Evan Gilman, Doug Barth
@evan2645
@dougbarth
Zero Trust Networks
Slide 2
Slide 2 text
3/14/17
@evan2645
@dougbarth
About Us
Zero Trust: Building Systems in Untrusted Networks
Slide 3
Slide 3 text
@evan2645
@dougbarth
Slide 4
Slide 4 text
@evan2645
@dougbarth
Slide 5
Slide 5 text
3/14/17
@evan2645
@dougbarth
DC-A
DC-B DC-C
C*
C* C*
Zero Trust: Building Systems in Untrusted Networks
Slide 6
Slide 6 text
3/14/17
@evan2645
@dougbarth
DC-A
DC-B DC-C
C*
C* C*
Zero Trust: Building Systems in Untrusted Networks
Slide 7
Slide 7 text
3/14/17
@evan2645
@dougbarth
DC-A
DC-B DC-C
C*
C* C*
Zero Trust: Building Systems in Untrusted Networks
Slide 8
Slide 8 text
@evan2645
@dougbarth
iptables
Slide 9
Slide 9 text
@evan2645
@dougbarth
Slide 10
Slide 10 text
@evan2645
@dougbarth
Slide 11
Slide 11 text
@evan2645
@dougbarth
IPsec VPN
Slide 12
Slide 12 text
3/14/17
@evan2645
@dougbarth
DC-A DC-B
DC-C
Zero Trust: Building Systems in Untrusted Networks
VPN
VPN
VPN
Slide 13
Slide 13 text
3/14/17
@evan2645
@dougbarth
DC-A DC-B
DC-C
Zero Trust: Building Systems in Untrusted Networks
VPN
VPN
VPN
Slide 14
Slide 14 text
@evan2645
@dougbarth
IPsec VPN
Slide 15
Slide 15 text
3/14/17
@evan2645
@dougbarth
DC-A DC-B
DC-C
Zero Trust: Building Systems in Untrusted Networks
VPN
VPN
VPN
Slide 16
Slide 16 text
3/14/17
@evan2645
@dougbarth
DC-A DC-B
DC-C
Zero Trust: Building Systems in Untrusted Networks
Slide 17
Slide 17 text
3/14/17
@evan2645
@dougbarth
DC-A DC-B
DC-C
Zero Trust: Building Systems in Untrusted Networks
Slide 18
Slide 18 text
3/14/17
@evan2645
@dougbarth
Emergent Properties
All Flows Authenticated and Encrypted
All Flows Asserted as Authorized
No Inherent Value in IP Address
Zero Trust: Building Systems in Untrusted Networks
Slide 19
Slide 19 text
3/14/17
@evan2645
@dougbarth
Emergent Properties
No Centralized Firewalls
No Network Gateways
No Private Network
Zero Trust: Building Systems in Untrusted Networks
Slide 20
Slide 20 text
@evan2645
@dougbarth
BeyondCorp
Slide 21
Slide 21 text
@evan2645
@dougbarth
BeyondCorp
Slide 22
Slide 22 text
@evan2645
@dougbarth
BeyondCorp
Slide 23
Slide 23 text
@evan2645
@dougbarth
BeyondCorp
Slide 24
Slide 24 text
@evan2645
@dougbarth
Zero Trust Philosophy:
Slide 25
Slide 25 text
@evan2645
@dougbarth
Zero Trust Philosophy:
No Trust In
Network
Slide 26
Slide 26 text
@evan2645
@dougbarth
Zero Trust Philosophy:
No Trust In
Network
Slide 27
Slide 27 text
@evan2645
@dougbarth
Zero Trust Philosophy:
Every Flow Is
Expected
Slide 28
Slide 28 text
@evan2645
@dougbarth
Zero Trust Philosophy:
Symbolic Policy
Slide 29
Slide 29 text
@evan2645
@dougbarth
Zero Trust Philosophy:
Symbolic Policy
Slide 30
Slide 30 text
@evan2645
@dougbarth
Zero Trust Philosophy:
Network Agent
Slide 31
Slide 31 text
@evan2645
@dougbarth
Zero Trust Philosophy:
Network Agent
Slide 32
Slide 32 text
@evan2645
@dougbarth
Zero Trust Philosophy:
Automate!
Slide 33
Slide 33 text
@evan2645
@dougbarth
Zero Trust Philosophy:
Automate!
Slide 34
Slide 34 text
@evan2645
@dougbarth
Visibility
Slide 35
Slide 35 text
@evan2645
@dougbarth
Start Early
Slide 36
Slide 36 text
@evan2645
@dougbarth
Start Early
Slide 37
Slide 37 text
@evan2645
@dougbarth
Current
State
Slide 38
Slide 38 text
@evan2645
@dougbarth
Current
State
Slide 39
Slide 39 text
@evan2645
@dougbarth
Current
State
Slide 40
Slide 40 text
@evan2645
@dougbarth
Slide 41
Slide 41 text
@evan2645
@dougbarth
Slide 42
Slide 42 text
@evan2645
@dougbarth
Slide 43
Slide 43 text
@evan2645
@dougbarth
Slide 44
Slide 44 text
3/14/17
@evan2645
@dougbarth
Just The Facts
Industry Moving Towards Deep Authn/Authz
Industry Converging on Zero Trust Model
More Secure, More Operable
Keep an Eye Out!
Zero Trust: Building Systems in Untrusted Networks
Slide 45
Slide 45 text
3/14/17
@evan2645
@dougbarth
Just The Facts
Industry Moving Towards Deep Authn/Authz
Industry Converging on Zero Trust Model
More Secure, More Operable
Keep an Eye Out!
Zero Trust: Building Systems in Untrusted Networks
Slide 46
Slide 46 text
3/14/17
@evan2645
@dougbarth
Just The Facts
Industry Moving Towards Deep Authn/Authz
Industry Converging on Zero Trust Model
More Secure, More Operable
Keep an Eye Out!
Zero Trust: Building Systems in Untrusted Networks
Slide 47
Slide 47 text
Evan Gilman, Doug Barth
@evan2645
@dougbarth
Zero Trust Networks