Traditional infrastructure security vs Cloud native security

Traditional infrastructure security vs Cloud native security

For tradional infrastructures; anyone inside the corporate network was trusted, and anyone outside wasn’t trusted.

Along with perimeter-based security often comes layered security. Layered security meant that IT teams would put perimeters of security around individual assets. The attacker has to go through multiple security layers to get access to critical assets.

Authorized users, on the other hand, could go past these layers of security because they’d already be in the perimeter. Then they would log into a machine that would give them IT resource access.

The perimeter and layered approach made more sense when the network was almost entirely on-premises and often Windows-based. The first ring of security would usually be focused on identity. That meant a user would need access to a domain. Then, the layer after that might have been anti-malware protection. From there, a third layer would focus on data and applications often.

The outer layer would be the network perimeter itself, with VPNs, firewalls, intrusion detection, and other security features.

Importance of Zero-Trust Model

Here there’s no trusted internal network versus an untrusted external network. Access is based on the user and not the location, network, or device.

First, networks aren’t on-premises. Second, networks aren’t Windows-based anymore either.

The assumption with Zero Trust is that a network has been compromised. Every user must prove that they aren’t an attacker. There is strict identity verification, even if a user or device is already in the network.

Even once a user accesses the network, they have limited accessibility.

As organizations begin implementing Zero Trust, they have a combination of non-integrated on-premises and cloud applications. There’s fragmentation that has to be dealt with by IT.

This brings about the need for Identity and Access Management or IAM. This is often the first actual step that has to be completed. That means consolidation of fragmented identities under a single IAM system across the cloud and on-premises. For example, this might specifically include single-sign-on. Then, there might be a second authentication factor layered on that.

- There is often the inclusion of context-based policies. That means that there are signals gathered about the context of each user, such as device and location context.

- The next part of the process for Zero Trust is a focus on authorizing and authenticating access.

Advantages of Zero Trust are that it’s easier to detect and stop phishing emails that target employees. This approach can be effective at stopping lateral movement if there’s a breach, whereas with perimeter-based security, once a bad actor has access, they can move about in an unlimited way. It protects against something like a stolen developer password or the exfiltration of a database by a compromised application host. Micro-segmentation can prevent data breaches in general and keep lateral movement contained. It’s possible to have more visibility into workloads, devices, users, and components across the environment. Zero-trust puts an emphasis on continuous monitoring for signs of compromise. There’s enhanced organizational security but also consistency in the user experience.

Regardless of the underlying infrastructure, it’s possible to implement security protection across multiple environments.

Tanya Gandhi

Corporate Media| Public Relations| Strategy| Branding|Management consulting. A global perspective and ambition to transform the future with the right innovation and communication.

3 年

I really enjoyed reading this!

Pierre-Baptiste Landoin

CEO @Icypeas | Love discussing lead generation, sales automation, marketing hacks and entrepreneurship

3 年

Awesome!

Ryan Arriaga

Steering ships in unchartered waters

3 年

The post made me think, thanks Ayush!

要查看或添加评论,请登录

Ayush Pandey的更多文章

  • The Looming Shadow of Misinformation: How Falsehoods About AGI Threaten its Future

    The Looming Shadow of Misinformation: How Falsehoods About AGI Threaten its Future

    Artificial general intelligence (AGI) has long been a topic of both fascination and fear. It holds the promise of…

  • P-adic numbers are beautiful

    P-adic numbers are beautiful

    Large scale complex decentralized distributed systems collect large amounts of data. In order to understand these…

    73 条评论
  • IoT Hybrid Cloud Edge Cyber Attack Security

    IoT Hybrid Cloud Edge Cyber Attack Security

    Large scale deployed Internet of Things (IoT) devices using cloud- and edge-based services with complex dynamic IoT…

    125 条评论
  • Hybrid Cloud Edge 5G IoT Open Networking

    Hybrid Cloud Edge 5G IoT Open Networking

    Google Distributed Cloud Edge allows operators to run radio access network(RAN) functions and core network elements at…

    62 条评论
  • OpenDayLight OpenFlow OpenVSwitch

    OpenDayLight OpenFlow OpenVSwitch

    OpenDayLight is a SDN controller that provisions the network policies as specified and sends that information to the…

    67 条评论
  • Container Management Systems | Consistency & Persistent Data Protection in Cloud-Fog-IoT

    Container Management Systems | Consistency & Persistent Data Protection in Cloud-Fog-IoT

    It may get difficult to recollect or reconciliate after one's been too engrossed in implemeting an application/model a…

    72 条评论
  • Monitoring service level matrics

    Monitoring service level matrics

    In order to understand if your system is reliable, available, or useful; a deep understanding of SLOs, SLAs, and SLIs…

    76 条评论
  • Monitoring vs Observability

    Monitoring vs Observability

    Few excerpts from the book I felt worth noting down. Monitoring does not require a human operator; it can and should be…

    68 条评论
  • Access control, attribute based access control, public key encryption

    Access control, attribute based access control, public key encryption

    The signature method used to capture a specific threat and not allow the threats to interfere with the cloud data…

    70 条评论
  • Scale-up vs Scale-out

    Scale-up vs Scale-out

    Monolithic is a term primarily used in software architecture which means a system is tightly coupled. Monolithic apps…

    51 条评论

社区洞察

其他会员也浏览了