Zero trust Network Access
Zero Trust Network Access (ZTNA) is a type of technology or product or service that provides secure remote access to applications and services based on well-defined access control policies and a logical access boundary or software defined perimeter (SDP). ZTNA gives users seamless and secure connectivity to private applications without ever placing them on the network. It verifies the user, who is accessing, and it provides a least privilege.
As per latest Fortinet report, only 15% of organizations have completed a transition to a zero-trust security model, which does not automatically assume that anyone inside the network perimeter is trusted.
Considering the present pandemic situation due to covid-19, organizations have moved to work from office to work from home model. There are many challenges faced with respect to secure connectivity, network connectivity. Every organization was using traditional VPN connectivity to access the organizational internal network or server from remote locations as well as office location. While using VPN there are still number of issues or challenges arise such as;
- It may not create or enforce policies that protect credentials
- No third-party accountability
- Hackers are using VPN too
- Attack surface is big
- Increasing end point attack
Considering the above facts, we need an appropriate security solution to meet zero trust requirements while enabling BYOD and access to apps deployed in a cloud. Presently ZTNA offering more specific access and session control to applications located on-premises and in the cloud. It offers secure connectivity and reduces the attack surface. Users are authenticated and verified before they access to the resources. ZTNA leverages the concept of a dark cloud, preventing users from seeing any applications and services that they don’t have authorization to access.
When plan to implement the ZTNA, organization must integrate the gateway devices, implement SDWAN (Software defined WAN). It requires a variety of components or it’s a combination of multiple devices as;
- Next generation Firewall
- Client Agent
- EMS Server
- Proxy Server
- Identity & Access Management
- Access Control
- Authenticator
Considering many OEMs or vendors approaching for ZTNA, there are common required features which need to be implemented such as;
- The Zero Trust (ZT) Solution Architecture should be designed such that, Authentication and authorization must happen on a separate channel before allowing user to connect to any service / applications means only authentication and authorization controls to communicate via a specific port or control channel.
- The Solution should be capable of acting as single sign on identity provider for private web applications.
- The ZTNA should protect against password-based attacks, protection against Eavesdropping, protect against Application-Layer Attack, protect against Identity Spoofing, protect against Web based attacks like SQL injection, broken authentication and session management, Prevent Attacks from DDOS & DOS Attacks.
- The solution must support live monitoring of all user activities including failed logins, invalid access attempts, Two Factor Activity, provide alerts for specific incidents over Email, SMS and/or SNMP, must provide detailed logs for all solution administrator activities including login details, configuration changes etc.
- The multifactor solution must be indigenously developed on Software defined perimeter security framework and support automated and encrypted backup of configuration using a configurable schedule.
***
Feel free to provide your valuable suggestions.
-DR
No comments:
Post a Comment