From the Blogosphere
Turning the Tide on Cyber Attacks | @CloudExpo #Cloud #IoT #API #BigData
The security landscape is constantly evolving in today’s extended enterprise, but security solutions have not kept pace
By: Dennis Griffin
Sep. 20, 2015 07:00 PM
Turning the Tide on Cyber Attacks with a New Perimeter to Protect Enterprises
Today's business ecosystems span across multiple organizations, security perimeters and trust zones, increasing the number of attack vectors. With the migration of enterprise applications to the cloud, attack surfaces have expanded significantly. Compounding the problem, today's wave of attacks are more sophisticated and diversified than ever. The combination of enterprise complexity and advanced attacks has broken the traditional enterprise perimeter, creating the perfect storm for threats and information loss, where a new security paradigm is needed.
The security landscape is constantly evolving in today's extended enterprise, but security solutions have not kept pace to protect the ever-changing enterprise environment. Today, a remote, mobile, and contract workforce, combined with a complex partner ecosystem, make it difficult for IT to control access to the high value, high risk enterprise applications. Providing full network access via VPN to untrusted external organizations or users opens up many security risks, given the increased sophistication of modern day attacks.
The push to the cloud only adds to this risk, as enterprises migrate applications to the cloud with the promise of business agility and cost reduction. But this leads to increased cybersecurity risk due to the lack of secure connectivity to the applications residing in the public cloud. Since these applications are no longer hosted behind the traditional enterprise LAN perimeter, they become difficult if not impossible to secure against attacks such as server exploitation, denial of service, and credential theft.
Enterprises need an innovative approach to defend the new enterprise perimeter. One emerging method is the Software Defined Perimeter (SDP), an initiative of the Cloud Security Alliance (CSA), backed by more than 200 organizations globally and now being included in Gartner's Hype Cycle for Virtualization. The SDP introduces a more versatile and secure way of extending the secure enterprise perimeter that includes lower trust zones such as cloud, contractors, and partners. It uses a need-to-know architecture derived from work at the Defense Information Systems Agency (DISA), where the client device's security posture and identity must both be verified before it is granted connectivity. This zero-trust approach starts with no visibility and connectivity until the device and user have both been authenticated using multifactor authentication (MFA). This inherently secure architecture enables anyone to securely access protected applications over untrusted networks using any device, even unmanaged devices, which have become so popular.
The SDP architecture separates the control plane and the data plane, providing protection by isolating the point of authentication and the point of application access. In addition, the SDP allows for real-time access permissions within the system for granting and revoking access.
Source: Vidder, Inc.
Secure IT/Business Outsourcing & Ecosystem Collaboration
Secure Cloud Migration
Defeating Top Attacks Cited by Verizon Breach Report
Credential Theft is one of the most common attack vectors prevalent in today's enterprise environments. The theft can occur from a variety of channels - including key logging, phishing or brute force attacks. The SDP's transparent MFA functionality mitigates stolen credentials by requiring that all connections to a protected application come from a SDP Gateway. In order to gain access to this Gateway a user must pass the transparent MFA process that acts as a second factor of authentication.
Denial of Service is an attack that is used to limit the availability of a network, application, or server. Often performed by activists or competitors, it can ruin the reputation of an organization and cause a loss of services for customers. The SDP can defeat a large proportion of these attacks by limiting connectivity to only authorized users. For example, a common denial of service attack is called the "SSL Renegotation DoS" which continually re-establishes SSL connections to a server until it runs out of resources to service future requests. Malicious adversaries generally perform this attack against internet-accessible websites. This attack vector is eliminated when the application is protected by the SDP, which will not allow a connection to the application until it is proven trusted.
Server Exploitation can come in many different varieties, including SQL Injection, Buffer Overflows, and Cross-site Scripting. Attackers perform these attacks remotely and without legitimate credentials. For example, one of the most common vulnerabilities is SQL Injection, which is often performed against login and search forms. These forms can generally be accessed and attacked without having a username and password. Attacks such as these are a very serious problem since many applications have been moved to be internet-accessible, ultimately allowing attackers to hack into systems and gain access to an internal network and corporate data. The SDP protects these applications by requiring an attacker to have valid security artifacts and a valid device before gaining any connectivity to the application. This limits the attack surface of the application to authorized users only, which greatly reduces the likelihood of an attack.
Connection Hijacking, also known as man-in-the-middle, is an attack vector that is used to steal or modify data in flight. It's not uncommon to hear about connections to a wireless hotspot in public coffee shops that resulted in an eventual compromise of an organization. This is caused by insufficient in-flight encryption systems. Most applications use the system's "Trusted Certificate Store" or "Keychain" to enumerate a trusted list of Certificate Authorities. This store contains approximately 300 unique Certificate Authorities that could be potentially compromised and result in a connection hijacking attack. The SDP uses a methodology referred to as "Certificate Pinning" that trusts only a small subset of Certificate Authorities. This greatly reduces the likelihood that the Certificate Authority can be compromised.
What You Need to Know
While the waves of attacks continue to pound enterprises in this perfect storm of vulnerability due to changing enterprise environments and increasingly advanced threats, approaches such as the SDP that start with zero connectivity and provide access to authorized resources only after multiple authentications are met can help organizations turn the tide on today's continued threats.
Reader Feedback: Page 1 of 1
Latest Cloud Developer Stories
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
SYS-CON Featured Whitepapers
Most Read This Week