Top Banner
CONFIDENTIAL INFORMATION PROPERTY OF DUO SECURITY, INC. Sean Frazier Advisory CISO - Federal [email protected] | @seanfsez State of Love & Trust
29

State of Love & Trust...WAN Routing Visibility Policy Enforce Report + All Corp IT C2 Malware Phishing Cloud Resources Umbrella B W B L AMP Stealthwatch CES ISE TALOS Administrators

Mar 06, 2021

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: State of Love & Trust...WAN Routing Visibility Policy Enforce Report + All Corp IT C2 Malware Phishing Cloud Resources Umbrella B W B L AMP Stealthwatch CES ISE TALOS Administrators

CONFIDENTIAL INFORMATION PROPERTY OF DUO SECURITY, INC.

Sean Frazier Advisory CISO - [email protected] | @seanfsez

State of Love &

Trust

Page 2: State of Love & Trust...WAN Routing Visibility Policy Enforce Report + All Corp IT C2 Malware Phishing Cloud Resources Umbrella B W B L AMP Stealthwatch CES ISE TALOS Administrators
Page 3: State of Love & Trust...WAN Routing Visibility Policy Enforce Report + All Corp IT C2 Malware Phishing Cloud Resources Umbrella B W B L AMP Stealthwatch CES ISE TALOS Administrators
Page 4: State of Love & Trust...WAN Routing Visibility Policy Enforce Report + All Corp IT C2 Malware Phishing Cloud Resources Umbrella B W B L AMP Stealthwatch CES ISE TALOS Administrators
Page 5: State of Love & Trust...WAN Routing Visibility Policy Enforce Report + All Corp IT C2 Malware Phishing Cloud Resources Umbrella B W B L AMP Stealthwatch CES ISE TALOS Administrators
Page 6: State of Love & Trust...WAN Routing Visibility Policy Enforce Report + All Corp IT C2 Malware Phishing Cloud Resources Umbrella B W B L AMP Stealthwatch CES ISE TALOS Administrators
Page 7: State of Love & Trust...WAN Routing Visibility Policy Enforce Report + All Corp IT C2 Malware Phishing Cloud Resources Umbrella B W B L AMP Stealthwatch CES ISE TALOS Administrators
Page 8: State of Love & Trust...WAN Routing Visibility Policy Enforce Report + All Corp IT C2 Malware Phishing Cloud Resources Umbrella B W B L AMP Stealthwatch CES ISE TALOS Administrators

CONFIDENTIAL INFORMATION PROPERTY OF DUO SECURITY, INC.

What is Zero Trust, industry edition?

● 2004ish - Jericho Commandments

● 2010 - John Kindervag, father of Zero Trust

● 2014 - Google BeyondCorp

● 2017 - O’reilly Zero Trust Networks

Page 9: State of Love & Trust...WAN Routing Visibility Policy Enforce Report + All Corp IT C2 Malware Phishing Cloud Resources Umbrella B W B L AMP Stealthwatch CES ISE TALOS Administrators
Page 10: State of Love & Trust...WAN Routing Visibility Policy Enforce Report + All Corp IT C2 Malware Phishing Cloud Resources Umbrella B W B L AMP Stealthwatch CES ISE TALOS Administrators
Page 11: State of Love & Trust...WAN Routing Visibility Policy Enforce Report + All Corp IT C2 Malware Phishing Cloud Resources Umbrella B W B L AMP Stealthwatch CES ISE TALOS Administrators
Page 12: State of Love & Trust...WAN Routing Visibility Policy Enforce Report + All Corp IT C2 Malware Phishing Cloud Resources Umbrella B W B L AMP Stealthwatch CES ISE TALOS Administrators
Page 13: State of Love & Trust...WAN Routing Visibility Policy Enforce Report + All Corp IT C2 Malware Phishing Cloud Resources Umbrella B W B L AMP Stealthwatch CES ISE TALOS Administrators

CONFIDENTIAL INFORMATION PROPERTY OF DUO SECURITY, INC.

Perimeter?

