Network security has changed drastically in the last 10 years. Gone is the old perimeter-based defense model. The rapid expansion of cloud computing and the explosion of remote work that accompanied the COVID-19 pandemic have led to the adoption of two complementary but different models of network security: zero trust and secure access service edge (SASE).
No more limits
Once upon a time, an organization's networks had a physical limit. When you got to the office and booted your PC, you were on the network. If you left the office, you could no longer reach the network.
Network security was correspondingly simple.
"All you needed was the edge perimeter firewall, and that was your network security because everything was just a flat network," says Julian Mihai, CISO at Penn Medicine in Philadelphia.
That started changing around 2000 with the deployment of enterprise VPNs and home broadband internet access. But even then, when a worker logged in from home using a VPN, the organizational network still had an "inside" and an "outside," and the VPN provided access to the "inside." Once "inside," a worker often had unrestricted access to most of the network.
That's not the case today. In the zero-trust and SASE models, the network is everywhere, almost every organization has assets in the cloud, and anyone — or anything — can join the network with the right credentials.
"You need to think of security holistically," says Aviv Abramovich, head of security services product management at Check Point. "Your network actually extends to the employee that sits at home in their slippers, reading their email on their bring-your-own-computer connected to their personal Wi-Fi router at home."
Two other factors affecting modern network security have been the proliferation of powerful, modern smartphones and the parallel development of "smart" TV sets, voice assistants and other appliances.
The ubiquity of smartphones means that tens of millions of pocket-sized, privately owned and managed personal computers join enterprise networks every workday. Network-security staffers must secure and sanitize inputs from these devices, a task made easier by zero-trust models that assume every device is potentially hostile.
The addition of a smart TV, smart refrigerator, or rogue embedded device to the workplace network (or even connecting remotely) creates another avenue of attack — which can likewise be mitigated by zero trust.
Verify, but don't trust
The zero-trust model uses identity rather than location relative to the perimeter to grant access. More importantly, the zero-trust model does not give users free range through the network.
Instead, users must authenticate themselves when accessing new areas and resources, even if they have already logged in. The zero-trust model also works well for legacy, on-premises networks.
"The fact that I trusted you two minutes ago doesn't mean I trust you now," Abramovich says. "Maybe you, in those two minutes, managed to get malware on your laptop, or wherever you're accessing, and now I have to take that trust away."
Zero trust began to gain ground after 2010. That’s when Google implemented, then evangelized, its BeyondCorp zero-trust model and Forrester Research published a now-famous paper called "No More Chewy Centers: Introducing the Zero Trust Model of Information Security."
But zero trust in practice really took off in early 2020 when the COVID-19 pandemic suddenly created hundreds of millions of remote workers around the globe.
"[COVID] definitely accelerated something that already started before: the need to work from my phone, work from my computer, work from home, work from a cafe, work when I travel, and so on," says Abramovich.
A corollary to zero trust is the principle of least privilege, which states that no user should be granted more system permissions or privileges than necessary to carry out an assigned role.
"The reality is you're going to have a threat actor on a trusted asset on your network," says Mihai. "Without having the zero-trust approach, on the network, on the applications, you're not going to be able to contain that threat effectively."
Zero trust also resolves some of the issues associated with cloud computing, which removed assets and workloads from the safe cocoon of perimeter defenses. Because the zero-trust model is centered around identity rather than geography, it makes it easier to protect cloud assets that could physically be anywhere.
Getting SASE at the service edge
Secure access service edge (SASE) and its sibling, security service edge (SSE), are more specialized in their use cases than zero trust.
The best use case for SASE is a large organization with many offices spread across a wide area. Instead of trying to replicate a perimeter-based network with hard-wired or VPN connections between branch offices and the central headquarters, SASE creates a software-defined wide area network (SD-WAN) that can be governed from the cloud.
SASE extends network protections to regionally dispersed points of presence (POPs), to which users can connect locally instead of to a far-off data center. Because the network is cloud- and software-based, it doesn’t need to "be" anywhere, which means it can also reach employees working at home.
To protect this virtual network, SASE employs a cloud-based firewall, aka a firewall-as-a-service (FWaaS) to enforce company network policies; a secure web gateway (SWG) to monitor user web traffic and block malware; and zero-trust network access (ZTNA), which applies zero-trust principles to all access requests.
Most SASE implementations include a cloud-access security broker (CASB) to monitor and control traffic to cloud applications and instances.
"There are customers that secured [their] cloud and they are not using SASE," says Abramovich. "SASE is more of an architecture where you have SD-WAN on the branch and firewall as a service in the cloud."
Some SASE and SSE setups add data-loss-prevention (DLP) systems, domain-name-system-layer (DNS-layer) security or intrusion-prevention or intrusion-detection systems (IPS/IDS). Alternatively, the FWaaS or SWG may provide some or all those protections.
SASE was first defined in a Gartner white paper in 2019. Two years later, Gartner acknowledged that many organizations without branch offices, or without any offices at all, had no use for SD-WAN. It came up with SSE, which preserves the FWaaS, SWG, CASB and PoP components of SASE and lets ZTNA handle the secure network connection.
Keeping the cloud safe
Network security in the cloud requires "cloud-native" security tools that can follow each asset, each set of data and each user and create protections around them individually. This software, and its associated techniques, may not be familiar to security practitioners accustomed to on-premises networks.
In addition to CASB and ZTNA, these tools include cloud security-posture management (CSPM), a cloud workload protection platform (CWPP) and the more encompassing cloud-native application protection platform (CNAPP).
Naturally, licensing and implementing these cloud-native tools, and training your staff to run them, is expensive. Some organizations may need to expand their security staff to keep up with the expansion of their cloud assets.
However, the old ways also still apply, and you shouldn't throw out those legacy network-security tools just yet.
In a recent survey of 202 IT and security managers and decision-makers conducted by CyberRisk Alliance, 96% of respondents said their organizations had at least some workloads in the cloud.
But only 16% of respondents said that more than three-quarters of their workloads were cloud-based, meaning that almost all respondents were running networks that were hybrids of cloud and legacy elements. "The vast majority [of organizations] have traditional networks [that] are being augmented by cloud and other types of new technologies," says Abramovich. "Perimeter defense is still very relevant for all of those organizations."