Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Zero Trust Networks: Building Trusted Systems i...

Zero Trust Networks: Building Trusted Systems in Untrusted Networks

Let's face it - the perimeter-based architecture has failed us. Today's attack vectors can easily defeat expensive stateful firewalls and evade IDS systems. Perhaps even worse, perimeters trick people into believing that the network behind it is somehow "safe", despite the fact that chances are overwhelmingly high that at least one device on that network is already compromised.

It is time to consider an alternative approach. Zero Trust is a new security model, one which considers all parts of the network to be equally untrusted. Taking this stance dramatically changes the way we implement security systems. For instance, how useful is a perimeter firewall if the networks on either side are equally untrusted? What is your VPN protecting if the network you're dialing into is untrusted? The Zero Trust architecture is very different indeed.

In this talk, we'll go over the Zero Trust model itself, why it is so important, what a Zero Trust network looks like, and what components are required in order to actually meet the challenge.

Evan Gilman

March 14, 2017
Tweet

More Decks by Evan Gilman

Other Decks in Technology

Transcript

  1. 3/14/17 @evan2645 @dougbarth DC-A DC-B DC-C C* C* C* Zero

    Trust: Building Systems in Untrusted Networks
  2. 3/14/17 @evan2645 @dougbarth DC-A DC-B DC-C C* C* C* Zero

    Trust: Building Systems in Untrusted Networks
  3. 3/14/17 @evan2645 @dougbarth DC-A DC-B DC-C C* C* C* Zero

    Trust: Building Systems in Untrusted Networks
  4. 3/14/17 @evan2645 @dougbarth Emergent Properties All Flows Authenticated and Encrypted

    All Flows Asserted as Authorized No Inherent Value in IP Address Zero Trust: Building Systems in Untrusted Networks
  5. 3/14/17 @evan2645 @dougbarth Emergent Properties No Centralized Firewalls No Network

    Gateways No Private Network Zero Trust: Building Systems in Untrusted Networks
  6. 3/14/17 @evan2645 @dougbarth Just The Facts Industry Moving Towards Deep

    Authn/Authz Industry Converging on Zero Trust Model More Secure, More Operable Keep an Eye Out! Zero Trust: Building Systems in Untrusted Networks
  7. 3/14/17 @evan2645 @dougbarth Just The Facts Industry Moving Towards Deep

    Authn/Authz Industry Converging on Zero Trust Model More Secure, More Operable Keep an Eye Out! Zero Trust: Building Systems in Untrusted Networks
  8. 3/14/17 @evan2645 @dougbarth Just The Facts Industry Moving Towards Deep

    Authn/Authz Industry Converging on Zero Trust Model More Secure, More Operable Keep an Eye Out! Zero Trust: Building Systems in Untrusted Networks