Security-first

Security-first

You'll find the Castillo de San Marcos National Monument area in St. Augustine, Florida. This sign depicts its "defense in depth" strategy, designed to make it very difficult for enemies to even reach the fort's formidable stone walls.

Unfortunately, defense in depth has failed us in the cybersecurity world, mainly because networks with day two security are almost impossible to defend (over 99% of cyberattacks exploit our business networks).

In the cybersecurity world, we need defense in depth, but it needs to be "security-first".

Cloud-first, API-first…security-first

The world’s leading innovators are building security-first products, and it will be table stakes by the 2030s:

  • 2010s: cloud-first
  • 2020s: API-first
  • 2030s: security-first (secure by design)

Cyberattackers love your network?

Most products don’t yet include built-in secure networking.? Instead, IT or OT is expected to securely connect the products via day-two networking bolt-ons.? The results have been disastrous - just about every cyberattack uses the network to exploit its target.?

Security-first software is a cyberattacker’s worst nightmare

Security-first products include built-in secure networking.? These products are secure by design and secure by default.? IT or OT is no longer put in the mission impossible situation of trying to transform default insecure products into secure products.??

VPN = broken

Because the secure by design product includes built-in secure networking, it is no longer dependent on the horrors of VPN, MPLS (Direct Connect, ExpressRoute, etc.), private mobile APN, open firewall ports, etc.??

Soon, if a product requires bolting-on VPNs, or any type of day two bolt-ons, then the product will be considered to be incomplete, broken or unsellable.??

Cut off the oxygen

Your servers and databases are the target – they have the data the cyberattacker wants.? Secure by design products result in these servers being unreachable from the networks (your network is the tool the cyber attackers use against you, and the tool which the cyberattacks depend on – your network is the oxygen of 99% of cyberattacks).??

This unreachable attribute of secure by design products means the attacker can’t get to your data, even if the attacker has the user account (e.g. Snowflake, JPMC), or if the server has a zero day vulnerability (e.g. Microsoft, MOVEit).? Cut off the oxygen (the insecure network) and you have time to deal with these things, because your data is not exposed.? Similarly, your B2B APIs and servers are no longer reachable (e.g. Marriott, LinkedIn), and your third parties don’t get inbound network access (e.g. Home Depot, Equifax).

How many cyberattackers are hanging out in your data center?

Secure by design products assume that there is always malware or zero days lurking in the shadows. Therefore, the server outbound network access is removed, so that any existing malware can’t wake up and exfiltrate data (e.g. UnitedHealth), or ‘phone home’ to its command and control (C2) server (e.g. Solarwinds).

So, rather than breach your data from anywhere on the planet, the attacker needs to walk into your data center, console into your server, and then walk back out with your data (or sprint out without face planting or dropping the hard drives).

Secure by design is simple and transparent

A beautiful feature of this new approach is it is simple to test.? It is a 2-item, yes-no checklist, and both items are easy to answer:

  1. Does the product require open inbound firewall ports (on IT, OT or cloud firewalls)
  2. Does the product require VPN, MPLS, private mobile APN or any other form of day two, bolted-on, private networking (for any use case - from OT M2M to multicloud APIs to remote management to third party access)?

If both answers are “no”, then the product is secure by design, and IT/OT are not being asked to miraculously transform inherently insecure products into secure ones.?

Security-first will arrive in the blink of an eye

The secure by design pioneers will quickly push the model to mainstream - a product will soon be considered incomplete or broken if it isn’t secure by design - if the product does not included built-in secure networking.? I will mention a few of these pioneers below.?

In the blink of an eye, the old model will seem like the pre-Internet, pre-mobile or pre-cloud world, and the security-first model will enable our businesses to advance.

Yousef Khalidi Dominik Münsterer Yogesh Kaushik Michael Fey Rodrigo Bernardinelli Michael Rosenbloom Achim Knebel Jedidiah Bartlett Steve Lindsey Evan Gilman Brad W. Luca Simoncini Wendy Nather Dwayne Bradley Ram Gupta Chad Cravens Sameer Malhotra Tony Scott Frederik Schmidt Dan Amiga Rajani Kolli Peter Sch?nemann Ganesh Srinivasan Greg Shields JOHN WILSON Chenxi Wang, Ph.D. Rajesh Dronamraju Alissa Valentina Knight Wolfgang Schwering Rolando Carrasco Erik Young David Lawrence Bill Fitzpatrick Damir Jaksic Nir Gaist

Damir Jaksic

Digital Transformation Leader | CIO | Driving Change, Strategy & Cyber Security | Board-Level Decision Maker

8 个月

Nicely explained, no wonder you guys have a great product!

回复

Amen Galeal Zino! The technologies exist to provide a much more secure infrastructure. Just need more executives and engineers to be aware, to prioritize, and execute!

Great, concise write up Galeal!

要查看或添加评论,请登录

Galeal Zino的更多文章

  • Develop once, deploy anywhere, deliver everywhere

    Develop once, deploy anywhere, deliver everywhere

    Adding secure networking to the developer platform empowers product teams to develop once, deploy anywhere and deliver…

    2 条评论
  • The AI fork in the road

    The AI fork in the road

    We are at a fork in the road. In one direction, AI is basically meaningless in the context of cybersecurity and…

    1 条评论
  • Your private AI is public

    Your private AI is public

    Many enterprises are deploying private AI. Keeping the AI (e.

    4 条评论
  • The only way to win the cybersecurity war

    The only way to win the cybersecurity war

    I know the future I don’t have a crystal ball, nor a predictive AI, but I do know how the next UnitedHealth, Snowflake…

    2 条评论
  • UnitedHealth breach

    UnitedHealth breach

    Note: I helped with the breach recovery but all info below is public, and all opinions are my own. The notorious $1.

    10 条评论
  • Open source magic

    Open source magic

    Open source innovation "No matter who you are, most of the smartest people work for someone else” This terrific…

    1 条评论
  • Simple, secure LLMs accelerates innovation

    Simple, secure LLMs accelerates innovation

    Generative AI value is highest when the LLMs are simple and secure to manage. So NetFoundry is thrilled to help AI…

    2 条评论
  • Zero trust Ansible

    Zero trust Ansible

    DevOps goals hit a brick wall You already know how awesome Ansible is. Unfortunately, you have also experienced the…

    3 条评论
  • A trillion dollar cybersecurity assumption

    A trillion dollar cybersecurity assumption

    Cyberattacks will cost us $1 trillion this year, despite our spending of $150 billion trying to protect ourselves. Old…

    3 条评论
  • Attacking Ransomware

    Attacking Ransomware

    Gas, toilet paper, ransomware and the business WAN The ransomware attack on the Colonial Pipeline business WAN raised…

社区洞察

其他会员也浏览了