8 steps to zer trust · access proxy preparation stage next, configure your access proxy to be...

1
ZER TRUST Application Precheck Stage First, check to make sure the application meets the requirements of the access proxy you have deployed. Read more about pre-staging assumptions and necessary prerequisites in this white paper authored by Charlie Gero. Access Proxy Preparation Stage Next, configure your access proxy to be aware of the application as well as its specific security and access rights. Consider the environment in which this will be configured — cloud versus on-premises — and how it will be pushed to your end users. Test Lab Enrollment Stage Now you can begin onboarding users. We recommend a designated Test Lab group be previously established; these users will be those first responsible for verifying the functional integrity of the application. At this time, Test Lab members should confirm that authentication is working correctly, multi-factor authentication is appropriately configured, and single sign-on works across all other previously onboarded applications. For more information about user grouping methodology, see the white paper. Security Upgrade Stage Once Test Lab users are safely able to access the application, you should consider enabling advanced security features that otherwise were impossible in the traditional perimeter model. We recommend: Web application firewall (WAF) for SQL injection, cross-site scripting, and common injection attacks Advanced threat protection Browser and operating system governance Restrictions for unmanaged versus managed devices Geoblocking and IP-based limitations Regardless of the features you enable, Test Lab members should ensure that the security options are not only working, but also are not inhibiting the functional correctness of the application. Performance Upgrade Stage You should now examine performance degradation. In traditional access and security models, enterprises are often limited in performance by the robustness of the application server and the enterprise’s associated links between branch locations. Features we recommend to mitigate these issues include: Caching Utilizing a content delivery network (CDN) Route optimization Forward error correction (FEC) Packet replication In any event, we recommend performance instrumentation at this phase as well as prior to application enrollment, in order to accurately assess the performance gains. External User Enrollment Stage It’s time to roll the application out to external users, as non-traditional access means VPN removal for this group. External users are also most often affected by performance issues and are in the most hostile environments — their very location puts your applications and data at risk. While the transition should be nearly invisible, aside from increased performance, we recommend advanced notification to users so that they can keep a close eye on functional correctness. For more information about user grouping methodology, read the white paper. Internal User Enrollment Stage At this point, you can add the application as a CNAME (Canonical Name) entry to the common view. All users should then immediately begin accessing this application via the access proxy. Hopefully, through the prior six stages, any errors or misconfigurations will have been discovered and remedied; all users should now be enjoying the benefits of easier, faster, and safer access. For more information about user grouping methodology, see the white paper. 8 Steps To A Comprehensive and Achievable Roadmap 1 2 3 4 5 6 7 VLAN Migration Stage After an appropriate amount of time has passed, you can shift the application into the walled-off VLAN. Before this occurs, the application server itself is still reachable directly through its IP address and thus vulnerable to malware within your network perimeter. This final stage removes all direct IP access, effectively walling the application off from anything but the access proxy itself. For a guide to post-staging operations, read the full white paper, Moving Beyond Perimeter Security. 8 As applications, users, and devices evolve, dissolving what was once the trusted enterprise perimeter, many businesses are turning to a zero trust security model to secure against attacks. Use this step-by-step guide from Akamai’s CTO, Charlie Gero, to build an inclusive and concrete zero trust architecture, intended to help enable safe application access in a cloud-native world. Easily transition to a perimeter-less environment with this prescriptive process, phasing applications in one at a time and reducing your migration risk profile. Review Akamai’s zero trust reference architecture to visualize this process or visit akamai.com/zerotrust to learn more about the solutions that can assist you with the above implementation. As the world’s largest and most trusted cloud delivery platform, Akamai makes it easier for its customers to provide the best and most secure digital experiences on any device, anytime, anywhere. Akamai’s massively distributed platform is unparalleled in scale with over 200,000 servers across 130 countries, giving customers superior performance and threat protection. Akamai’s portfolio of web and mobile performance, cloud security, enterprise access, and video delivery solutions are supported by exceptional customer service and 24/7 monitoring. To learn why the top financial institutions, e-commerce leaders, media & entertainment providers, and government organizations trust Akamai please visit www.akamai.com, blogs.akamai.com, or @Akamai on Twitter. You can find our global contact information at www.akamai.com/locations. Published 05/18.

