Cyber Attacks: Battling the enemy within | Inquirer ºÚÁÏÉç

ºÚÁÏÉç

Cyber Attacks: Battling the enemy within

Traditionally, cyber attacks on corporate networks have come from outside the organization. With the growing usage of personal mobile devices and the rise of the Internet of Things, however, the danger now also comes from the walls within.
/ 08:14 AM January 12, 2016

computer

The world moves swiftly; the IT security world even more so. Just a couple of years ago, securing the enterprise would basically consist of protecting an organization from external intruders. Today, the battle has changed ground.

Education efforts from industry players have created higher levels of IT security awareness in the business world, and more firms have implemented basic security measures that can thwart direct attacks effectively.

Article continues after this advertisement

This development is forcing hackers to up their game by figuring out alternative ways to get their hands on valuable enterprise assets. One new strategy that is becoming more common across the world is for hackers to gain entry to a corporate network by targeting its weakest points.

FEATURED STORIES

Such points can include an unsecured employee mobile phone, or a workstation with limited access to corporate data. These weak points typically reside in low value segments of the corporate network. Once the hacker breaks in and gets a toehold, however, he can often navigate to other more valuable parts of the network − which tend to be much more rigorously protected from external attackers − quite easily.

This “lateral movement” modus operandi proves to be effective most of the time because many organizations do not isolate different segments of the network from one another. Moving from segment to segment is usually a breeze once hackers get into the network.

Article continues after this advertisement

A few trends will make such attacks from within the organization more common in the coming years:

Article continues after this advertisement

1. The increasing adoption of employee-owned mobile devices in enterprise environments. These are often poorly secured and provide a weak point of entry into the organization for hackers.

Article continues after this advertisement

2. The exponential growth of Internet of Things (IoT) devices. Early and even current versions of these devices are not designed with security in mind, and are very tedious if not impossible to secure properly.

3. Advancement in hacking techniques.

Article continues after this advertisement

Internal segmentation firewalls needed

Traditionally, organizations deploy firewalls at the perimeter of the network for protection. Edge firewalls label all external traffic (i.e. Internet traffic) as untrusted, while designating all intra-network traffic as trusted, and handle them in two distinct ways. There are no grey areas; no ambiguity.

Unfortunately the world isn’t black and white anymore.

With the rise of attacks originating from weak segments of the network, the line delineating trusted and untrusted traffic has blurred. Merely deploying firewalls at the edge of the network is no longer adequate − organizations need to re-architecture their network such that internal firewalling can restrict malware flow between different segments of the organization.

According to research firm Forrester, enterprises have built strong perimeters, but well-organized cybercriminals have recruited insiders and developed new attack methods that easily bypass their current security protections. Security and risk professionals today must make security ubiquitous throughout the network, not just at the perimeter.

Forrester advocates the zero trust security model, where the network is securely segmented, and all traffic is inspected and logged. With such a model, the information flow between an engineer and his/her marketing colleague seated next to each other, for example, will no longer proceed unchecked.

Because these two employees are assigned to different network segments and an internal segmentation firewall (ISFW) is in place, proper policies will be applied and logs will be generated for any traffic traversing between the two departments.

ISFW comprises two kinds of technologies − policy-based segmentation that identifies a user’s parameters, and dynamically and consistently enforces a security policy controlling the user’s access to enterprises resources; and firewall segmentation that divides up the internal network to enable traffic analysis, logging and full security control.

An ISFW does not replace the edge firewall. Instead, an ISFW provides multiple touch points within a network in order to provide security between existing network boundaries, or create entirely new segments inside of existing network boundaries. It also improves visibility by letting IT management see all layers of the network in one pane of glass.

Depending on the level of security needed between each network segment, the types of protection enabled will vary.

Once a firewall is deployed into each segment of an enterprise network, its policy, logging and various modern detection features can help identify and quarantine users that have been compromised. Also, the firewalls would make it much harder for hackers to do reconnaissance and discovery even if they have started to make their way inside the company network.

ISFWs should work in synchronization with one another, leveraging threat intelligence and be complemented by advanced persistent threat (APT) detection solutions like sandboxing and endpoint security solutions so that actions can be taken to identify compromises and quarantine them as soon as they are discovered.

Removing performance and cost barriers

Enterprises’ traditional objections to putting a firewall in front of each network segment have been around performance and price. Because intra-network traffic volume can be many times that of Internet traffic volume, not many firewalls have the capability to handle the workloads without significant latency. Those that can handle it, when deployed in large numbers to cover each network segment within the enterprise, can make the cost prohibitive for many organizations.

Today, however, attainable solutions exist. Modern firewalls that leverage custom ASIC chips can be fast enough to handle internal firewalling and be cost effective at the same time.

Some may recall that per-port security was all the rage a few years ago, until implementation hurdles put an end to that promise. Current ISFW technology is a step towards reviving that promise. As technologies in switching and access port security evolves and performance improves, we will be able to combine them with ISFW to reach that goal.

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our daily newsletter

By providing an email address. I agree to the and acknowledge that I have read the .

The concept of internal segmentation firewalling has put the network security industry on the cusp of an exciting era. Firms that want to take their operations − and their business − one step ahead of the competition should take advantage of it.

(The author is founder, president and chief technology officer of Fortinet)

Michael Xie of Fortinet.

Michael Xie of Fortinet.

MOST READ
www
business
www
globalnation
sports
TAGS: ISFW

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our newsletter!

By providing an email address. I agree to the and acknowledge that I have read the .

© Copyright 1997-2024 ºÚÁÏÉç | All Rights Reserved

This is an information message

We use cookies to enhance your experience. By continuing, you agree to our use of cookies.