1 hour 17 minutes
welcome back. So we're gonna cover the learning objectives for our next section, which is placed in trust in Zero Trust.
And our first topic, of course, is going to be How do we place trust in zero trust?
Then we're gonna move on and we will take a look at what trust means in a zero trust network. Then
we must understand how we manage that trust.
And so we move on toe, have a brief discussion on public key infrastructure and the role it plays in zero trust.
Stick around more to come
place in trust and zero trust.
So we now know that the Zero Trust Network is a network that should be seen as completely untrusted.
Now, this model does not want an administrator to secure local server any differently than he or she would if that server were accessible on the Internet
and all host must be seen as Internet facing.
So hopes that are entrusted zones cannot simply provide user and host identification in the form of a user name and password.
Strong encryption is required,
but strong authentication is required as well.
In the zero trust model, there is a control plane and a date, a plane. And in between that is the components authentication and authorization.
The control plane sets the policies that dictate if the connection will be allowed or denied
the dead. A plane simply sends the request. If the right attributes are present
and the control planes policies,
they allow that action for the user. The device in the application
as an administrator or engineer, were placed in trust in the control plane and preparing a trust score
that determines entry.
So keep in mind that this isn't just occurring at the perimeter, but throughout the network and the zones that have been created.
So what is trust?
Trust in a zero trust network is strong authentication and least privilege.
You know, we talked about, Ah, the putting together of more than one attribute to authenticate our users and devices, but least privilege also helps to build trust,
you know, least privilege is the notion that a user device or application should only be allowed. The privilege is required to perform the task it was given.
is the act of given permissions that are desired, more so than required and can lead to accidental misuse
or intentional attacks by user
device or an application.
An example would be the use of an application. Instead of using our own account to run that application service,
you would want to create a service account
and on Lee provided with the required privileges and these to perform the service it was purchased for or developed for.
We could even try and take it a step further if the environment uses Microsoft's active directory system.
You know, with that system, we can specify accounts should be interactive or non interactive in terms of its logging ability.
You know what? What that means is, if you configure a service account to have non interactive log in on your domain than if that account was compromised, the attacker wouldn't have the ability to actually sign in. Tow a host when prompted at Let's say, windows log in screen.
So it's these extra vantage points you have when you use the zeros trust concept.
And when you shift to that model, there's these functions that you can use. You can pull out of your active directory systems or really any system that you're using
to ah Tau achieve zero trust throughout your network and throughout your zones.
So trust management, you know, manager and trust will come down to strong authentication.
Now, generally, an appliance, physical or virtual will review the i p address of the remote system and then simply check the password after a credential Prompt is building.
But with zero trust, things like device posture and client base certificates should be used in conjunction with the using the password.
You know, when I was thinking about authentication, something really moved in my spirit and my mind and I want to share it with you. Now Be patient with me because
I am going somewhere with this. Just listen
such a great song That brings me back to my childhood.
So does anyone know who or what group is responsible for this song?
And it's okay if you don't, because
if you get it right or wrong, I would encourage you to listen to that song
after this course on after I tell you the answer, right?
So it's the British rock group Queen,
and this song was a big part of the soundtrack toe eighties movie.
Does anyone know that movie
now? Same rules apply here right or wrong. I will encourage you to check out. It's a cult classic,
Um, when you have some free time.
So that movie is Highlander,
and the reason the song and movie come to mind
is really the tag line for the movie. There can be only one,
and that's true with authentication, right? Only one person should be able to say I am Mario Bardwell and authenticate toe a computer or application. Only one device should be able to authenticate with his own credentials, whether that be via a client base certificate
to access another device or service.
So, just like Highlanders
authenticity that we can see and hear,
he says it in his famous line. I am Duncan Macleod of the Clan Macleod.
And that's what we want for our networks, right? Never really trusted, but always verifying.
And how does Duncan Macleod of the clan Macleod verify that he is who he says he is?
We'll watch the movie and find out
now it is rated R, so it would be best not to watch it around Children.
Okay, let's move on and discuss P k I N zero Trust
Check Point Jump Start: Harmony Endpoint Security
This course, brought to you by industry leader Check Point, introduces you to Harmony Endpoint ...
1 CEU/CPE Hours Available
Certificate of Completion Offered
Enterprise Security Leadership: Designing Enterprise for Multi-Cloud
In the final session of Ed Amoroso's series on Enterprise Security Leadership, he discusses the ...
1 CEU/CPE Hours Available
Certificate of Completion Offered