Upload: others

Post on 19-Aug-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 8 Steps To ZER TRUST · Access Proxy Preparation Stage Next, configure your access proxy to be aware of the application as well as its specific security and access rights. Consider

ZER TRUST

Application Precheck StageFirst, check to make sure the application meets the requirements of the access proxy you have deployed. Read more about pre-staging assumptions and necessary prerequisites in this white paper authored by Charlie Gero.

Access Proxy Preparation StageNext, configure your access proxy to be aware of the application as well as its specific security and access rights. Consider the environment in which this will be configured — cloud versus on-premises — and how it will be pushed to your end users.

Test Lab Enrollment StageNow you can begin onboarding users. We recommend a designated Test Lab group be previously established; these users will be those first responsible for verifying the functional integrity of the application. At this time, Test Lab members should confirm that authentication is working correctly, multi-factor authentication is appropriately configured, and single sign-on works across all other previously onboarded applications. For more information about user grouping methodology, see the white paper.

Security Upgrade StageOnce Test Lab users are safely able to access the application, you should consider enabling advanced security features that otherwise were impossible in the traditional perimeter model. We recommend:

• Web application firewall (WAF) for SQL injection, cross-site scripting,and common injection attacks

• Advanced threat protection• Browser and operating system governance• Restrictions for unmanaged versus managed devices• Geoblocking and IP-based limitations

Regardless of the features you enable, Test Lab members should ensure that the security options are not only working, but also are not inhibiting the functional correctness of the application.

Performance Upgrade StageYou should now examine performance degradation. In traditional access and security models, enterprises are often limited in performance by the robustness of the application server and the enterprise’s associated links between branch locations. Features we recommend to mitigate these issues include:

• Caching• Utilizing a content delivery network (CDN)• Route optimization• Forward error correction (FEC)• Packet replication

In any event, we recommend performance instrumentation at this phase as well as prior to application enrollment, in order to accurately assess the performance gains.

External User Enrollment StageIt’s time to roll the application out to external users, as non-traditional access means VPN removal for this group. External users are also most often affected by performance issues and are in the most hostile environments — their very location puts your applications and data at risk. While the transition should be nearly invisible, aside from increased performance, we recommend advanced notification to users so that they can keep a close eye on functional correctness. For more information about user grouping methodology, read the white paper.

Internal User Enrollment StageAt this point, you can add the application as a CNAME (Canonical Name) entry to the common view. All users should then immediately begin accessing this application via the access proxy. Hopefully, through the prior six stages, any errors or misconfigurations will have been discovered and remedied; all users should now be enjoying the benefits of easier, faster, and safer access. For more information about user grouping methodology, see the white paper.

8 Steps To

A Comprehensive and Achievable Roadmap

1

2

3

4

5

6

7

VLAN Migration StageAfter an appropriate amount of time has passed, you can shift the application into the walled-off VLAN. Before this occurs, the application server itself is still reachable directly through its IP address and thus vulnerable to malware within your network perimeter. This final stage removes all direct IP access, effectively walling the application off from anything but the access proxy itself. For a guide to post-staging operations, read the full white paper, Moving Beyond Perimeter Security.

8

As applications, users, and devices evolve, dissolving what was once the trusted enterprise perimeter, many businesses are turning to a zero trust security model

to secure against attacks.

Use this step-by-step guide from Akamai’s CTO, Charlie Gero, to build an inclusive and concrete zero trust architecture, intended to help enable safe application access

in a cloud-native world. Easily transition to a perimeter-less environment with this prescriptive process, phasing applications in one at a time and

reducing your migration risk profile.

Review Akamai’s zero trust reference architecture to visualize this process or visit akamai.com/zerotrust to learn more about the solutions that can assist you with the above implementation.

As the world’s largest and most trusted cloud delivery platform, Akamai makes it easier for its customers to provide the best and most secure digital experiences on any device, anytime, anywhere. Akamai’s massively distributed platform is unparalleled in scale with over 200,000 servers across 130 countries,giving customers superior performance and threat protection. Akamai’s portfolio of web and mobile performance, cloud security, enterprise access, and video

delivery solutions are supported by exceptional customer service and 24/7 monitoring. To learn why the top financial institutions, e-commerce leaders, media & entertainment providers, and government organizations trust Akamai please visit www.akamai.com, blogs.akamai.com, or @Akamai on Twitter. You can find our

global contact information at www.akamai.com/locations. Published 05/18.