Zero Trust Segmentation

Securing Australian Government Assets in 2020: Part 2

Considering Alternatives to Secure a Nation’s Crown Jewels

Although mandatary breach notification legislation was only recently introduced in Australia and will come into effect in New Zealand by the end of this year, intruders regularly gain access to sensitive data and impact key missions in public safety, finance, and national security. They also continue to manipulate data in political campaigns, alter research institution data, and impact public health security.

In part one of this Securing Australian Government Assets series, we reviewed the recent findings of The Commonwealth Cyber Security Posture in 2019 report and the government’s announcements regarding increased attacks targeting Australia government agencies and enterprises.

A key element of those findings describes that whilst improvement is being made, we are still vulnerable to cyber offenses as a nation. There are existing tactical recommendations that focus on the types of threats recently seen, and long-standing advice around essential security disciplines that all non-corporate commonwealth entities should embed into their IT practices. However, planning beyond inevitable breaches and striving for Zero Trust under a holistic strategy to contain and prevent the damage of such events is paramount to limiting the exposure of personal, financial intellectual property and data in the national interest.

In response to the recent events, a government plan under the banner of “the best defence is offense,” designed to bolster the Australian Signals Directorate’s (ASD) ability to disrupt cyber criminals, has been announced. Recruitment and funding are earmarked to build offensive capabilities to go after cyber attackers offshore, as well as share intelligence about cyber activity to react in real time. But what can each agency or enterprise in Australia and New Zealand do to take proactive steps to limit the impact and spread of a breach so that reaction is left to examination rather than the panic associated with trying to stop the propagation?

We promote raising the priority of the Australian Cyber Security Centre (ACSC) recommended “excellent” but not yet “essential” practice of network segmentation that underpins the Zero Trust philosophy, to rethink the “keep the bad guys out, and detect them as quick as we can if they get in” paradigm to one of “the first system compromised should be the last”.

All the patching, multi-factor authentication, and intelligence sharing partnerships in the world can't stop attacks directed at critical and sensitive infrastructure if we continue to maintain an eggshell computing or networking model and rely on reactive detection to prevent the damage.

Cirrus Networks’ Andrew Weir suggests that “As a defender, getting the basic mitigations right can save a lot of damage later on. As a stakeholder in your organization’s security you cannot afford to be complacent and should look at building coherent layers of ICT defense. Understanding how your applications work and minimizing the attack surface through segmentation significantly reduces the options and reach available to an attacker when they do manage to breach one layer of your defences.”

Microsegmentation is simply the application of the Zero Trust principle of “least privilege”, denying by default the machine-to-machine and application-to-application traffic inside a data centre (or the laptop to laptop, workstation to workstation traffic in client or employee space) that has not been explicitly authorized. Planning beyond a breach event changes the mindset to one of assuming that a breach will occur, but preventing the compromise of a system from spreading to any other. Put another way, practicing the principle of least privilege ensures that malicious malware or a bad actor accesses the least number of systems possible by applying the same approach to trust within our environment to outside it. The compromise stops with the first system it takes hold of, as it can’t spread anywhere else.

With the evolution of segmentation technology away from the traditional, complex, costly and infrastructure-dependent ways of firewalls, SDN, EDR and NAC, it is now possible to thwart or significantly oppose attackers through isolating and containing applications and protecting corporate issued equipment.

Not only did our recent report with Bishop Fox highlight the efficacy of microsegmentation as a security control, but it also uncovered forced changes in the behavior behind attack strategies that, without insider knowledge, may not be possible. Microsegmentation raised the resistance and detection levels to a degree that may mean less motivated parties would simply give up and divert attention to easier targets. The report also highlighted that the level of detection through an effective microsegmentation solution dramatically increases the efficiency of detection and incident response allowing for a “contain first, ask questions later” approach to keeping you away from the headlines.

Microsegmentation is no longer an emerging feature or niche solution available to only those large and mature enough. It should be considered a fundamental and essential capability for both networking agility and information security today. As Forrester, a leading advocate and definer of a Zero Trust framework states in The Forrester Wave™: Zero Trust eXtended (ZTX) Ecosystem Platform Providers, Q4 2019 report, “there’s now no excuse not to enable microsegmentation for any company or infrastructure. It’s no longer a question of whether you can do it.

Cirrus Networks’ Weir also emphasized the continued need for security solutions to facilitate DevSecOps and drive for simplicity and automation: ”For a long time we’ve spent significant effort adding manual tools and processes on top of applications in an effort to secure them. These efforts often done in isolation from the application owners, mean lost-in-translation and configuration mistakes add cost and time to application deployment. As infosec professionals we should be building automated and scalable guardrails for our application teams which they can consume in real-time as they deploy. Organisations which effectively build security into their deployment pipelines will see faster more productive teams with a security first mindset.”

With the increases in fast and extremely destructive attacks like ransomware that can take down the global IT infrastructure of enterprises in minutes, and the increased pressure and interest from cyber criminals and nation states on government agencies, the ability to contain the spread of any attack could not be more urgent – and the opportunity to do so is more accessible than ever.

So, let’s enable security teams to refocus and measure the success of their practice away from keeping bad guys out, to assuming breach but making it significantly more difficult to be owned.

Ready to see the benefits of microsegmentation? Sign up for a free 30-day trial today.

Related topics

No items found.

Related articles

How to Ensure Successful Microsegmentation Projects: 3 Strategic Principles
Zero Trust Segmentation

How to Ensure Successful Microsegmentation Projects: 3 Strategic Principles

Microsegmentation matters. Get it right, and you will dramatically reduce your vulnerability to attacks like ransomware while achieving and maintaining compliance.

Overcoming Barriers to Zero Trust With Insight From the UK
Zero Trust Segmentation

Overcoming Barriers to Zero Trust With Insight From the UK

Today’s chief information security officers (CISOs) are challenged from all sides. The scale of threats facing their organizations and the size of the corporate attack surface are such that security breaches are a case of "when," not "if."

4 Common Objections to Zero Trust Segmentation — And How to Overcome Them
Zero Trust Segmentation

4 Common Objections to Zero Trust Segmentation — And How to Overcome Them

Zero Trust Segmentation is a proven way to prevent ransomware propagation, but may seem overwhelming for IT leaders at midsize organizations. Here are four common objections we've heard from them and how to overcome each.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?