Blog Archives - Page 11 of 30 - RedSeal

Risk Prioritization: Improving Network Vulnerability Security Management

Staying proactive with vulnerability prioritization is essential for any organization to effectively manage and mitigate cybersecurity risks.

Here are some key steps and strategies to help you prioritize vulnerabilities proactively: 

  • Identify assets that have not been scanned by a vulnerability management tracking tool.
  • Identify the network devices and specific access rules preventing scanner access.
  • Prioritize network vulnerabilities for remediation or mitigation based on risk — risk-based vulnerability is calculated in the context of your network, business, and vulnerability management best practices.
  • Visualize all reachable assets for optimal scanner placement.
  • Efficiently triage and plan mitigation of unpatchable vulnerabilities through containment or isolation.

With RedSeal’s platform, add value to each phase of a network vulnerability management program: discovery, assessment, triage, and vulnerability remediation and mitigation.

  • Discover assets: Generate scanner target lists and identify assets that have not been scanned.
  • Perform cyber vulnerability risk assessment: Identify network devices and configuration rules preventing scanner access. Visualize all reachable assets for optimal scanner placement.
  • Triage findings: Perform risk-based vulnerability prioritization based on your network context, taking into account severity, asset value, as well as upstream and downstream access.
  • Remediate and mitigate vulnerability issues: Identify precise access paths and devices to update in order to isolate and contain vulnerable assets that can’t be patched.

RedSeal integrates with industry-leading vulnerability scanners and overlays their input onto your network model. By identifying gaps in your coverage and prioritizing all findings based on accessibility as well as asset value and vulnerability severity, we help to maximize your vulnerability management investment.

Learn more or schedule a demo today!

Independent Assessment: TAG Infosphere

Using RedSeal for Cybersecurity and Compliance

A recent study by independent industry analysts at TAG Infosphere concluded that the exposure analytics capabilities of the RedSeal platform— specifically, network modeling, attack path analysis, risk prioritization, and compliance management— are well-suited to reduce risk and strengthen the security posture of complex hybrid networks.

Click here to download the full report and schedule a demo today.

 

 

 

 

Expert Insights: Building a World-Class OT Cybersecurity Program

In an age where manufacturing companies are increasingly reliant on digital technologies and interconnected systems, the importance of robust cybersecurity programs cannot be overstated. While attending Manusec in Chicago this week, RedSeal participated on a panel of cybersecurity experts to discuss the key features, measurement of success, and proactive steps that can lead to a more mature OT (Operational Technology) cybersecurity posture for manufacturing companies. This blog provides insights and recommendations from CISOs and practitioners from Revlon, AdvanSix, Primient, Fortinet, and our own Sean Finn, Senior Global Solution Architect for RedSeal.

Key features of a world-class OT cybersecurity program

The panelists brought decades of experience encompassing a wide range of manufacturing and related vendor experience and the discussion centered around three main themes, all complemented by a set of organizational considerations:

  • Visibility
  • Automation
  • Metrics

Visibility

The importance of having an accurate understanding of the current network environment.

The panel unanimously agreed – visibility, visibility, visibility – is the most critical first step to securing the network. The quality of an organization’s “situational awareness” is a critical element towards both maximizing the availability of OT systems and minimizing the operational frictions related to incident response and change management.

Legacy Element Management Systems may not be designed to provide visibility of all the different things that are on the network. The importance of having a holistic view of their extended OT environment was identified in both proactive and reactive contexts.

The increasingly common direct connectivity between Information Technology (IT) and Operational Technology (OT) environments increases the importance of understanding the full scope of available access – both inbound and outbound.

Automation

Automation and integrations are key components for improving both visibility and operational efficiency.  

  • Proactive assessment and automated detection: Implement proactive assessment measures to detect and prevent segmentation violations, enhancing the overall security posture.
  • Automated validation: Protecting legacy technologies and ensuring control over IT-OT access portals are essential. Automated validation of security segmentation helps in protecting critical systems and data.
  • Leveraging system integration and automation: Continue to invest in system integration and automation to streamline security processes and responses.

Metrics

Measuring and monitoring OT success and the importance of a cybersecurity framework for context. 

One result of the ongoing advancement of technology is that almost anything within an OT environment can be measured.

While there are multiple “cybersecurity frameworks,” the panel was in strong agreement that it is important to leverage a cybersecurity framework to ensure that you have a cohesive view of your environment.  By doing so, organizations will be better-informed regarding cybersecurity investments and resource allocation.

It also helps organizations prioritize and focus on the most critical cybersecurity threats and vulnerabilities.

The National Institute of Standards and Technology (NIST) cybersecurity framework was most commonly identified by practioners in the panel.

Cybersecurity metric audiences and modes 

Different metrics may be different for very different roles. Some metrics are valuable for internal awareness and operational considerations, which are separate from the metrics and “KPIs” that are consumed externally, as part of  “evidencing effectiveness northbound.”

There are also different contexts for measurements and monitoring:

  • Proactive metrics/monitoring: This includes maintaining operational hygiene and continuously assessing the state of proactive analytics systems. Why would a hack want to get in? What is at risk and why does it matter to the organization? 
  • Reactive metrics/monitoring: Incident detection, response, and resolution times are crucial reactive metrics. Organizations should also regularly assess the state of reactive analytics systems. 
  • Reflective analysis: After incidents occur, conducting incident post-mortems, including low-priority incidents, can help identify systemic gaps and process optimization opportunities. This reflective analysis is crucial for learning from past mistakes and improving security. 

 Organizational Considerations 

  1. Cybersecurity risk decisions should be owned by people responsible, and accountable for cybersecurity.
  2. Collaboration with IT: OT and IT can no longer operate in isolation. Building a strong working relationship between these two departments is crucial. Cybersecurity decisions should align with broader business goals, and IT and OT teams must collaborate effectively to ensure security.
  3. Employee training and awareness: Invest in ongoing employee training and awareness programs to ensure that every member of the organization understands their role in maintaining cybersecurity.

Establishing a world-class OT cybersecurity program for manufacturing companies is an evolving process that requires collaboration, automation, proactive measures, and continuous improvement. By focusing on visibility, collaboration, and a commitment to learning from incidents, organizations can build a strong foundation for cybersecurity in an increasingly interconnected world.

Contact RedSeal today to discuss your organizational needs and discover how RedSeal can provide unparalleled visibility into your OT / IT environments.

5 Critical Steps to Identifying and Remediating Exfiltration Paths

Summary. Cybersecurity risks continue to rise, further increasing the severity of long-term impacts.  

The latest IBM Data Breach Report revealed 82% of breaches involved data stored in the cloud—public, private, or multiple environments, with attackers gaining access to multiple environments 39% of the time. In 2023, the average cost of a data breach reached an all-time high of USD 4.45 million, representing a 15.3% increase (from USD 3.86 million) in 2020.   

It is clear that in today’s interconnected and digital age, safeguarding sensitive information is of paramount importance for any organization. Data breaches not only cause significant financial loss but can also erode the trust of customers and stakeholders. One critical threat an organization faces is ‘data exfiltration’—the unauthorized transfer of data from within an organization to an external location. 

In this article, we’ll explore the concern exfiltration paths cause and important steps you can take to identify and mitigate them. 

Understanding Exfiltration Paths 

Exfiltration paths are like hidden backdoors that malicious actors use to smuggle out sensitive information. These paths can often exploit various vulnerabilities in an organization’s network, be it misconfigured devices, neglected access controls, or compromised endpoints.  

The consequences of overlooking these paths are substantial:  

  • Loss of sensitive data: This can include everything from proprietary business information to customer data.  
    • In March, 1.2% of ChatGPT subscribers’ payment-related and personal information were exposed during an outage. While the actual number of people exposed in the breach was “extremely low” according to OpenAI, the breach exposed a number of areas requiring immediate improvement to ensure safety of subscribers. 
  • Reputation damage: Data breaches can significantly harm an organization’s reputation, leading to a loss of trust. 
    • According to Forbes, nearly half of all organizations that suffer data breaches also suffer damage to their brand – the report identifies data loss as the “fourth most common threat to reputation.” 
  • Financial repercussions: This encompasses both direct losses and potential fines from regulatory bodies. 
    • IBM found the average cost of a data breach reached an all-time high in 2023 of $4.45 million, while the number is more than double in the U.S., averaging $9.44 million.  

Safeguarding Data, Reputation, and the Future   

Designed to provide a detailed and holistic view of an organization’s entire network—including all devices, access paths, and potential vulnerabilities, RedSeal’s platform has helped hundreds of organizations gain an understanding of potential exfiltration paths while identifying and sealing off pathways.  

By the time a breach is detected, the damage is often done. It is almost always less expensive to stop an attack before it starts than to remediate. With tools like RedSeal, organizations can transition from defensive to proactive security.  

5 Steps your organizations can take to identify exfiltration paths: 

  1. Comprehensive network modeling: RedSeal creates a detailed, up-to-date model of an organization’s entire network. By doing so, it highlights all potential data flow paths, including those that might be unintentionally left open or overlooked. 
  2. Visual representation of exfiltration paths: One of RedSeal’s standout features is its ability to visually represent every possible path out of a network, providing IT teams with a clear and intuitive view of how data might be siphoned out to better recognize and address vulnerabilities. 
  3. Highlighting vulnerable access points: Using its sophisticated analytics, RedSeal can pinpoint devices or access points within the network that are susceptible to breaches or have misconfigured settings, allowing for potential data exfiltration. 
  4. Prioritization based on risk: Not all vulnerabilities are equal. RedSeal’s platform ranks potential exfiltration paths based on risk, allowing prioritization of response and patching strategies. 
  5. Simulating attack paths: RedSeal can simulate potential attack vectors, allowing organizations to proactively understand and counteract the strategies that malicious actors might employ.

Understanding potential exfiltration paths is not just a cybersecurity best practice—it’s an organizational imperative. With threats growing in sophistication and number, tools like RedSeal are no longer optional but a necessity. By identifying and sealing off these potential exfiltration pathways, businesses can safeguard their data, reputation, and future. 

Custom Best Practice Check for Detecting Juniper Firewall Vulnerabilities

Name: Juniper Firewall Vulnerability Detection Description: This Custom Best Practice Check (CBPC) detects potential vulnerabilities in Juniper firewalls that could lead to unauthorized access and remote code execution.

Rule: Regex: ^ *web-management \{(\r?\n) *htt.*

 Explanation: This regular expression (regex) is designed to match specific configuration lines within a Juniper firewall’s configuration related to web management settings. It identifies lines that start with zero or more spaces, followed by the string “web-management {” and potentially followed by any characters related to HTTP settings.

 Purpose: Juniper firewalls are known to have vulnerabilities (CVE-2023-36844, CVE-2023-36845, CVE-2023-36846, CVE-2023-36847) that can allow unauthenticated attackers to upload arbitrary files and potentially execute remote code. This CBPC aims to identify configurations related to web management, as attackers often exploit such configurations to gain unauthorized access and control over the device. Detecting such configurations will help security teams identify potential vulnerabilities and take appropriate action.

 Instructions:

  1. Log in to the RedSeal platform.
  2. Navigate to the “Best Practices Checks” section.
  3. Create a new CBPC and give it a meaningful name and description.
  4. Copy and paste the provided regex (^ *web-management \{(\r?\n) *htt.*) into the “Rule” field.
  5. Save the CBPC and run it against the target Juniper firewall configurations.

 Outcome: When the CBPC is run against Juniper firewall configurations, it will identify any lines that match the provided regex pattern. If matches are found, it indicates potential vulnerabilities related to web management settings that might need further investigation and remediation.

***Please note that while this CBPC can help in identifying potential vulnerabilities, it’s important to have a thorough understanding of your network environment and configurations. Always perform additional assessments and validations to ensure accurate results.***

Vulnerabilities Overview:

  1. CVE-2023-36846 and CVE-2023-36847: Remote Code Execution via J-Web:These two vulnerabilities allow an unauthenticated attacker to exploit the affected Juniper firewall devices. By sending specially crafted requests to the devices, attackers can upload arbitrary files to the file system through the J-Web interface. This can lead to remote code execution and compromise the integrity and availability of the firewall and the network it protects.
  2. CVE-2023-36844 and CVE-2023-36845: Unauthorized Modification of PHP Environment Variables:These vulnerabilities enable an unauthenticated attacker to modify specific PHP environment variables on the vulnerable Juniper firewall devices. By exploiting these flaws, attackers can manipulate the behavior of the firewall’s PHP environment, potentially gaining unauthorized access and control over the device.

Potential Impact: Successful exploitation of these vulnerabilities could result in:

  • Unauthorized remote code execution, enabling attackers to compromise the firewall and the entire network.
  • Unauthorized access to the firewall’s PHP environment, leading to potential data breaches, network disruption, and unauthorized control over the device.

Additional Resources:

RedSeal will continue to monitor and test vulnerabilities, please check back for updated versions with additional refinements. Let’s discuss your concerns and how RedSeal can help, contact us today.

What the Rockwell Automation ThinServer Vulnerabilities Mean for Industrial Cybersecurity

The cybersecurity landscape is an ever-evolving domain with threats sprouting up constantly. The recent revelation concerning vulnerabilities in Rockwell Automation’s ThinManager ThinServer has highlighted the urgency for robust cybersecurity measures in the realm of industrial control systems (ICS).

Understanding the Rockwell Automation ThinServer Vulnerabilities

Rockwell Automation’s ThinManager ThinServer, a product designed for thin client and RDP server management, recently came under scrutiny after researchers from the cybersecurity firm Tenable discovered critical vulnerabilities. Classified as CVE-2023-2914, CVE-2023-2915, and CVE-2023-2917, these vulnerabilities center on improper input validation issues. They can potentially allow attackers, even without prior authentication, to induce a denial-of-service condition, delete, or upload files with system privileges.

What’s most alarming is that an attacker only needs access to the network hosting the vulnerable server for exploitation. This means that if the server is connected and exposed online – against the vendor’s best practices – it becomes susceptible to attacks directly from the internet.

The potential fallout from a successful exploitation? Complete control of the ThinServer. This presents an enormous risk, especially when considering the critical role of ICS in managing and overseeing essential industrial operations.

Enhancing Industrial Cybersecurity with RedSeal Capabilities

This backdrop brings to the fore the vital role of cybersecurity solutions like RedSeal. For existing and prospective customers, leveraging RedSeal’s capabilities can be the game-changer in fortifying their cybersecurity infrastructure.

  1. Network Visualization: RedSeal provides a detailed view of network architectures, including potential access paths. By visualizing these paths, organizations can understand how a potential attacker might navigate through their infrastructure, enabling them to take preventive measures.
  2. Risk Assessment: RedSeal’s platform assesses network risk, helping businesses identify vulnerabilities like the ones discovered in ThinManager ThinServer. By pinpointing these vulnerabilities early, proactive steps can be taken before they are exploited.
  3. Validation of Network Segmentation: Often, best practices dictate that sensitive servers, like ThinManager ThinServer, should be isolated from general network access. RedSeal can validate the effectiveness of this segmentation, ensuring that the server isn’t inadvertently exposed.
  4. Incident Response: In the unfortunate event of a breach, understanding the scope and the affected areas quickly is paramount. RedSeal’s capabilities assist in narrowing down affected segments, making response measures more targeted and effective.
  5. Continuous Monitoring: With RedSeal’s continuous monitoring, organizations can stay abreast of their network’s security posture. This ensures that as networks evolve and change, security measures evolve in tandem.
  6. Compliance Assurance: Adhering to industry standards and compliance requirements is a non-negotiable in the ICS space. RedSeal aids in ensuring that the cybersecurity measures in place align with the requisite standards, thus minimizing potential legal and reputational fallout.

In an era where cyber threats are pervasive and continuously evolving, relying on advanced cybersecurity solutions like RedSeal is no longer a luxury but a necessity. The vulnerabilities in Rockwell Automation’s ThinManager ThinServer underscore the fragility of ICS environments and the dire repercussions of lapses in cybersecurity measures. For businesses operating in the industrial domain, it’s essential to stay a step ahead. By leveraging the multifaceted capabilities of RedSeal, organizations can not only shield themselves from present vulnerabilities but also future-proof their operations against emerging threats. In the battle against cyber adversaries, being prepared and proactive is the key to victory.

Key Insights from Black Hat 2023: RedSeal’s Perspective

Last week approximately 40,000 cybersecurity professionals, researchers, and experts, met in Las Vegas for the annual Black Hat conference to discuss the latest trends, emerging threats, and groundbreaking technologies in cybersecurity. The RedSeal team engaged in all the event had to offer and left with several key takeaways into the current state of cybersecurity and market transitions that are driving up cyber risk.

GenAI: Pioneering Technologies, Unveiling Novel Vulnerabilities

The advent of Artificial Intelligence (AI), particularly Generative AI, has ushered in a new era for organizations. Maria Markstedter, the founder of Azeria Labs—a prominent company specializing in ARM exploit development, reverse engineering, vulnerability research, and cybersecurity training—delivered an insightful keynote revolving around the emergence of AI. Confirming that while artificial intelligence and machine learning fuel innovation, they concurrently expose unprecedented security vulnerabilities. This dual nature of AI underscores the imperative for a proactive security approach.

On the heels of our experience at the Omdia Analyst Summit, Maria’s keynote fortified the belief in expanding strategies to deepen proactive measures. This entails educating teams, crafting new policies, deploying innovative cybersecurity technologies, and embracing a forward-thinking perspective. Central to this is the deployment of a robust cybersecurity solution, like RedSeal, to stop breaches by detecting vulnerable attack paths.

2023 White House Cybersecurity Strategy: A Path Forward Amid Challenges

The unveiling of the 2023 White House cybersecurity strategy heralded a new phase for national security initiatives. The prominence of the Cybersecurity and Infrastructure Security Agency (CISA) in this strategy symbolizes the government’s dedication to bolstering cyber defenses.

The introduction of a new rule mandating critical infrastructure entities to promptly report cyber-attacks within 72 hours, alongside ransom payments within 24 hours, holds immense potential for elevating incident response and coordination. The efficacy of this strategy hinges on seamless execution and adaptability in the face of the ever-evolving threat landscape and strives for collaboration across government and commercial accountability for establishing robust cyber defenses. Learn more about RedSeal’s position on the National Cyber Strategy here.

Bridging Silos: Navigating Cloud, OT/IoT, Data Center, and IT Convergence

As organizations embrace cloud migration, adopt IoT/OT devices, and integrate modern data center technologies, challenges arise—including the risks of lateral movement between these domains. Despite the ongoing convergence of these realms, numerous cybersecurity vendors remain entrenched within traditional infrastructure silos. Engaging discussions on enterprise applications and data during Black Hat highlighted the pressing need for product enhancements that streamline the incorporation of applications and data via ports and protocols information. “Attack Path Analysis” and “Security Graph” resonated within all security circles, underscoring the growing emphasis on mapping potential attack vectors, visualizing security postures and their impact within complex, hybrid environments.

Amidst these insights, RedSeal offered demos to hundreds of conference attendees. These demonstrations showcased how the RedSeal platform accurately uncovers potential lateral spread pathways across on-prem and cloud environments, enabling organizations to fortify their defense strategies comprehensively and address vulnerabilities proactively.

RedSeal also announced the unique support for third-party firewalls in public clouds, driven by experience that breaches stem from complexity. The automation of understanding third-party firewalls deployed in public clouds eliminates blind spots arising from distinct security consoles. With a unified view, the fragmentation of defenses is mitigated, preventing potential vulnerabilities. RedSeal’s integrated end-to-end perspective into cloud and on-prem environments calculate attack paths to critical data and applications, offering unparalleled insights to mitigate risk.

CISO Dialogues: Addressing the Cybersecurity Talent Gap

Engaging in conversations with Chief Information Security Officers (CISOs), we learned that while traditional IT security concerns and the rise of cloud and OT infrastructures remain top challenges, one concern consistently looms large – the scarcity of cybersecurity talent. As organizations grapple with a growing skills gap, CISOs are compelled to look outside the organization for resources to not only support team development but also have the people and tools required to confront evolving threats head-on.

Promisingly, solutions do exist. Organizations can bridge this gap by engaging with experts, allowing their teams to focus on core competencies. RedSeal’s recent case study, “Regional Health System Increases Network Visibility and Mitigates Cybersecurity Risk,” demonstrates the efficacy of engaging RedSeal’s Fully Managed Services (FMS) team to augment security teams to prioritize and focus on critical security issues, enabling the health network to redirect resources towards pivotal issues, deliverables, and patient care. Read more here.

Black Hat 2023 has our team exploring a myriad of insights into the present and future of cybersecurity challenges and opportunities. From the dynamics of cutting-edge technologies like GenAI to evolving governmental strategies and the indispensable need to bridge security gaps, the conference underscored the need for proactive approaches in securing our digital future with the right tools and the right teams. As we act on these key takeaways, RedSeal remains committed to driving innovation and empowering organizations with the most comprehensive, dynamic model of your hybrid network allowing you to navigate the dynamic cybersecurity landscape with confidence, trust and resilience. Get in touch to see how we can help you stay ahead in today’s fast-evolving digital environment.

Finding Internet-facing Vulnerabilities: RedSeal Perspective on The Five Eyes Advisory

Today, the international cybersecurity consortium known as The Five Eyes (Australia, Canada, New Zealand, the UK, and the US) published a joint Cybersecurity Advisory. It’s a scary read, on several fronts. It details the top 12 vulnerabilities that are actively being exploited, in current breaches. The advisory doesn’t detail the breaches, because a lot of that data is not public, but we can safely assume that these organizations are trying to offer a wake-up call about what they are seeing in the real world.

One shocking aspect of the advisory is the vulnerabilities are quite old – the top spot is taken by a vulnerability that was disclosed in 2018! The lingering question is how can antiquated vulnerabilities still pose a threat? The answer lies in the struggles faced by organizations in locating and effectively patching patch their Internet facing equipment.

This is why RedSeal builds a digital twin of your network, then shows you where you have blind spots, defensive gaps, and (most relevant to this advisory) uncover exactly what you have that is exposed to the Internet.

The Five Eyes Advisory is an important reminder that vulnerabilities exist in our Internet-facing systems. RedSeal is a trusted partner to 75 federal agencies, 6 arms of the military, and 100s of F1000 organizations, helping identify and address vulnerabilities; securing networks against the growing complexity and frequency of threats.

Let’s talk about how we can help your organization stay secure. Contact us today.

Zero Trust 2.0: Why RedSeal Is Key to Executing a Zero Trust Strategy

In February 2023, a 21-year-old Massachusetts Air National Guard member accessed and posted hundreds of classified documents on voice over Internet Protocol (VoIP) and instant messaging platform Discord. The impacts were far-reaching. Not only is the Air Force working to understand how top secret information could be leaked so easily, but the base where the leak happened has been stripped of its current intelligence mission.

However, according to Don Yekse, the Navy’s chief technology officer (CTO), implementing a zero trust approach could have improved both detection and response times, reducing the severity of the attack.

To help public and private organizations better manage their zero trust deployments, the Cybersecurity and Infrastructure Security Agency (CISA) released version 2.0 of its Zero Trust Maturity Model (ZTMM). Efforts are also underway to develop and implement what’s known as zero trust network access (ZTNA) version 2.0, which focuses on a more granular approach to ZTNA.

In this piece, we’ll cover the current state of zero trust security, why it matters to organizations, and how RedSeal can help companies navigate the shift to ZTNA 2.0.

Zero Trust Security: Why It Matters, How It Helps, and Where It’s Used

The core principle of zero trust security is simple: Never trust, always verify. No matter the user, no matter the device, and no matter the request, zero trust asks for verification.

Consider a team manager logging in to the same admin portal at the same time every day, using the same device as they have for the past few years. Under a zero trust model, history doesn’t guarantee access. Instead, verification is required, which might take the form of two-factor authentication such as a one-time text code or identity verification via email confirmation.

Why Zero Trust Matters

Zero trust makes it more difficult for unauthorized users to gain network access. Implemented effectively, zero trust can improve cybersecurity without increasing complexity for authorized users. For example, the integration of mobile authentication tools can boost security while minimizing friction.

Statistics showcase the growing impact of zero trust. Consider that 80% of organizations now have plans to implement zero trust, and 96% of security decision-makers say that zero trust is “critical” to business success. Given that attacks such as ransomware have been on a steady rise — the volume of attacks increased 17% from 2021 to 2022 — zero trust is more critical than ever to help companies identify potential threats before they compromise key systems.

Benefits of Zero Trust

Zero trust offers multiple benefits for businesses.

First is reduced security risk. By replacing trust with verification, companies can reduce the risk of potential breaches. Even if attackers manage to steal user credentials, additional verification can frustrate their efforts.

ZTNA also provides greater control over security policies. For example, companies may leverage automated controls that lock out users after a certain number of failed attempts or that shunt traffic to a designated location for further evaluation. Perhaps one of the biggest benefits of zero trust, however, is visibility. Because zero trust requires continuous monitoring of devices and networks, implementing ZTNA naturally boosts overall visibility.

Common Zero Trust Use Cases

One common zero trust use case is reducing third-party risk. Given the increasing number of third-party applications used by companies and third-party providers that may have access to company networks, implementing zero trust can limit the risk of compromise from an unexpected source.

Other use cases include the security of Internet of Things (IoT) and legacy devices on business networks. In the case of IoT, ZTNA can help provide consistent security practices across both local and cloud networks. For legacy devices such as industrial control systems (ICS) or supervisory control and data acquisition (SCADA) systems, zero trust can help limit the chance of unauthorized insider access.

Zero Trust 2.0

Zero trust isn’t static. As a result, efforts are underway to supplement existing ZTNA solutions with “Zero Trust 2.0.” There are three primary differences between ZTNA 1.0 and 2.0.

1. Granular Controls

ZTNA 2.0 replaces the coarse controls of version 1.0 with more granular options. For example, under the 1.0 model, access is all or nothing. Users could either access all app services or none. In ZTNA 2.0, access can be restricted on a per-function basis.

2. Continuous Inspection

Many ZTNA 1.0 deployments use what’s known as the “allow and ignore” model. This means once users are verified and access is granted, this access remains in place indefinitely, ignoring any changes. ZTNA 2.0 reconfirms identity each time.

3. Comprehensive Protection

ZTNA 2.0 continuously verifies trust and inspects security to detect potential problems. This creates a dynamic security environment capable of responding as issues emerge. 

The Zero Trust Maturity Model

CISA has now released ZTMM version 2.0. The five pillars remain unchanged. Management of identity, devices, networks, applications, workloads, and data is required for effective ZTNA deployments. Where the model expands is maturity.

Under ZTMM 2.0, companies at the “Traditional” level still have manually configured lifecycles and static security policies. “Initial” maturity includes limited automation and increased visibility, while “Advanced” delivers on centralized visibility and identity control. Finally, companies at the  “Optimal” level of maturity use fully automated processes that self-report and are underpinned by dynamic policies.

How RedSeal Can Help Advance Your Zero Trust Strategy

Identity and information are key components of zero trust. Companies often think in terms of who is trying to access IT environments and what they’re trying to access.

But these aren’t the only considerations in creating an effective zero trust environment. Organizations also need to consider how and where. Where are critical assets located on local systems? In cloud networks? And how can these assets be accessed? It’s critical to create an inventory of IT environments including devices, ports, and protocols. In addition, companies need to understand external connectivity — what potential access routes exist and what risks do they pose?

At a small scale, the process of identifying who, what, where, and how is straightforward. Once companies move into the cloud, however, challenges emerge. With most organizations now using at least two and likely more cloud providers in addition to on-site storage and compute, complexity rapidly ramps up. Consider that service providers often have their own terminology for similar processes. For example, while both Google and AWS offer virtual private clouds (VPCs), they’re not the same. Each has its own set of features, functions, and vernacular.

In other words, different services speak different languages, making zero trust 2.0 implementation challenging. RedSeal makes it possible to create an IT lingua franca — a consistent translation that allows companies to automate and orchestrate key tasks across multiple environments.

RedSeal solutions also help with inventory and segmentation. By mapping and discovering all connections and endpoints across both cloud and on-site networks, companies can create complete inventories of all solutions and services, then create segmentation policies that reduce total risk in the event of an attack.

Taking on ZTNA 2.0

Effectively implementing zero trust 2.0 requires complete network knowledge. While who and what are the starting points, they’re not enough without where and how. RedSeal helps companies consolidate the pieces by creating a comprehensive inventory and asset map backed by a common defensive language.

Ready to take on ZTNA 2.0 and master the maturity model? See how RedSeal can help.

Exploring the Implications of the New National Cyber Strategy: Insights from Security Experts

In March 2023, the Biden Administration announced the National Cybersecurity Strategy, which takes a more collaborative and proactive approach.

RedSeal teamed up with cyber security experts, Richard Clarke, founder and CEO of Good Harbor Security Risk Management, and Admiral Mark Montgomery (ret.), senior director of the Center of Cyber and Technology Innovation, to discuss the latest strategy. Both have developed previous national cybersecurity strategies so we couldn’t be more privileged to hear their take on the newest national strategy’s impact on cybersecurity regulations. This blog covers the importance of harmonizing the rules, trends in resilience planning, the role of cyber insurance, the transfer of liability, and the need to keep pace with AI and quantum computing. Keep reading to learn more, or click here to listen in.

Expanding Cybersecurity Regulations

Although this is the first time the administration gives a clear and intentional nod to cybersecurity regulations, the federal government has regulated every other major sector for over 20 years. This step makes sense. Clarke points out, sectors with heavy cyber regulations have fared better in the past two decades than those without. Montgomery predicts that most changes will happen in areas where regulations are lagging, such as water, oil pipelines, and railroads.

But many agencies don’t have the resources for effective enforcement. The government must thus use a combination ofregulations, incentives, and collaboration to achieve meaningful outcomes.

The Importance of Harmonizing the Rules

The new strategy aims to “expand the use of minimum cybersecurity requirements in critical sectors to ensure national security and public safety and harmonize regulations to reduce the burden of compliance.” But the expansion of cybersecurity regulations must come hand in hand with better coordination.

Clarke observes, today’s regulations aren’t well-coordinated. Agencies must share lessons learned and align their approaches. Private sectors will benefit from the standardization of various regulations to streamline compliance, reducing cybersecurity complexity and lowering costs.

However, coordination and standardization doesn’t mean a one-size-fits-all solution. Agencies must tailor their regulations to each specific sector. The good news is that we can apply the same network security technologies to any industry and encourage knowledge-sharing across verticals. For instance, we can take the high standards from the defense industry and apply them to healthcare and transportation without reinventing the wheel.

A Focus on Resilience Planning

The cybersecurity definition of resilience has evolved as the world has become more digital. We will get hacked. It is a certainty. Instead of only looking to protect systems from attacks, regulatory mandates must also focus on prompt recovery. The government should also hire industry experts to assess digital resilience plans and stress-test them for reliance.

Cyber resilience must be applied to national security as well as private business. Transportation infrastructure must be able to operate without extended interruption. The economy (e.g., the power grid and financial systems) is our greatest weapon, and must keep functioning during conflicts and crises. Lastly, we must have the tools to quickly and effectively battle disinformation, a new frontier in the fight against nation-state threats.

The Impact of the Internet of Things (IoT)

Regulations must also cover IoT devices, but focus on the networks instead of the thousands of individual endpoints. Clark suggests that organizations should install sensors on their networks and conduct regular vulnerability scans. Montgomery adds to this, emphasizing the need for certification and labeling regimens as part of a long-term plan to make vendors responsible for their products’ performance and security.

Shifting Liability to Vendors

Speaking of making vendors responsible for their products’ performance and security, the new strategy intends to transfer liability to software vendors to promote secure development practices, shift the consequences of poor cybersecurity away from the most vulnerable, and make our digital ecosystem more trustworthy overall.

Clarke agrees that this approach is necessary, but holds that the current regulatory framework can’t support the legal implementation. IT lobbyists, some of the most well-funded and influential players on Capitol Hill, will make enforcement of such a shift an uphill battle. Clarke believes that, unfortunately, this hard but necessary shift may not happen until a tragedy shakes the nation and leaves it the only way forward.

Keeping Pace with AI and Quantum Computing

We, as a nation, have many issues to consider around AI, including beyond security. Clarke points out that we must establish rules about transparency: what’s the decision-making process? How did AI get to a conclusion? Is it searching an erroneous database? Is the outcome biased? Large language models (LLMs) are constantly learning, and adversaries can poison them to impact our decision-making.

While AI is the big problem of the moment, we can’t afford to continue ignoring quantum encryption challenges, cautions Montgomery. We have already fallen behind and must spend a substantial sum today to prepare for what’s in store in 10 years. We must start building quantum security into our systems instead of attempting to jury-rig something on later, adds Clarke.

The Rise of Cyber Insurance and Real-time Monitoring

Montgomery predicts that, if run properly, the cyber insurance market can bring these pieces together. Insurance companies may, for instance, encourage proactive measures by reducing premiums for organizations that invest in cybersecurity upfront and establish a track record of reliability and resiliency.

But organizations must prove they’re continuously protected instead of merely showing “point in time” compliance to take advantage of lower premiums. Real-time monitoring will play a critical role in lowering premiums and maintaining cybersecurity.

A Step in the Right Direction

The new National Cyber Strategy introduces timely and much-needed shifts. We must harmonize regulations to maximize the benefits without overburdening the private and public sectors.

In anticipation of the impending changes, organizations must approach their cybersecurity strategies proactively and implement the right tools and services to stay compliant. These include a comprehensive network security solution for complete visibility and ongoing monitoring, cloud security tools to protect all IT assets, and professional services to ensure airtight implementation and continuous compliance.

RedSeal has extensive expertise and experience in delivering government cybersecurity and compliance solutions. Get in touch to see how we can help you stay ahead in today’s fast-evolving digital environment.