Zero Trust

22.08.2020

 

 

Enabler for Global Data Communication

 

_

Hello from Pilar

 

Short introduction to zero trust (15 minutes)

Discussion about concepts (15 minutes)

Example application of zero trust (15 minutes)

 

 

 

www.pilar.net

_

Meet Marvin

 

_

Security
of the Past:
Limitations

  

 

_ only protection of bilateral IP connections

_ not protecting different data objects, but apis

_ unsuited for rapid change of

   data owners / new data channels

_

Security
of the Past:
Limitations

  


_

Security
of the Past:
Limitations

  

 

_ static design: build once, run forever

 

_ new requirements vs. security design

 

_ introduce security exceptions on change

_

Security
of the Future:
Zero Trust

  

 

_ trust perimeter has changed

 

_ fragmented information (flows) need protection

 

_ authn/authz must be possible everywhere

 

_ data objects governed by
   external/internal access policies (AP)

_

Security
of the Future:
Zero Trust

 

 

Security
of the Future:
Zero Trust

  

 

_  defines trust levels for data objects
    or smaller groups

 

_  fine grained access to objects possible

 

_  more insights means minimizing risk

 

_  Never trust, always verify

_

Security for Complex Ecosystems:
Zero Trust & Access Policy

  

_ data object interactions main driver

   for future IT architecture

_ devices produce and consume data
   at the same time

_ respect different data owners per device

   if one fails, all suffer!

_

Security of Ecosystems:
Zero Trust, IDSA,

AccesPolicies

 

 

_

Security of Ecosystems:
Zero Trust, AccesPolicies

 

 

_ business agility: enables your company
   to adapt and survive

 

_ switch to a different service provider is easy

 

_ change policies in days (rather than months)

 

_ enables data reduction and data economy

_

Approaches

  

_

Ten principles
of Zero Trust

Architecture:

  

 

_      Know your architecture including users, devices, services

_      Create a single strong user identity

_      Create a strong device identity

_      Authenticate everywhere

_      Know the health of your devices and services

_      Focus your monitoring on devices and services

_      Set policies according to value of the service or data
_      Control access to your services and data
_      Don’t trust the network, including the local network
_      Choose services designed for zero trust

_

 


Ressources:

  

 


_   NIST -

     Implementing a zero trust architecture (March 2020)

         (www.nccoe.nist.gov/sites/default/files/library/project-descriptions/zt-arch-project-description-draft.pdf)


_   O’Reilly -

     Zero Trust Fundamentals
         (www.oreilly.com/library/view/zero-trust-networks/9781491962183/ch01.html)


_   UK NCSC

     Principles to help you design and deploy a zero trust

     architecture (github.com/ukncsc/zero-trust-architecture)

_

Share your Experience

  

_ challenges

 

_ problems

 

_ success stories

 

_ ressources

_

pi-lar GmbH

Kreuzgasse 2-4

D-50667 Köln

 

+49 221 16531700

info@pi-lar.net

www.pi-lar.net

Workshop

__

WebServer

MicroService A

MicroService B

MicroService C

This interface returns different data sets

based on the role of the user !

Secure a simple workflow with Zero Trust!

_

Firewall

Reliability

  

_ Legal

_ Economic

_ Environment

_ Social

_

NIST - Implementing a zero trust architecture (March 2020)

https://www.nccoe.nist.gov/sites/default/files/library/project-descriptions/zt-arch-project-description-draft.pdf

 

O’Reilly - Zero Trust Fundamentals

https://www.oreilly.com/library/view/zero-trust-networks/9781491962183/ch01.html

 

UK NCSC - Principles to help you design and deploy a zero trust architecture

https://github.com/ukncsc/zero-trust-architecture

Security First

_ digital identities

_ dual encryption layer

_ attribute based access control

_ decentralized access delegation

 

... and more

_

Privacy First

_ stacked identities (realm / audience)

_ addressing hash based

_ DHT to protect metadata discovery

 

... and more

_

Easy to use

_ installed as a OS library

_ connect once, communicate globally

_ python / lua binding available

_ identity / data based routing

 

... and more

_

no more gateways

decentralized
P2P networks

>

>

Trusted B2B mesh network

Benefits

  

_ stay secure behind closed firewalls

_ standardized security measures

_ limit packet size / throughput

_ "blind broker" nodes

_

Trusted B2B mesh network

 

connects everything:

 

devices, edge, processes,

applications, users, enterprises

...

Neuropil

Cooperation, dialogue, contribution etc.

s. Fosdem 2019 Abschluss Slide

Zero Trust: An Introduction

By Stephan Schwichtenberg

Zero Trust: An Introduction

a short introduction to the neuropil messaging layer

  • 139