This post is about a design approach for loosely disconnected components of a system or a group of networked devices. Those components are normally different processes serving WebAPI, Database, or consuming applications. Or if wet think from networking aspect those are different devices inside a network. Mainly those are inside a perimeter network of an enterprise.
More than programming, this is about enterprise architecture and no code snippets. Please continue if interested.
What's before Zero Trust Security Model
Before Zero security model, there were models where only the external endpoints are protected. Whatever happens inside a trusted network area is considered secure. Some examples below
- An AD server simply responds to the requests that come from a web server inside the trusted network.
- If the webserver only exposing 443 for external traffic and uses 80 for internal services, it simply responds to requests in 80 without authenticating. This is on the assumption that the request can only originate from within that server.
Zero Trust model
References
- https://en.wikipedia.org/wiki/Zero_trust_security_model
- https://www.gartner.com/smarterwithgartner/new-to-zero-trust-security-start-here/
- https://www.thoughtworks.com/radar/techniques/zero-trust-architecture
- https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture
- https://www.microsoft.com/security/blog/2020/06/15/zero-trust-part-1-networking/
- https://docs.projectcalico.org/security/adopt-zero-trust
- https://azure.microsoft.com/en-us/blog/automating-cybersecurity-guardrails-with-new-zero-trust-blueprint-and-azure-integrations/
- https://www.stackrox.com/post/2019/08/istio-security-basics-running-microservices-on-zero-trust-networks/
No comments:
Post a Comment