Yeah, 100%. I was yesterday/today having a conversation on Linkedin looking at the MOVEit hack where someone told me zero trust networking is wrong and unhelpful - https://www.linkedin.com/feed/update/urn:li:activity:7079418976472059904/ - to which I responded, if you apply ZTN and Authenticate/Authorise-Before-Connect (ABC), you make the resources invisible. We need to stop thinking of networking with perimeters and 'bouncers'. If MOVEit was invisible, Cl0p cannot scan and find SQL injection exploit. As you say, we should not let ANYTHING into the network in the first place unless we explicitly trust the source, using strong cryptographic, no weak network identifiers.
I believe the problem with something like IPV6 is adoption. It only works if everyone adopts it. This is why we went down the path of an open source project which can be applied by users and builds who can have ZTN ABC in the solution. Only the users of the solution thus need to adopt, and it doesn't matter what underlay networks we have. As you say, I would love to chat on this more with others and see their views.
I would note, if we use open source ZTN, we get more than just ABC, we also get mTLS, E2E encryption, posture checks (incl. TOTP MFA, device checks), micro-sgementation, least privilege, private DNS and more. As you say, practitioners need a tool kit of capabilities and that's what we try to provide with OpenZiti - https://openziti.io/docs/learn/introduction/.
Original Message:
Sent: Jun 27, 2023 07:12:47 AM
From: Nya Murray
Subject: Zero Trust definition - do we need to update it??
For messages/notifications coming directly from IOT devices to a cloud service, all network protection on e.g. firewalls and antiDDOS, and of course the Ziti network authentication that your technology offers is a valuable addition to the arsenal. Other tools are field level data encryption, mutual certificate authentication, and adoption of device level identity verification, including MFA. I believe that all of these methods are required to address the fact that people have not understood that if you let something into the network, it is far too late to authenticate at the application layer, unless the information is unclassified and very network segmented.
I have been thinking about the additional capabilities of IPV6. For some time now I've been convinced that a new industry standard definition of Single Packet Authentication, with some kind of ubiquitous validation, using the additional capabilities of the IPV6 packet, would be useful. I have been too busy to go any further than that in my thinking. I don't believe there is a one size fits all, because every network cybersecurity prevention method I've looked at has flaws for determined hackers, particularly the well resourced ones. I'm glad you brought up the topic, and if everyone has an open minded approach, I think there is room for trying to develop a standard that can be adopted by vendors and suppliers. Definitely multi-layering for IOT would provide more security. Let's see if anyone else who has a deep technical knowledge is interested in addressing this topic. Not one for learners, however I am sure there are some experts out there who have views. :) Nya.
------------------------------
Nya Murray
Director
Trac-Car
Original Message:
Sent: Jun 27, 2023 04:51:34 AM
From: Philip Griffiths
Subject: Zero Trust definition - do we need to update it??
Yes Nya, they have adopted an open source technology which implements authenticate-before-connect, zero trust connectivity. I wrote a blog today on how its a game-changing, using the MOVEit hack as an example - https://www.linkedin.com/feed/update/urn:li:activity:7079418976472059904/.
Chatting to someone in CSA on DM, I will take a stab at writing a more explicit definition on ABC to see what people think. I 100% agree with your point about IoT/IIoT. It makes me think of a hack (I cannot remember the name) on an SDK of a Chinese SW vendor, which included a TCP stack being deployed into camera vendor HW which had an exploit. I remember thinking, if only the SDK included a ZT overlay using ABC, the exploit could not occur from the internet. Further, recent noise has been made about trusting cameras from China... how about if the camera was shipped with a ZT overlay so you could block all outbound FW ports except to your ZT overlay network... even if a backdoor exists, it cannot connect to C&C or exfiltrate data.
------------------------------
Philip Griffiths
Head of Business Development
NetFoundry
Original Message:
Sent: Jun 27, 2023 01:46:19 AM
From: Nya Murray
Subject: Zero Trust definition - do we need to update it??
Philip, can you clarify what you mean by "they have opted for technology that flips our technology, specifically networking, approaches on their head'. I am not challenging this, just the meaning did not come through clearly enough to be disambiguous.
Of course your point about authenticate after access is very relevant. In order to address IIOT/IOT cybersecurity, initial network layer authentication, by one means or another, is essential. And with thousands of small device protocols proliferating, authentication must come prior to allowing an IOT device access to a network. Because once a well designed piece of code is in the network, there are enough rat holes for it to find its way with unintended consequences. I know I don't need to tell you that, however it does seem to have escaped the notice of many people.
Best Regards
------------------------------
Nya Murray
Director
Trac-Car
Original Message:
Sent: Jun 26, 2023 04:30:08 AM
From: Philip Griffiths
Subject: Zero Trust definition - do we need to update it??
I was thinking recently about the CSA Zero Trust definition that no user or asset is implicitly trusted ... and that each user, device, app and transaction must be continually verified. I wonder to myself, should we update it, particularly to adopt some of the ideas in SDP, while taking it to its logical conclusion?
Specifically, I have recently worked with a few people in high-security use cases who have said "Most zero trust products/vendors are providing rubbish solutions". Instead, they have opted for technology that flips our technology, specifically networking, approaches on their head. In their words, this technology, which is open source, is the best implementation of NIST 800-207.
In my opinion, the root of the problem is that we have come to accept networking as being Authenticate/Authorise-After-Connect. I believe this is mad. When vendors have CVEs/zero days etc, or misconfiguration is made, businesses get exploited. Resources can be exploited from the network, for example, denial of service attacks. If we look at MOVEit, it took place as a SQL injection that could be done on resources exposed to the public internet. In tandem with insecurity, it also causes large complexity in managing FW rules, ACLs, black/whitelisting etc.
I believe, we need to take ZT and SDP to their logical conclusion - Authenticate/Authorise-Before-Connect (or ABC). Use certificate-based identity to authenticate endpoints to an overlay network (with potential secondary authentication checks). If these requirements are passed, we tell the endpoint what services/apps they can access. If not, the endpoint has absolutely no access to resources.
It sounds simple, but it's a profound change. It's like making our resources invisible to attackers while massively reducing complexity - No more dependencies on IP addresses, public DNS, port forwarding, VPNs, complex FW rules, ACLs etc. Had MOVEit implemented ABC, then the SQL injection attack could not have done in the first place across the public internet.
Any thoughts on how we can differentiate fo this and if the definition would benefit from updating?
------------------------------
Philip Griffiths
Head of Business Development
NetFoundry
------------------------------