Zero trust in a hybrid architecture

Hybrid IT Europe
Hybrid IT Europe Hybrid IT Europe
Zero Trust in Hybrid Architectures
Patrick Sullivan
Director: Security Strategy
Akamai Technologies
Agenda
• Drivers of change in a Hybrid environment
• Zero Trust Overview
• How to incorporate Zero Trust into your transition to Cloud
©2017 AKAMAI | FASTER FORWARDTM
Golden Era of Network Perimeter
App #2
App #1
App #3
● Users & apps inside
● Inside = Trusted
● Walls work
● Threats remain outside
©2017 AKAMAI | FASTER FORWARDTM
Applications Are Moving Outside
App #2
App #1
App #3
● IaaS & SaaS
● Hybrid
● Inconsistent visibility,
security & control
● Confusing end-user
experience
©2017 AKAMAI | FASTER FORWARDTM
Users Have Moved Outside
App #2
App #1
App #3
● Mobile
● Digital ecosystem
● Global distribution
● Remote workers
©2017 AKAMAI | FASTER FORWARDTM
Threats Are Moving Inside
App #1
App #2
App #3
● Security architecture
vulnerabilities leveraged
in complex attacks
● Malware, phishing &
data exfiltration
● Credential theft
● Single factor
authentication
● Lateral network
movement
©2017 AKAMAI | FASTER FORWARDTM
Zero trust
Users & apps anywhere
Verify & never trust
Application access
App #1
App #2
App #3
There is no
inside...
Current Trends Require Zero Trust
App #2
App #1
App #3
Inside =
trusted
Users & apps inside
Trust at Network Layer
Full network access
©2017 AKAMAI | FASTER FORWARDTM
“The data economy renders today's network,
perimeter-based security useless. As businesses
monetize information and insights across a complex
business ecosystem, the idea of a corporate perimeter
becomes quaint - even dangerous.”
Excerpt from Forrester’s Future-Proof your Digital Business
with Zero Trust Security
©2017 AKAMAI | FASTER FORWARDTM
What’s Zero Trust?
Security model evangelized by Forrester Research
Key principles:
● The network is always assumed to be hostile.
● External and internal threats exist on the network at all
times.
● Network locality is not sufficient for deciding trust in
a network.
● Every device, user, and network flow is authenticated
and authorized.
● Policies must be dynamic and calculated from as many
sources of data as possible.
John Kindervag
©2017 AKAMAI | FASTER FORWARDTM
Rob Joyce: Chief NSA TAO
USENIX Enigma 2016:”Disrupting Nation State Hackers”
©2017 AKAMAI | FASTER FORWARDTM
©2017 AKAMAI | FASTER FORWARDTM
Cloud, IoT, BYoD, Partner relationships all expand trust boundaries
“What are you doing to shore up the trust boundary of the things you really
must defend?”
“Most networks….Big castle walls…Hard outer shell….Soft gooey center”
©2017 AKAMAI | FASTER FORWARDTM
Case Study: Google BeyondCorp
©2017 AKAMAI | FASTER FORWARDTM
©2017 AKAMAI | FASTER FORWARDTM
Akamai Architecture
Laptop
Micro Perimeter
Apps
Enterprise
App Access
©2017 AKAMAI | FASTER FORWARDTM
Browser Based Access & No Public IP
©2017 AKAMAI | FASTER FORWARDTM
Hybrid Zero Trust Architecture
Data Center
App #3
Cloud
App
SaaS
App
App #1
App #2
Branch
Roaming
Global Proxy Platform
> Performance Overlay
> WAF, AntiBot
Enterprise Connector
> Secure dial-out
> Deployed as VM or container
Global Proxy Platform
> Connection establishment
> Single sign-on
> Multi-factor authentication
Better Security and Better Performance
Before = 10.5 sec.
After = 5.5 sec.
©2017 AKAMAI | FASTER FORWARDTM
Divorce Trust from Network Topology as you adopt Hybrid IT
©2017 AKAMAI | FASTER FORWARDTM
Authenticate everything, Encrypt everything
Users, devices and apps - data in transit and at rest
©2017 AKAMAI | FASTER FORWARDTM
Centralize policy definition,
but distribute policy enforcement
©2017 AKAMAI | FASTER FORWARDTM
Treat trust as dynamic and situational
©2017 AKAMAI | FASTER FORWARDTM
Always verify with full visibility and logging
©2017 AKAMAI | FASTER FORWARDTM
Summary
• Zero Trust Security Architectures Reduce Risk and Complexity for a
Hybrid Architecture
• New Zero Trust Services are evolving very quickly
• Consider Cloud Migration as an opportunity to migrate to a Zero Trust
Architecture
1 sur 24

Recommandé

Zero Trust ModelZero Trust Model
Zero Trust ModelYash
917 vues16 diapositives
Zero TrustZero Trust
Zero TrustBoaz Shunami
723 vues11 diapositives
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero TrustDavid J Rosenthal
1.7K vues45 diapositives

Contenu connexe

Dernier(20)

