Evan Gilman, Doug Barth
@evan2645
@dougbarth
Zero Trust Networks
Slide 2
Slide 2 text
7/25/17
@evan2645
@dougbarth
About Us
Zero Trust: Building Systems in Untrusted Networks
Slide 3
Slide 3 text
7/25/17
@evan2645
@dougbarth
DC-A
DC-B DC-C
C*
C* C*
Zero Trust: Building Systems in Untrusted Networks
Slide 4
Slide 4 text
@evan2645
@dougbarth
iptables
Slide 5
Slide 5 text
@evan2645
@dougbarth
Slide 6
Slide 6 text
@evan2645
@dougbarth
IPsec VPN
Slide 7
Slide 7 text
7/25/17
@evan2645
@dougbarth
DC-A DC-B
DC-C
Zero Trust: Building Systems in Untrusted Networks
VPN
VPN
VPN
Slide 8
Slide 8 text
@evan2645
@dougbarth
IPsec VPN
Slide 9
Slide 9 text
7/25/17
@evan2645
@dougbarth
DC-A DC-B
DC-C
Zero Trust: Building Systems in Untrusted Networks
VPN
VPN
VPN
Slide 10
Slide 10 text
7/25/17
@evan2645
@dougbarth
DC-A DC-B
DC-C
Zero Trust: Building Systems in Untrusted Networks
Slide 11
Slide 11 text
7/25/17
@evan2645
@dougbarth
Emergent Properties
All Flows Authenticated and Encrypted
All Flows Asserted as Authorized
No Inherent Value in IP Address
Zero Trust: Building Systems in Untrusted Networks
Slide 12
Slide 12 text
7/25/17
@evan2645
@dougbarth
Emergent Properties
No Centralized Firewalls
No Network Gateways
No Private Network
Zero Trust: Building Systems in Untrusted Networks
Slide 13
Slide 13 text
@evan2645
@dougbarth
BeyondCorp
Slide 14
Slide 14 text
@evan2645
@dougbarth
Zero Trust Philosophy:
No Trust In
Network
Slide 15
Slide 15 text
@evan2645
@dougbarth
Zero Trust Philosophy:
Every Flow Is
Expected
Slide 16
Slide 16 text
@evan2645
@dougbarth
Zero Trust Philosophy:
Symbolic Policy
Slide 17
Slide 17 text
@evan2645
@dougbarth
Zero Trust Philosophy:
Network Agent
Slide 18
Slide 18 text
@evan2645
@dougbarth
Zero Trust Philosophy:
Automate!
Slide 19
Slide 19 text
@evan2645
@dougbarth
Visibility
Slide 20
Slide 20 text
@evan2645
@dougbarth
Start Early
Slide 21
Slide 21 text
@evan2645
@dougbarth
Manifestation
Slide 22
Slide 22 text
7/25/17
@evan2645
@dougbarth
Control Plane Services
Zero Trust: Building Systems in Untrusted Networks
User
Inventory
Device
Inventory
Data Plane
Servers
Servers
Servers
Servers
Servers
Phones
Servers
Servers
Laptops
Slide 23
Slide 23 text
7/25/17
@evan2645
@dougbarth
Control Plane Services
Zero Trust: Building Systems in Untrusted Networks
User
Inventory
Device
Inventory
Config
Mgmt
Data Plane
Servers
Servers
Servers
Servers
Servers
Phones
Servers
Servers
Laptops
Slide 24
Slide 24 text
7/25/17
@evan2645
@dougbarth
Control Plane Services
Zero Trust: Building Systems in Untrusted Networks
User
Inventory
Device
Inventory
Config
Mgmt
Authentication Services
Data Plane
Servers
Servers
Servers
Servers
Servers
Phones
Servers
Servers
Laptops
Slide 25
Slide 25 text
@evan2645
@dougbarth
Examples
Slide 26
Slide 26 text
@evan2645
@dougbarth
Server-Side
Slide 27
Slide 27 text
7/25/17
@evan2645
@dougbarth
PagerDuty
Chef Cookbook for Initial Implementation
Zero Trust: Building Systems in Untrusted Networks
Slide 28
Slide 28 text
7/25/17
@evan2645
@dougbarth
PagerDuty
Chef Cookbook for Initial Implementation
Maturation brought Specialization
Zero Trust: Building Systems in Untrusted Networks
Slide 29
Slide 29 text
7/25/17
@evan2645
@dougbarth
PagerDuty
Chef Cookbook for Initial Implementation
Maturation brought Specialization
Topology-Manager
Zero Trust: Building Systems in Untrusted Networks
