{"id":295,"date":"2017-01-13T10:12:01","date_gmt":"2017-01-13T17:12:01","guid":{"rendered":"http:\/\/ec2-54-218-98-142.us-west-2.compute.amazonaws.com\/?p=295"},"modified":"2019-05-22T13:19:09","modified_gmt":"2019-05-22T19:19:09","slug":"the-threat-is-real-protecting-your-organization","status":"publish","type":"post","link":"http:\/\/access-solutions.com\/index.php\/2017\/01\/13\/the-threat-is-real-protecting-your-organization\/","title":{"rendered":"The Threat is Real. Protecting Your Organization."},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img loading=\"lazy\" width=\"420\" height=\"201\" src=\"http:\/\/ec2-54-218-98-142.us-west-2.compute.amazonaws.com\/wp-content\/uploads\/2019\/05\/image001-420x201.jpg\" alt=\"\" class=\"wp-image-296\" srcset=\"http:\/\/access-solutions.com\/wp-content\/uploads\/2019\/05\/image001-420x201.jpg 420w, http:\/\/access-solutions.com\/wp-content\/uploads\/2019\/05\/image001-420x201-300x144.jpg 300w\" sizes=\"(max-width: 420px) 100vw, 420px\" \/><\/figure>\n\n\n\n<p>Target, Home Depot, Office of Personnel Management (OPM), Democrat National Committee (DNC), Yahoo; almost every day we hear about some sort of data breach or network attack. It seems to have become a fact of life on the Internet. However, organizations can take simple measures to strengthen their networks without major network redesigns or exorbitant expenditures.<\/p>\n\n\n\n<p>Target was breached when a subcontractor\u2019s system was compromised and the attacker gained valid login credentials to Target\u2019s vendor portal. With credentials and the ability to login to the Target vendor portal, the attacker had an inside staging point to explore and launch other attacks on the internal network. Not knowing all the details and making an assumption that somehow the attackers compromised the Active Directory system, which seems to be used extensively in the organization. Once compromised the attacker had some sort of access to the rest of the network.<\/p>\n\n\n\n<p>While Target undoubtedly had other levels of security and access controls methods in place, the lack of network \u201cbulkheads\u201d or network segment\/security zones made an attacker\u2019s wandering and exploration much easier and allowed the deployment of malware which was able to compromise Target\u2019s POS system. Even though the POS systems did not have direct Internet access once infected they were able to send POS data to a&nbsp;&nbsp;\u201cdump\u201d server, which the attackers could access and control.<\/p>\n\n\n\n<p>Zero Trust Network Architecture was introduced several years ago by a researcher\/analyst, John&nbsp;Kindervag, from Forrester Research. The primary principle of Zero Trust is \u201cTrust nothing, verify everything\u201d. With the network perimeter disappearing and organizations using cloud services, employees working \u201cremotely\u201d instead of within the bastion of the corporate headquarters and business partners accessing the enterprise network systems, the need to change the security model must be changed.<\/p>\n\n\n\n<p>A major component of Zero Trust is classification and segmentation of an enterprise\u2019s data and networks based on the types and criticality of the data and systems on the various parts of that network, creating security zones, which would allow the implementation of security policies to limit and control access, through the deployment of segmentation gateways across a network. Another major component is logging of traffic and events occurring within the various security zones or segments.<\/p>\n\n\n\n<p>If any particular security zone were compromised the \u201cblast radius\u201d could be minimized with the proper logging, monitoring and alerting to the security team of the suspicious network traffic and any suspicious traffic or activity quickly suppressed.<\/p>\n\n\n\n<p>Many organizations \u201csegment\u201d their networks using VLANs and the implementation of security Access Control Lists (ACLs), while this is a step in the right direction, without the ability to inspect, monitor and log all traffic flowing between segments and security zones, this approach provides limited value.<\/p>\n\n\n\n<p>Migrating to&nbsp;Zero&nbsp;Trust Network Architecture and making some relatively simple and straightforward changes to an organization\u2019s network infrastructure and architecture, the overall security of all the systems and most importantly the organization\u2019s data can be protected.&nbsp;&nbsp;One of the major advantages that even the C-level executives will understand is that your organization will not become a major news headline.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Target, Home Depot, Office of Personnel Management (OPM), Democrat National Committee (DNC), Yahoo; almost every day we hear about some sort of data breach or network attack. It seems to have become a fact of life on the Internet. However, organizations can take simple measures to strengthen their networks without major network redesigns or exorbitant expenditures. Target was breached when a subcontractor\u2019s system was compromised and the attacker gained valid&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[9],"tags":[13,7],"_links":{"self":[{"href":"http:\/\/access-solutions.com\/index.php\/wp-json\/wp\/v2\/posts\/295"}],"collection":[{"href":"http:\/\/access-solutions.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/access-solutions.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/access-solutions.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/access-solutions.com\/index.php\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":1,"href":"http:\/\/access-solutions.com\/index.php\/wp-json\/wp\/v2\/posts\/295\/revisions"}],"predecessor-version":[{"id":297,"href":"http:\/\/access-solutions.com\/index.php\/wp-json\/wp\/v2\/posts\/295\/revisions\/297"}],"wp:attachment":[{"href":"http:\/\/access-solutions.com\/index.php\/wp-json\/wp\/v2\/media?parent=295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/access-solutions.com\/index.php\/wp-json\/wp\/v2\/categories?post=295"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/access-solutions.com\/index.php\/wp-json\/wp\/v2\/tags?post=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}