Creating The Most Secure Network – Part 4
Integrating Active and/or LDAP directories into routing is the fourth critical step in creating a world class, secure network.
- Create a network that Denies All packets unless there is an explicit policy to allow them on the network. This creates a Zero Trust network that does not have broadcast domains nor default routes that can propagate malicious traffic.
- Integrate Routing and Security into the same software stack so that the two can work together. Today’s world where routers forward packets and firewalls block packets is too complex, cumbersome, and costly.
- Use Named Addressing in a network so that routing and security policies can transit a firewall/NAT boundary and policies can be understood by humans and applications, which is one of the foundations for Intent Based Networking.
The fourth step is to use the existing enterprise directories as part of the naming schema for the routing and security policies which defines who (on their many devices) has access to what (the many applications, websites, and other users).
Identity and access management are core foundational elements for security, and this information is stored in directories. It is only logical then that routing should leverage this information in the decision on whether to forward a packet on a network or not.
Network Admission Control (NAC) is an attempt to do this, but does not work in the real world where users are mobile and applications are everywhere, resulting in using networks that one does not own or control. Plus, once you are on the network you can go anywhere.
Directories allow for a standard way to segment an organizations users, devices, and applications along with federation that enables this across organizations. Forests, Trees, Domains, Organization Units, Objects, Attributes, and Services provide a hierarchical segmentation model that can be used for routing and security policies.
Instead of having to create thousands of Access Control Lists in routers and firewalls, a directory can be imported and used for routing and security policies. As the users and applications change, the directory gets updated and then downloaded by the secure routed network and automatically distributed for enforcement.
Network security starts at the very edge of the network, and until enterprises and service providers realize this, their networks will remain vulnerable.
Look ma, no ads!
Admit it! You just can’t look away. Yet, there’s so much more.
Become a subscriber to TalkingPointz for access to reports and premium posts.
There are several ways to stay informed:
- Visit this site regularly.
- Receive new posts in your email once a week.
- Become an Insider or All Access Subscriber for alerts and access to uncensored content.
TalkingHeadz Podcast
The TalkingHeadz podcasts are @DaveMichels and @EvanKirstel chatting with interesting guests. These are unsponsored and unscripted for your enjoyment. You can subscribe on most podcast apps including iTunes.
TalkingHeadz Podcast with David Petts of Mitel
Mitel is back in the news again – this time for its planned acquisition of Unify from Atos. This podcast only touches on that – the news was very fresh and the deal hasn’t closed yet. However, it’s an interesting…
Leave a Comment