Slide 30
Slide 30 text
7/25/17
@evan2645
@dougbarth
Topology-Manager
Zero Trust: Building Systems in Untrusted Networks
Control Plane
Data Plane
Server
Agent
Contained
Workload
Server
Agent
Contained
Workload
Enforcement
Slide 31
Slide 31 text
7/25/17
@evan2645
@dougbarth
Topology-Manager
Zero Trust: Building Systems in Untrusted Networks
Data Plane
Control Plane
Slide 32
Slide 32 text
7/25/17
@evan2645
@dougbarth
Topology-Manager
Zero Trust: Building Systems in Untrusted Networks
Data Plane
Control Plane
Authorized User
Slide 33
Slide 33 text
7/25/17
@evan2645
@dougbarth
Topology-Manager
Zero Trust: Building Systems in Untrusted Networks
Data Plane
Control Plane
Provisioner Authorized User
Slide 34
Slide 34 text
7/25/17
@evan2645
@dougbarth
Topology-Manager
Zero Trust: Building Systems in Untrusted Networks
Data Plane
Control Plane
Provisioner
Device
Inventory
Authorized User
Slide 35
Slide 35 text
7/25/17
@evan2645
@dougbarth
Topology-Manager
Zero Trust: Building Systems in Untrusted Networks
Data Plane
Control Plane
Provisioner
Device
Inventory
User
Inventory
Authorized User
Slide 36
Slide 36 text
7/25/17
@evan2645
@dougbarth
Topology-Manager
Zero Trust: Building Systems in Untrusted Networks
Data Plane
Control Plane
Provisioner
Device
Inventory
User
Inventory
Authorized User
Slide 37
Slide 37 text
7/25/17
@evan2645
@dougbarth
Topology-Manager
Zero Trust: Building Systems in Untrusted Networks
Data Plane
Control Plane
Provisioner
Device
Inventory
User
Inventory
Config
Mgmt
Authorized User
Slide 38
Slide 38 text
7/25/17
@evan2645
@dougbarth
Topology-Manager
No Trust In Network
Zero Trust: Building Systems in Untrusted Networks
Slide 39
Slide 39 text
7/25/17
@evan2645
@dougbarth
Topology-Manager
No Trust In Network
Compute Can Be Bootstrapped Anywhere
Zero Trust: Building Systems in Untrusted Networks
Slide 40
Slide 40 text
7/25/17
@evan2645
@dougbarth
Topology-Manager
No Trust In Network
Compute Can Be Bootstrapped Anywhere
All Flows Get Strong AuthN/AuthZ
Zero Trust: Building Systems in Untrusted Networks
Slide 41
Slide 41 text
@evan2645
@dougbarth
Client-Side
Slide 42
Slide 42 text
7/25/17
@evan2645
@dougbarth
Google
Large Network, Large Perimeter
Zero Trust: Building Systems in Untrusted Networks
Slide 43
Slide 43 text
7/25/17
@evan2645
@dougbarth
Google
Large Network, Large Perimeter
Many Remote Employees
Zero Trust: Building Systems in Untrusted Networks
Slide 44
Slide 44 text
7/25/17
@evan2645
@dougbarth
Google
Large Network, Large Perimeter
Many Remote Employees
Perimeter + Remote Access Untenable
Zero Trust: Building Systems in Untrusted Networks
Slide 45
Slide 45 text
7/25/17
@evan2645
@dougbarth
Google
Large Network, Large Perimeter
Many Remote Employees
Perimeter + Remote Access Untenable
BeyondCorp
Zero Trust: Building Systems in Untrusted Networks
Slide 46
Slide 46 text
7/25/17
@evan2645
@dougbarth
BeyondCorp
Zero Trust: Building Systems in Untrusted Networks
Control Plane
Data Plane
Corp. Client
Slide 47
Slide 47 text
7/25/17
@evan2645
@dougbarth
BeyondCorp
Zero Trust: Building Systems in Untrusted Networks
Control Plane
Data Plane
Corp. Client
Slide 48
Slide 48 text
7/25/17
@evan2645
@dougbarth
BeyondCorp
Zero Trust: Building Systems in Untrusted Networks
Control Plane
Data Plane
Access Proxy
Corp. Client
Slide 49
Slide 49 text
