3.1 The Big Fundamentals Part 1 - ZN
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:00
Hello and welcome back. We've got some learning objectives to go over with the next section,
00:06
and in this next section we're gonna focus on the fundamentals of zero trust. We'll also take a look at client initiated attacks
00:15
and also pivot in on a traditional network.
00:19
So stay tuned. Thanks for being here.
00:26
The big fundamentals.
00:28
I love this title
00:30
as a basketball sports fan. I loved watching the Los Angeles Lakers face off against the San Antonio Spurs.
00:37
Shaquille O'Neal, or shack as most of us refer to him, would always refer to San Antonio Spurs power forward Tim Duncan
00:45
as the big fundamentals,
00:47
and it was such a contrast in style between the two teams.
00:51
The Lakers had a lot of flash, and the Spurs had great ball movement that
00:57
have the ability to allow them to execute with precision.
01:00
And so the Spurs were ableto put the ball in everyone's hands before a shot was taken
01:07
and the Lakers primarily dependent on shack or their other perennial all star, Kobe Bryant.
01:12
And when I think about the Spurs and how they play the game of basketball, it was always the fundamentals that kept them in the championship conversation.
01:22
And now, much like the San Antonio Spurs, you must go back to the basics and look closely at how the game is being played, from how our workforce works and how our adversaries operate. It's not enough that he purchased the best perimeter firewall when I work Forces Mobile
01:40
and bring your own device or B Y. O. D
01:42
is coming to every organization now, with cloud adoption quickly winning the hearts and minds of our business leaders,
01:49
we have to go back to the fundamentals.
01:59
So let us take a look at the fundamentals that make up zero trust model
02:04
and wide, so appealing for our security professionals and information technology professionals. In general,
02:10
we have. The network is always assumed to be hostile.
02:15
The external and internal threats exist on the network at all times.
02:20
Network locality is not sufficient for deciding trust in the network.
02:24
Every device, user and network flow must be authenticated and authorized,
02:30
and policies must be dynamic and calculated
02:34
from his many sources of data as possible.
02:38
Fundamental number one. The network is always assumed to be hostile,
02:44
so
02:45
we want to secure systems with strict security measures, no matter what zone there residing
02:51
Well, what purpose they serve,
02:53
And why do you think that is?
02:58
Well, think about this.
03:00
The networks of the past didn't require Internet
03:04
access to provide functionality to its employees. But in today's networks, more service's are hosted in the cloud and are moving away from our own data centers.
03:14
And when I talk about the past, I'm really referring to like the sixties and seventies, when the Internet wasn't such a commodity. It wasn't something that was a household benefit or even available to all businesses, right?
03:27
You know how many of us pull up at a drive through
03:30
and before you leave, you check your bags to make sure you have all that you ordered?
03:37
If you've done that, you're essentially performing SSL inspection, right? You know, when that cash air smiles at me and says, It's all there, have a nice day. I smile back. But I opened my bag and I moved the contents in the bag around to make sure
03:53
it's the way it is and not the way I see it or the way they see it.
03:59
You know, some of you may wait until you get in the car before you start your SSL inspection, but not me, Right? So we're learning that good service is will open your bags and review the order with you.
04:11
Is that kind of attention to detail that zero trust models will bring to your network?
04:18
So in this slide, we got a hostile takeover.
04:21
So we want to see
04:25
this client initiated attack that creates connections.
04:29
And some of you, if not all of you probably have heard of the term reverse shell.
04:34
Now her show is what we see with this visual.
04:39
You know, this type of attack is commonplace and can be very successful and bypassing perimeter firewalls due to reduced or relax outbound security. See, our adversaries
04:50
are very good at masquerading the phone home as normal Web traffic.
04:57
So networks don't want to break the business with stringent bound security
05:01
for their users. And what we see due to our conditioning about how we treat network zones,
05:09
is that outbound security is much tighter in R, D, M Z
05:13
and other zones that are relatively closer to the Internet.
Up Next
Instructed By
Similar Content