Page 19 - Cyber Defense eMagazine April 2023
P. 19

Many organizations are implementing Zero Trust to help them restrict access to valuable data, systems
            and IP to only those individuals or systems that should have access.

            This is a laudable initiative because it forces three things. First it forces organizations to identify what is
            most valuable. Secondly it forces them to clarify exactly who (or what systems) needs access to those
            resources.  And  lastly  it  forces  organizations  to  examine  both  their  network  architecture  and  their
            authentication mechanisms.

            Undertaking this analysis can help improve security posture across the board, as teams need to know
            and define what “good” looks like. Importantly, it also helps teams identify where additional monitoring
            and visibility is required to protect the crown jewels, and highlights which threats warrant the highest
            priority.  If  an  attack  is  detected  that  may  provide  access  to  highly  valuable  assets,  then  it  must  be
            prioritized over attacks on assets of lesser value. Teams can also better target proactive security activity
            – such as threat hunting and deeper vulnerability analysis – in areas where it matters most.

            Successful Zero Trust implementation depends on careful analysis of the environment and a methodical
            design and implementation process. But it’s also crucial to ensure, as you re-architect the environment,
            that you don’t create monitoring blind spots. Indeed, you may need to increase visibility in certain areas
            of the network to help better detect and defend against attacks on high-value, crown jewel assets.

            You need the ability to test and validate your infrastructure as well as monitor it. So collecting the evidence
            you need – including network and endpoint data -- is crucial. Organizations frequently deploy additional
            evidence collection – such as continuous full packet capture – in segments of the network where high-
            value assets are located to ensure they have maximum visibility into all activity and can thoroughly test
            their defenses.




            Issue Three: Gaining greater visibility into threats, as early as possible.

            Detection tools must be as accurate as possible. That’s not an insignificant issue, given the difficulty of
            detecting attacks such as Zero Day threats, threats hidden inside encrypted traffic,  and supply chain
            compromises like the Solarwinds “Solarflare” attacks that originate from trusted systems.

            As network speeds increase, it’s critical to ensure that NDR, IDS and AI-based monitoring tools can keep
            pace. A monitoring tool that maxes out at 10 Gbps is going to flounder when network speeds increase to
            40 Gbps or beyond and is going to have difficulty detecting threats that are hidden inside encrypted
            streams  or  that  leverage  common  protocols  such  as  DNS  to  disguise  malicious  activity,  such  as
            beaconing or data exfiltration.

            AI-based detection tools can help supplement other monitoring tools by identifying anomalous behavior
            that might not have triggered alerts. But you also need the ability to quickly investigate these anomalies
            to determine whether they pose a real threat or are simply anomalous but not malicious. Again, it’s crucial
            for analysts to have the right evidence to quickly investigate and prioritize events and flag false positives
            back to detection tools to improve accuracy.








                                                                                                              19
   14   15   16   17   18   19   20   21   22   23   24