7/25/17
@evan2645
@dougbarth
BeyondCorp
Zero Trust: Building Systems in Untrusted Networks
Control Plane
Data Plane
Access Proxy
Corp. Client
Enforcement
Slide 50
Slide 50 text
7/25/17
@evan2645
@dougbarth
BeyondCorp
Zero Trust: Building Systems in Untrusted Networks
Control Plane
Data Plane
Access Proxy
Corp. Client Backend
Backend
Backend
Enforcement
Slide 51
Slide 51 text
7/25/17
@evan2645
@dougbarth
BeyondCorp
Zero Trust: Building Systems in Untrusted Networks
Data Plane
Control Plane
User Inventory
Slide 52
Slide 52 text
7/25/17
@evan2645
@dougbarth
BeyondCorp
Zero Trust: Building Systems in Untrusted Networks
Data Plane
Control Plane
SSO
User Inventory
Slide 53
Slide 53 text
7/25/17
@evan2645
@dougbarth
BeyondCorp
Zero Trust: Building Systems in Untrusted Networks
Data Plane
Control Plane
SSO
Device
Inventory
User Inventory
Slide 54
Slide 54 text
7/25/17
@evan2645
@dougbarth
BeyondCorp
Zero Trust: Building Systems in Untrusted Networks
Data Plane
Control Plane
Access Control
Engine
SSO
Device
Inventory
User Inventory
Slide 55
Slide 55 text
7/25/17
@evan2645
@dougbarth
BeyondCorp
No Trust In Network
Zero Trust: Building Systems in Untrusted Networks
Slide 56
Slide 56 text
7/25/17
@evan2645
@dougbarth
BeyondCorp
No Trust In Network
Users Safely Roam Free
Zero Trust: Building Systems in Untrusted Networks
Slide 57
Slide 57 text
7/25/17
@evan2645
@dougbarth
BeyondCorp
No Trust In Network
Users Safely Roam Free
All Requests Get Strong AuthN/AuthZ
Zero Trust: Building Systems in Untrusted Networks
Slide 58
Slide 58 text
7/25/17
@evan2645
@dougbarth
BeyondCorp
No Trust In Network
Users Safely Roam Free
All Requests Get Strong AuthN/AuthZ
Zero Trust: Building Systems in Untrusted Networks
Slide 59
Slide 59 text
@evan2645
@dougbarth
Mature
Zero Trust
Slide 60
Slide 60 text
7/25/17
@evan2645
@dougbarth
BeyondCorp
Zero Trust: Building Systems in Untrusted Networks
Data Plane
Control Plane
Access Control
Engine
SSO
Device
Inventory
User Inventory Trust Engine
Slide 61
Slide 61 text
7/25/17
@evan2645
@dougbarth
BeyondCorp
Zero Trust: Building Systems in Untrusted Networks
Control Plane
Data Plane
Access Proxy
Corp. Client Backend
Backend
Backend
Score
Score
Slide 62
Slide 62 text
7/25/17
@evan2645
@dougbarth
Mature Zero Trust
Zero Trust: Building Systems in Untrusted Networks
Trust Engine
User
Data
Device
Data
Slide 63
Slide 63 text
7/25/17
@evan2645
@dougbarth
Mature Zero Trust
Zero Trust: Building Systems in Untrusted Networks
Trust Engine
User
Data
sFlow
Device
Data
Slide 64
Slide 64 text
7/25/17
@evan2645
@dougbarth
Mature Zero Trust
Zero Trust: Building Systems in Untrusted Networks
Trust Engine
User
Data
sFlow Accounting
Device
Data
Slide 65
Slide 65 text
@evan2645
@dougbarth
UX is
Important
Slide 66
Slide 66 text
@evan2645
@dougbarth
Earth is
Calling…
Slide 67
Slide 67 text
@evan2645
@dougbarth
Current
State
Slide 68
Slide 68 text
@evan2645
@dougbarth
Slide 69
Slide 69 text
@evan2645
@dougbarth
Slide 70
Slide 70 text
@evan2645
@dougbarth
Slide 71
Slide 71 text
7/25/17
@evan2645
@dougbarth
Just The Facts
Industry Moving Towards Deep Authn/Authz
Industry Converging on Zero Trust Model
More Secure, More Operable
Keep an Eye Out!
Zero Trust: Building Systems in Untrusted Networks
Slide 72
Slide 72 text
Evan Gilman, Doug Barth
@evan2645
@dougbarth
Zero Trust Networks