The Research Portal of Catalonia: Growing more (information) & more (services)The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)
CSUC - Consorci de Serveis Universitaris de Catalunya51 vues
Web Dev - 1 PPT.pdfWeb Dev - 1 PPT.pdf
Web Dev - 1 PPT.pdf
gdsczhcet48 vues
METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...
METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...
Prity Khastgir IPR Strategic India Patent Attorney Amplify Innovation23 vues
CXL at OCPCXL at OCP
CXL at OCP
CXL Forum183 vues
Green Leaf Consulting: Capabilities DeckGreen Leaf Consulting: Capabilities Deck
Green Leaf Consulting: Capabilities Deck
GreenLeafConsulting170 vues

Zero trust in a hybrid architecture

  • 1. Zero Trust in Hybrid Architectures Patrick Sullivan Director: Security Strategy Akamai Technologies
  • 2. Agenda • Drivers of change in a Hybrid environment • Zero Trust Overview • How to incorporate Zero Trust into your transition to Cloud
  • 3. ©2017 AKAMAI | FASTER FORWARDTM Golden Era of Network Perimeter App #2 App #1 App #3 ● Users & apps inside ● Inside = Trusted ● Walls work ● Threats remain outside
  • 4. ©2017 AKAMAI | FASTER FORWARDTM Applications Are Moving Outside App #2 App #1 App #3 ● IaaS & SaaS ● Hybrid ● Inconsistent visibility, security & control ● Confusing end-user experience
  • 5. ©2017 AKAMAI | FASTER FORWARDTM Users Have Moved Outside App #2 App #1 App #3 ● Mobile ● Digital ecosystem ● Global distribution ● Remote workers
  • 6. ©2017 AKAMAI | FASTER FORWARDTM Threats Are Moving Inside App #1 App #2 App #3 ● Security architecture vulnerabilities leveraged in complex attacks ● Malware, phishing & data exfiltration ● Credential theft ● Single factor authentication ● Lateral network movement
  • 7. ©2017 AKAMAI | FASTER FORWARDTM Zero trust Users & apps anywhere Verify & never trust Application access App #1 App #2 App #3 There is no inside... Current Trends Require Zero Trust App #2 App #1 App #3 Inside = trusted Users & apps inside Trust at Network Layer Full network access
  • 8. ©2017 AKAMAI | FASTER FORWARDTM “The data economy renders today's network, perimeter-based security useless. As businesses monetize information and insights across a complex business ecosystem, the idea of a corporate perimeter becomes quaint - even dangerous.” Excerpt from Forrester’s Future-Proof your Digital Business with Zero Trust Security
  • 9. ©2017 AKAMAI | FASTER FORWARDTM What’s Zero Trust? Security model evangelized by Forrester Research Key principles: ● The network is always assumed to be hostile. ● External and internal threats exist on the network at all times. ● Network locality is not sufficient for deciding trust in a network. ● Every device, user, and network flow is authenticated and authorized. ● Policies must be dynamic and calculated from as many sources of data as possible. John Kindervag
  • 10. ©2017 AKAMAI | FASTER FORWARDTM Rob Joyce: Chief NSA TAO USENIX Enigma 2016:”Disrupting Nation State Hackers”
  • 11. ©2017 AKAMAI | FASTER FORWARDTM
  • 12. ©2017 AKAMAI | FASTER FORWARDTM Cloud, IoT, BYoD, Partner relationships all expand trust boundaries “What are you doing to shore up the trust boundary of the things you really must defend?” “Most networks….Big castle walls…Hard outer shell….Soft gooey center”
  • 13. ©2017 AKAMAI | FASTER FORWARDTM Case Study: Google BeyondCorp
  • 14. ©2017 AKAMAI | FASTER FORWARDTM
  • 15. ©2017 AKAMAI | FASTER FORWARDTM Akamai Architecture Laptop Micro Perimeter Apps Enterprise App Access
  • 16. ©2017 AKAMAI | FASTER FORWARDTM Browser Based Access & No Public IP
  • 17. ©2017 AKAMAI | FASTER FORWARDTM Hybrid Zero Trust Architecture Data Center App #3 Cloud App SaaS App App #1 App #2 Branch Roaming Global Proxy Platform > Performance Overlay > WAF, AntiBot Enterprise Connector > Secure dial-out > Deployed as VM or container Global Proxy Platform > Connection establishment > Single sign-on > Multi-factor authentication
  • 18. Better Security and Better Performance Before = 10.5 sec. After = 5.5 sec.
  • 19. ©2017 AKAMAI | FASTER FORWARDTM Divorce Trust from Network Topology as you adopt Hybrid IT
  • 20. ©2017 AKAMAI | FASTER FORWARDTM Authenticate everything, Encrypt everything Users, devices and apps - data in transit and at rest
  • 21. ©2017 AKAMAI | FASTER FORWARDTM Centralize policy definition, but distribute policy enforcement
  • 22. ©2017 AKAMAI | FASTER FORWARDTM Treat trust as dynamic and situational
  • 23. ©2017 AKAMAI | FASTER FORWARDTM Always verify with full visibility and logging
  • 24. ©2017 AKAMAI | FASTER FORWARDTM Summary • Zero Trust Security Architectures Reduce Risk and Complexity for a Hybrid Architecture • New Zero Trust Services are evolving very quickly • Consider Cloud Migration as an opportunity to migrate to a Zero Trust Architecture