Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

NSA, Microsoft Promote A Zero Trust Approach To Cybersecurity

NSA, Microsoft Promote A Zero Trust Approach To Cybersecurity

The National Security Agency (NSA) and Microsoft are advocating for the Zero Trust security model as a more efficient way for enterprises to defend against today’s increasingly sophisticated threats.

The concept has been around for a while and centers on the assumption that an intruder may already be on the network, so local devices and connections should never be trusted implicitly and verification is always necessary.

Cybersecurity companies have pushed the zero-trust network model for years, as a transition from the traditional security design that considered only external threats.

The model was created in 2010 by John Kindervag, who also coined the term “zero trust,” principal analyst at Forrester Research at the time but talks about it had started in early 2000s. Google implemented zero-trust security concepts following Operation Aurora in 2009 for an internal project that became BeyondCorp.

Zero Trust defense for critical networks

The recent SolarWinds supply-chain attack, also attributed to a nation-state actor, renewed the discussion on the benefits of the zero trust security architecture for sensitive networks.

Microsoft President Brad Smith advocated for the zero-trust model in his U.S. Senate testimony regarding the SolarWinds cyberattack, saying that this concept is the best approach for an organization or agency to ensure the security of identity in their networks.

Talking about the security of U.S. government networks targeted by the attack, Smith said:

“Basic cyber hygiene and security best practices were not in place with the regularity and discipline we would expect of federal customers with the agencies’ security profiles. In most cases, multi-factor authentication, least privileged access, and the other requirements to establish a “zero trust” environment were not in place. Our experience and data strongly suggest that had these steps been in place, the attacker would have had only limited success in compromising valuable data even after gaining access to agency environments” – Brad Smith, Microsoft President

Now, both the NSA and Microsoft are recommending the zero-trust security model for critical networks (National Security Systems, Department of Defense, Defense Industrial Base) and large enterprises.

Also Read: The 3 Main Benefits Of PDPA For Your Business

Zero Trust is a long-term project

The guiding principles for this concept are constant verification of user authentication or authorization, the least privileged access, and segmented access based on network, user, device, and app.

source: Microsoft

The above diagram from Microsoft shows how Zero Trust security with a security policy enforcement engine can assess in real-time. The model grants access to data, apps, infrastructure, and networks after verifying and authenticating identities and checking that the devices are safe.

Understanding and controlling how users, processes, and devices engage with the data is the fundamental purpose of Zero Trust, the NSA explains.

Multiple data points are required to paint an accurate picture of the activity on the network, evaluate its legitimacy, and prevent a threat actor’s lateral movement.

Combining user and device data with security-relevant information such as location, time, logged behavior, can be used by the system to allow or deny access to specific assets, and the decision is logged for use in future suspicious activity analytics. This process applies to every individual access request to a sensitive resource.

Building a mature zero-trust environment, though, is not a task done overnight but a gradual transition that often requires additional capabilities as it does not address new adversary tools, tactics, or techniques.

“Zero Trust embeds comprehensive security monitoring; granular risk-based access controls; and system security automation in a coordinated manner throughout all aspects of the infrastructure in order to focus on protecting critical assets (data) in real-time within a dynamic threat environment” – National Security Agency

The good news is that the transition can be incremental and reduces risk at each step, drastically improving visibility and automated responses over time.

National Security Agency

Zero Trust network benefits

To show the benefits of a Zero Trust network, the NSA gives three examples based on real cybersecurity incidents where the threat actor would have been unsuccessful if the concept had been implemented.

In the first one, the actor accessed a victim organization’s network from an unauthorized device using legitimate credentials stolen from an employee – a level of authentication that is sufficient in a traditional security environment.

The second example features a malicious party that is either an insider threat or an actor that compromised “a user’s device through an Internet-based mobile code exploit.”

In a typical environment, the actor can enumerate the network, escalate privileges, and move laterally on the network to achieve persistence or find valuable data and systems.

National Security Agency

The third example from the NSA is that of a supply-chain attack, where the actor adds malicious code to “a popular enterprise network device or application” that the victim organization maintains and updates regularly following best practices.

Under a Zero Trust architecture, the compromised device or app would not be able to communicate with the threat actor because it would not be trusted by default.

“Its privileges and access to data would be tightly controlled, minimized, and monitored; segmentation (macro and micro) would be enforced by policy; and analytics would be used to monitor for anomalous activity. In addition, while the device may be able to download signed application updates(malicious or not), the device’s allowed network connections under a Zero Trust design would employ a deny-by-default security policy, so any attempt to connect to other remote addresses for command and control would likely be blocked“ National Security Agency (NSA).

Also Read: What Do 4 Messaging Apps Get From You? Read The iOS Privacy App Labels

The agency recognizes that besides the technical challenges arising from re-engineering an existing information system based on the Zero Trust model, resistance throughout the organization may be another hurdle that reduces the effectiveness of the system.

Users, administrators, and top management should all embrace the same mindset for Zero Trust to work. That is, leaders should spend the resources to build and maintain it, network admins and defenders should have the necessary expertise, and users should not be able to circumvent policies.

“Once even basic or intermediate Zero Trust capabilities are integrated into a network, follow-through is necessary to mature the implementation and achieve full benefits,” the NSA says.

The agency is now working with DoD customers in setting up Zero Trust systems and coordinating activities with current NSS and DoD programs.

Additional guidance is being prepared to make Zero Trust principles easier to incorporate into enterprise networks. Organizations looking to adopt the concept can also find documentation and methodology from NIST as well as from several cybersecurity companies, some of them offering solutions for easier implementation.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us