by Mal Fitzgerald
Like many of you, I’ve been sucked into the Yellowstone series. Having grown up and lived my entire life in a congested corner of Massachusetts, the series may as well have taken place on the moon. But I’ve also found the challenges on the Dutton Ranch surprisingly relatable to the challenges we face as network defenders. One challenge is keeping a herd of cattle healthy which they do, in part, by creating boundaries around them and continuously monitoring them. In this way, when a single member of the herd becomes sick the entire herd isn’t lost.
We have the opportunity to do the same thing to protect our organizations by creating trust boundaries within networks.
Trust boundaries consist of logical entities such as a physical location, an area within that location like a data center or the finance department, a country, a block of IP addresses, a group of users, the identity of the device, or the application in use.
At a high level, the steps we go through as we work with clients to create trust boundaries, include:
With trust boundaries in place, you can validate that your policies are correctly segmenting network activity and enforcing controls across your environment. While implementing trust boundaries sounds straightforward, I see teams struggle to gain an understanding of what they have, what it should be doing, and what it is actually doing given the dynamic nature of their environment.
Networks are now an evolving collection of multi-cloud plus on-prem infrastructure, applications, data, devices, and users. While critical, it can be a struggle to comply with Zero Trust guidelines, industry best practices, or internal compliance requirements, including data access management or network segmentation based on expected application behaviors. The CloudOps, SecOps, and NetOps teams I work with have to deal with far too many blind spots due to the massive gaps in coverage in their existing security tech stack.
The Netography Fusion platform eliminates the coverage gaps because it provides network visibility and telemetry throughout the entirety of your multi-cloud and hybrid environment and not just at specific choke points or data centers. You can have a conversation around the behavior happening out at remote networks, within and across different clouds, and all the way down to a specific set of applications. From a workload 1,000 miles away to the three specific machines that handle your SAP application – you can create trust boundaries around what devices, users, and applications should be doing and what should never be happening, and have a rule set to confirm that behavior.
Looking at your network from an asset perspective and the nuance of behavior, Netography Fusion addresses the contours of your environment to detect malicious activities and ensure compliance with policies. For network defenders, these types of boundaries are straightforward to set up and enforce and, bonus, you don’t have to deal with 1,400 lb. animals!
The post Yellowstone Ranch 2.0: Protecting Your Multi-cloud and Hybrid “Herd” with Trust Boundaries appeared first on Netography.
*** This is a Security Bloggers Network syndicated blog from Netography authored by Mal Fitzgerald. Read the original post at: https://netography.com/yellowstone-ranch-2-0-protecting-your-multi-cloud-and-hybrid-herd-with-trust-boundaries/