Page 6 - EngineerIt June 2021
P. 6

CYBER SECURITY


        Why 'castle-and-moat'                                               Micro-segmentation: controlling who
                                                                            accesses what
                                                                            A key part of the Zero Trust philosophy is micro-
                                                                            segmentation. Here, workloads are isolated from
        protection is no fairy tale                                         one another and individually secured, improving
                                                                            control of lateral east-west traffic within the data
                                                                            centre. This is of particular importance with
                                                                            the recent growth in remote working, as micro-
        By Hardus Dippenaar, senior network architect at Datacentrix        segmentation must cover all users – regardless of
                                                                            location – as well as all of a company’s resources,
                                                                            be they in the cloud or within the data centre.
              ur changing world, with its more distributed infrastructure and new   Reducing lateral movement is not the only
              applications and workloads exposing a larger attack surface, means that   benefit of workload protection. It also facilitates
       Operimeter security, while still an important element within an enterprise’s   the identification of workload behaviour
        cybersecurity arsenal, is simply no longer enough.                  deviations (due to the faster detection of malware
           This traditional ‘castle-and-moat’ principle, which assumes that an organisation’s   execution patterns), exposes vulnerabilities within
        people and data can be trusted, and all security threats come from the outside, has   software packages, and promotes compliance.
        become increasingly problematic. There can no longer be an assumption that a   This includes compliance not only with the
        company’s networks are safe and that the ‘bad guys’ are on the outside.  applicable laws and mandates, for example the
           Consequently, many organisations are shifting their focus away from perimeter-  Payment Card Industry Data Security Standard
        based firewalls, and looking instead at the protection of their application workloads,   (PCI DSS) and the Protection of Personal
        wherever they may reside.                                           Information (POPI) Act, but also with internal
           A workload can be defined as those processes and resources needed to run   company rules and regulations.
        application. And, with today’s use of cloud, hybrid environments, containerisation
        and other disruptive technologies, workloads are more advanced and dynamic   Creating consistent, layered security
        than ever, moving in and out of the cloud and data centre as needed, instead of –   The adoption of a Zero Trust policy means
        as they did traditionally - residing within a particular network segment.   that companies are able to approach security-
           As research company Gartner’s 2020 Market Guide for Cloud Workload   related challenges in a new way. By ensuring the
        Protection Platforms report put it: “Protection requirements for cloud-native   security moves everywhere the workload does, it
        applications are evolving and span virtual machines, containers and server-less   provides a consistent, layered security approach
        workloads in public and private clouds. Security and risk management leaders   right across the multi-cloud environment, allowing
        must address the unique and dynamic security requirements of hybrid cloud   for improved visibility and automation, reduced
        workloads.” Essentially this means that the new perimeter is wherever your   risk and a reduced attack surface.    n
        workload might be.
                                                                            Email address: HDippenaar@datacentrix.co.za
        Protecting the changing landscape
        The combination of evolving app development and infrastructure that is now   About the author:
        distributed on-premises and across multiple clouds – both public and private –   Hardus Dippenaar has over 20 years of
        calls for a more flexible approach to security. Add to this the fact that the threat   experience in IT, with a focus in the field of
        environment is on the up, with skyrocketing numbers of increasingly sophisticated   networking. He is a respected networking
        threats, and it is clear that identities, endpoints and workloads can no longer be   solutions architect and brings a wealth of
        trusted based just on the fact that they are internal to an organisation.  knowledge and experience to his dealings
           The time to extend perimeter protection to the workload level is now, and   with Datacentrix’ clients. His business and
        importantly, it starts with embracing the Zero Trust model.          technology insight translates into cost savings,
           In a phrase first coined by former Forrester Research analyst John Kindervag   increased business efficiencies and tangible
        in the paper entitled ‘Build Security into Your Network’s DNA, the Zero Trust   business value.
        Network Architecture’, Kindervag described the concept of Zero Trust as having a
        straightforward philosophy at its core, saying that ‘Security professionals must stop
        trusting packets as if they were people. Instead, they must eliminate the idea of a
        trusted network (usually the internal network) and an untrusted network (external
        networks). In Zero Trust, all network traffic is untrusted. Thus, security professionals
        must verify and secure all resources, limit and strictly enforce access control, and
        inspect and log all network traffic.”
           Simply put, Zero Trust allows for the visibility and security controls needed to
        secure, manage and monitor every user, device, application and network. Within
        this model, no traffic may be trusted – unless policy proves otherwise.
           The Zero Trust approach calls for the monitoring and protection of east-
        west traffic, also described as the flow of traffic within a data centre, which
        has increased as a result of the adoption of converged and hyperconverged
        infrastructure (HCI), virtualisation and the private cloud.



                                                    EngineerIT | June 2021 | 4
   1   2   3   4   5   6   7   8   9   10   11