当前位置:网站首页>From the perspective of attack surface, see the practice of zero trust scheme of Xinchuang
From the perspective of attack surface, see the practice of zero trust scheme of Xinchuang
2022-07-02 11:12:00 【olga5abl】
Reprint Electronic finance The first 320 period
author Vice president of Beijing anbotong Technology Co., Ltd Li Yuan
Understand zero trust from the perspective of attack surface
Gartner stay 2022 Published in 《2022 Key trends of network security in (Top Trends in Cybersecurity 2022)》 In the report , hold “ The attack area expanded ” As an important item .

《2022 Key trends of network security in (Top Trends in Cybersecurity 2022)》 The report
According to the report : In order to manage the exposure of a series of expanded security attacks , Organizations need to pay attention to more than patching vulnerabilities . Changes brought about by the application of a series of digital schemes , For example, the new hybrid network architecture 、 Accelerated application of public cloud 、 More interconnected supply chains 、 More externally accessible digital assets and more applications of IOT Technology , Leading to a significant expansion of the attack area . Organizations must start in the traditional “ Safe house ” Think about new strategies based on the plan , Take action as soon as possible to improve safety visualization and risk prevention level of key businesses .
The definition of attack surface is : The sum of vulnerabilities that a given computer or network system can be accessed and exploited by malicious people . In order to continuously visualize and reduce the attack surface , The following aspects need to be done well :
- Business access : That is, the process management of people accessing business systems .
- Vulnerability management : Prioritization 、 Classification and visual disposal .
- Asset security : Mapping 、 Vulnerability management 、 Compliance construction .
Zero trust is an architecture and methodology , Its focus is to provide a secure application access path . From the perspective of attack surface , Zero trust is mainly aimed at “ Business access ” Some solutions are given , It can be further refined into several key points :
- Permissions and paths : Access rights and paths around people and Applications , Visual presentation 、 Sorting and management , Eliminate violations and unauthorized access , Plan the best path .
- Communication security : Encrypt the communication content , Verify the identity of both sides of the communication , Avoid communication being monitored or destroyed .
- Content audit : Restore the communication content 、 Records and retention .
In terms of protecting data security , Compared with desensitization in the field of data security 、 Leakage protection 、 Database protection and other special technologies , The core role of the zero trust solution is “ Move the gate forward ”. Set reasonable access rights and paths for key data , Achieve efficient management , Raise the difficulty and threshold of illegal access to data from the source , It can effectively help the implementation of the overall data security scheme .
Three levels of zero Trust Practice
For zero trust building , This paper will analyze according to the following three levels :

