Has been developed by Richard Bejtlich to help defenders to give themselves a fighting chance by deploying a defensible network architecture. There are three common ways to help protect data they are
The rest of this concept mainly consists of seven pillars.
Source: Richards Diagram for the security process:
Traditional data center networks utilize a three-tier design that consists of a core, distribution, and access layer of switches. Designing a network with these drawings is crucial to understand the networking architecture better. Do remember to consider an exemplary network architecture compared to a bad one. One more important consideration is knowing the adversary will break in and how to protect the most precious data. Think of using a SIEM and performing regular auditing if files got accessed without proper authorization.
Segment the network into security zones:
` Example of a tiered network design
Source:
https://miro.medium.com/max/4800/0*95r6GhTBRv3PMy15.png
After making these considerations, it is essential to understand that we must implement access control to protect the systems from unauthorized access. There are many kinds of authorization systems.
In the modern security posture, traditional security methods have only sometimes worked out great for companies. Why are many cybersecurity vendors and organizations trying to move over to ZTNA? It allows them to establish a way safer. Never trust and always verify that the model gets used. Zero-Trust modeling is usually gets applied to
The policies that apply for logins for Zero-Trust are
If needed, more guidance on applying ZTNA. Microsoft has a great guide on implementing ZTNA.
Source:
Implementing a Zero Trust security model at Microsoft
Zero Trust Architecture
Video:
SANS Webcast – Zero Trust Architecture
Authentication is the process of verifying the identity of a user, device, or system in a secure system. It is a critical component of security in any organization, as it helps to ensure that only authorized users have access to sensitive information and resources. Several authentication methods can get used in a secure system, including
To prevent unauthorized access and potential security breaches, organizations must regularly update and maintain robust authentication protocols. It may include updating passwords regularly, implementing 2FA, and staying up-to-date with the latest biometric and token-based technologies.
To protect businesses from online threats such as phishing and password-based breaches, the FIDO Alliance standard, or Fast IDentity Online, is an open, interoperable authentication standard.
A key characteristic of FIDO is robust and two-factor authentication (2FA), such as biometrics or hardware tokens. Users must also provide a second factor to access their accounts, such as a fingerprint or security key. Because of this, attackers must obtain both the password and the device or biometric information in addition to the password to gain unauthorized access.
Because it helps prevent unauthorized access to sensitive data and systems, FIDO is essential for organizations to protect themselves. Cyber-attacks are rising, so organizations need robust security measures to protect themselves. Organizations can significantly reduce their vulnerability to password-based attacks and cybercrime by implementing FIDO.
Source:
SANS Webcast – Trust No One: Introducing SEC530: Defensible Security Architecture
Video: