George WilkesMay 7, 2019
Fundamentals for Reducing Your Attack Surface
Enterprises are engaged in cyber warfare on a daily basis. By becoming a smaller target, they can reduce their risk exposure and bolster their security.
A good boxer knows not to expose his body to his opponent. The art of his victory comes from his ability to avoid and withstand what his rival throws at him. For organizations today, attack surface reduction inherently minimizes the chances an adversary can exploit vulnerabilities and helps prevent a data breach.
The basic principles of combat have remained unchanged, it’s how they are applied that is different. Organizations today are engaged in cyberwarfare, either proactively or reactively. For those that choose to be proactive, becoming a smaller target is a principle they embrace.
Cloud, IoT, and mobile workforces have caused many organizations to lose their footing, drop their guard, and overexpose their sensitive data. Today’s battleground is different, but the principle of minimizing your attack vectors isn’t. Here are some ways information security teams can reduce their attack surface and secure network access:
Make Everything Invisible
Adversaries are unable to attack what they cannot see. VPNs rely on open ports listening for incoming connections. These ports can be found and exploited. Inversely, a Software-Defined Perimeter cloaks all ports, rendering them invisible to unauthorized or nefarious actors. Single-Packet Authorization technology makes this possible and is foundational to the Software-Defined Perimeter architecture, as defined by the Cloud Security Alliance.
Adopt Zero Trust
Remote workers and third parties accessing your network drastically increase the attack surfaces. Zero Trust mandates authenticating the identity extensively, before providing secure access, which is not achievable with legacy solutions like VPNs. A Software-Defined Perimeter goes beyond validating the IP address, dynamically making evaluations on device posture, location, time, roles, and permissions before granting access. Fine-grained micro-segmentation then takes over, granting a secure 1:1 connection to authorized resources. Anything that is unauthorized to the identity in question is invisible and inaccessible, reducing lateral movement and preventing insider threats.
Zero Trust security can also be applied outside the wire to protect against external threats and attacks. Your mobile and connected workforce are bombarded with phishing attempts, which are the root cause of all cyberattacks. By proactively mapping your digital footprint, monitoring online channels for attack indicators, and rapidly mitigating identified threats you can further reduce your attack surface — protecting your customers, employees, and your network.
Deploy Programmable Security
Your attack surface is elusive, which makes managing your digital footprint difficult. Deployments happen regularly, applications move locations, and cloud instances scale up and down reacting to demand. Managing access privileges with hardware-bound legacy solutions causes immense complexity and introduces risk. A Software-Defined Perimeter is programmable, scaling with your cloud. Security is automatically applied as the attack surface changes and new instances are deployed.
This approach is as scalable as the internet itself, hybrid native and cloud agnostic, yet completely compatible with existing networks. Users can connect to unlimited resources simultaneously, unlike perimeter-based solutions that require massive WAN links to connect diverse backend networks. It integrates with and augments your existing enterprise-class network and security infrastructures such as SIEM and IAM.
Be Your Worst Enemy
Finally, cyber-resilience is not an end-state, but an ongoing journey. Organizations must push their limits, prepare for the worst, and identify vulnerabilities before their adversaries. Much like the boxer, you will be faced with varying opponents who take different approaches to defeat you. The boxer will spar with those who emulate his upcoming opponent. Organizations must emulate their adversary and the various attack methods in their arsenal. By taking this seriously, organizations will identify their weaknesses and turn them into strengths before their opponent steps foot in the ring.
Reducing the attack surface is one of three essential challenges organizations can address by adopting a focused approach to Zero Trust. If you are ready to learn about the other two, we invite you to explore our Zero Trust Solution.