Three levels of zero trust
1、 North-south direction : External remote access
In the north-south direction , The main challenge of access control comes from tradition VPN Several hidden dangers of Technology :
- Open fixed ports for a long time , This leads to the persistence of network layer exposure , This defect has been successfully used by the attacker many times in the attack and defense drill .
- Under the long connection mechanism , Network quality sensitive applications may have performance problems .
- In the multi cloud and hybrid cloud access environment , The authority control is not fine enough or the maintenance cost is too high .
- The terminal security control ability is insufficient .
At present, the mainstream VPN The alternative is software defined boundaries SDP(Software Defined Perimeter), This scheme has been widely used , Its core advantages are as follows :
- Adopt the authentication before connection mode , Avoid exposing fixed ports .
- Use the short connection scheme , Enhance the business performance experience .
- Customize the global strategy based on people and business systems and realize dynamic adaptation , It is more applicable in multi cloud and hybrid cloud access scenarios , And it can reduce the difficulty of maintenance .
- Support a full range of host and mobile terminal operating systems 、SDK And browser environment access , Adopter + End + Access environment three-dimensional verification technology , More executive in terminal identity verification , More suitable for mobile applications and IoT Terminal access scenario .
2、 East West : Internal host exchange
At the level of East-West flow , The main solution of zero trust is micro isolation . Its main security attack means is horizontal proliferation , That is, after the attacker obtains the lost host, he continues to expand the attack in the security domain as a springboard , Ultimately threaten core assets . Micro isolation can be popularly understood as firewall between business systems , In scenarios such as data centers , Large tier-2 environments and virtualized workloads make this technology more popular .
Micro isolation products can generally be classified into three categories , Namely :
- Hyper-V Micro isolation : With VM Isolate the unit .
- Network micro isolation : stay L3/L4 In isolation ( Often with the help of SDN controller ).
- Host micro isolation : Based on the host / Business system isolation .
One of the most popular micro isolation schemes is host micro isolation , One reason is that this solution is relatively easy to deploy , Deploy on the management platform and host Agent You can begin to deploy the policy . Whether it's Windows or Linux operating system ,Agent Can pass iptables And so on , On the management platform, the host mutual access relationship and path can be visualized and managed , And carry out policy adaptive calculation according to the access requirements 、 Exception analysis and distribution , This solution is loaded in the cloud 、 The virtual load is consistent with the physical server , So as to block the East-West threat to security , Reduce business delivery time and maintenance costs .
3、 Oblique : Security domain access control
In addition to the north-south and east-west directions, which are particularly discussed , The so-called “ Oblique ” Often overlooked , Especially when the network scale is large enough and the security access control strategy is complex enough , This direction will be particularly important . In a multi branch network across a wide area network , At the same time, there are many remote access users , Including home office employees 、 Supply chain and third-party partners , At this time, the division of security domain and security policy planning will be more complex . Just imagine , At this time, the access between two hosts may span three layers and security domains , That is to say, it occurs simultaneously in the north-south and east-west directions , The real access control will be based on the access control strategy of security devices , Simple north-south or East-West authority control cannot solve the problem independently .
The oblique corresponding zero trust solution is NSPM(Network security policy management) technology . stay NSPM In the access control baseline management function of , Access control baselines can be set based on business requirements and security domain access rules , The access control baseline information includes at least the source domain 、 source address 、 Destination domain 、 Destination address 、 agreement 、 port 、 Actions and other information , Support black and white list 、 High risk ports 、 Virus port customization , Support the regular inspection of network access control policies according to the access control baseline , Timely discover and eliminate the illegal policies that lead to illegal unauthorized access . Besides ,NSPM The network exposure risk management function of can target a certain host or host group , Automate the analysis of network exposure path and exposure risk , Describe its external exposure from the perspective of network access relationship and security path , It can help users know the size of some important hosts and network exposure in time 、 The level of risk , Assist users in the convergence of exposed surfaces and the security reinforcement of exposed paths .
In order to systematically solve the problem of permission control , We need to turn the north-south direction 、 Organic combination of East-West and oblique solutions . At present , take SDP、 Host micro isolation and NSPM Combined zero trust solutions are not common , Domestic manufacturer anbotong is one of the suppliers , The products have been adapted to the Xinchuang terminal environment , There have been successful cases in the financial and operator industries .
Summary of experience in the implementation of Xinchuang terminal environment
Apply the zero trust technology solution to the information creation environment , The main work is to complete the related software in Xinchuang CPU( Godson / Kun Peng / Feiteng )、 Xinchuang operating system ( kirin 、 Tongxin ) And the adaptation of Xinchuang network card and Xinchuang database . The main technical difficulties to be overcome in this landing process include :
- Degree of hardware independence : When the software is mainly implemented in user mode , There will not be too much driving work involved in the process of migrating to Xinchuang , More smoothly .
- Solve cross platform compilation and various languages 、 The component version is upgraded .
- Adaptation and migration of various localized products .
- Overcome the current situation of relatively weak development tool chain for continuous debugging .
- Architecture related open source software refactoring and migration .
Promote products in the field of information and innovation through several systems , Zero trust related products have been well implemented in the environment of Xinchuang terminal . From the application effect , Although there is still room for optimization in terms of performance and encryption and decryption capabilities , But it has been successfully applied to general environment .
Future outlook
Driven by both policy and Technology , Zero trust security has achieved good results in the field of information innovation , There will be greater opportunities in the future , Especially in the accelerated application of financial markets . During the implementation of the zero trust solution, we need to pay attention to multiple levels , Continue to reduce the attack surface and control access rights , Guard the front pass , Become an important measure of digital transformation and data security .
reference :
《Guide to Network Security Concepts》,Gartner
《Top Trends in Cybersecurity 2022》,Gartner
边栏推荐
- Flink two Open, implement Batch Lookup join (attached source)
- js中给数组添加元素的方法有哪些
- How does the whole network display IP ownership?
- TIPC Getting Started6
- STM32单片机编程学习
- 二叉树专题--洛谷 P3884 [JLOI2009]二叉树问题(dfs求二叉树深度 bfs求二叉树宽度 dijkstra求最短路)
- flink二开,实现了个 batch lookup join(附源码)
- 华为游戏初始化init失败,返回错误码907135000
- [play with FPGA learning 2 in simple terms ----- design skills (basic grammar)]
- 三.芯片启动和时钟系统
猜你喜欢

PKG package manager usage instance in FreeBSD

Flink two Open, implement Batch Lookup join (attached source)

【AI应用】海康威视iVMS-4200软件安装

The first white paper on agile practice in Chinese enterprises was released | complete download is attached

QT learning diary 7 - qmainwindow

Hdu1228 a + B (map mapping)
![二叉树专题--洛谷 P3884 [JLOI2009]二叉树问题(dfs求二叉树深度 bfs求二叉树宽度 dijkstra求最短路)](/img/c2/bb85b681af0f78b380b1d179c7ea49.png)
二叉树专题--洛谷 P3884 [JLOI2009]二叉树问题(dfs求二叉树深度 bfs求二叉树宽度 dijkstra求最短路)

Use of vscode tool
![[play with FPGA learning 2 in simple terms ----- design skills (basic grammar)]](/img/50/22f2fa8fd606572b13a18cc889ca2e.png)
[play with FPGA learning 2 in simple terms ----- design skills (basic grammar)]

TIPC addressing 2
随机推荐
Special topic of binary tree -- acwing 1589 Building binary search tree
enumrate的start属性的坑
static 函数中的静态变量
Special topic of binary tree -- acwing 3384 Binary tree traversal (known preorder traversal, while building a tree, while outputting middle order traversal)
Openmldb meetup No.4 meeting minutes
TIPC introduction 1
实验电镜距离测量之Matlab处理
[applinking practical case] share in app pictures through applinking
二叉树专题--P1030 [NOIP2001 普及组] 求先序排列
The most detailed MySQL installation tutorial
一招快速实现自定义快应用titlebar
【AGC】构建服务3-认证服务示例
Win11 arm system configuration Net core environment variable
如何用list组件实现tabbar标题栏
How to transfer event objects and user-defined parameters simultaneously in Huawei express applications
V2X-Sim数据集(上海交大&纽约大学)
洛谷 P4281 [AHOI2008]紧急集合 / 聚会(树上倍增 LCA)
Why does LabVIEW lose precision in floating point numbers
AppGallery Connect场景化开发实战—图片存储分享
华为应用市场应用统计数据问题大揭秘