security | Supply Chain Security | Zero Trust | Confidential Computing
3 年Lets talk someday -
Research And Development Software Engineer @ Keysight Technologies | PhD
3 年Really nice and well written article. Learn something new today. Security and identification issues in E-W traffic.
Chief Business Officer | LinkedIn Top Voice 2024 | Telecom Media Technology Hi-Tech | #VPspeak
3 年Thanks Srinivasa. I just posted on this topic today from the mobile network angle. Some interesting points in your article. ??
Head of Infrastructure Platforms @ PayPal
3 年Srinivas, Thanks for sharing your thoughts. I enjoyed reading your post. Wondering, are you currently working on any solution around this? If so, I will be interested to connect with you to exchange notes: Couple of major issues with Service mesh solutions that we are seeing : - scaling at the site level - latency increase everything going through sidecar - ability to support an environment with variety of workloads (container, non-container type)