Page 14: State of Love & Trust...WAN Routing Visibility Policy Enforce Report + All Corp IT C2 Malware Phishing Cloud Resources Umbrella B W B L AMP Stealthwatch CES ISE TALOS Administrators

CONFIDENTIAL INFORMATION PROPERTY OF DUO SECURITY, INC.

Page 15: State of Love & Trust...WAN Routing Visibility Policy Enforce Report + All Corp IT C2 Malware Phishing Cloud Resources Umbrella B W B L AMP Stealthwatch CES ISE TALOS Administrators

Application & Workload Access Network Access

Workforce Workload Workplace

+

ServersApps

Database

s

SaaS

Data Center

User &

Devices

IoT

Devices

WirelessNetwork

Traffic

Corporate NetworkAll Corp IT

User & Device Access

Securing Access in the EnterpriseAccess happens everywhere – how do establish trusted access?

Page 16: State of Love & Trust...WAN Routing Visibility Policy Enforce Report + All Corp IT C2 Malware Phishing Cloud Resources Umbrella B W B L AMP Stealthwatch CES ISE TALOS Administrators

Secure the WorkforceWith Duo

Secure Your WorkloadsWith Tetration

Secure the WorkplaceWith Software-Defined Access

MFA + Device Trust Application Micro-Segmentation Network Segmentation

ServersApps

Database

s

SaaS

Data Center

User & Device Access Workload Access Network Access

User &

Devices

IoT

Devices

WirelessNetwork

Traffic

Corporate Network

Cisco Zero Trust

Application Access

WANRouting

Visibility Policy Enforce Report

+

All Corp IT

Page 17: State of Love & Trust...WAN Routing Visibility Policy Enforce Report + All Corp IT C2 Malware Phishing Cloud Resources Umbrella B W B L AMP Stealthwatch CES ISE TALOS Administrators
Page 18: State of Love & Trust...WAN Routing Visibility Policy Enforce Report + All Corp IT C2 Malware Phishing Cloud Resources Umbrella B W B L AMP Stealthwatch CES ISE TALOS Administrators

C2

Malware

Phishing

Cloud Resources

Umbrella

B

W

B

L

AMP

Stealthwatch

CES

ISE

TALOS

Administrators

Data LossPhishingMalware

The User Journey – Cisco Zero Trust

User+

Device

Network

Value to the Business Priorities

1. Ease of▪ Implementation▪ Use▪ Operations/FTE▪ Integration

2. Compliance3. Risk Reduction4. Visibility5. Culture

Legacy to Cloud

IOT & Process Control

BYOD & Agility

Tetration

Stealthwatch

Page 19: State of Love & Trust...WAN Routing Visibility Policy Enforce Report + All Corp IT C2 Malware Phishing Cloud Resources Umbrella B W B L AMP Stealthwatch CES ISE TALOS Administrators
Page 20: State of Love & Trust...WAN Routing Visibility Policy Enforce Report + All Corp IT C2 Malware Phishing Cloud Resources Umbrella B W B L AMP Stealthwatch CES ISE TALOS Administrators
Page 21: State of Love & Trust...WAN Routing Visibility Policy Enforce Report + All Corp IT C2 Malware Phishing Cloud Resources Umbrella B W B L AMP Stealthwatch CES ISE TALOS Administrators

CONFIDENTIAL INFORMATION PROPERTY OF DUO SECURITY, INC.

unix

Microsoft

RRAS

VPNs Cloud Apps On-Premises CustomIdentity

REST

APIS

WEB SDK

RADIUS

SAML

OIDC

Wired for Zero Trust Integration documents are available at duo.com/docs

Page 22: State of Love & Trust...WAN Routing Visibility Policy Enforce Report + All Corp IT C2 Malware Phishing Cloud Resources Umbrella B W B L AMP Stealthwatch CES ISE TALOS Administrators

CONFIDENTIAL INFORMATION PROPERTY OF DUO SECURITY, INC.

Page 23: State of Love & Trust...WAN Routing Visibility Policy Enforce Report + All Corp IT C2 Malware Phishing Cloud Resources Umbrella B W B L AMP Stealthwatch CES ISE TALOS Administrators

CONFIDENTIAL INFORMATION PROPERTY OF DUO SECURITY, INC.

User to Device To Every Application

Our Vision: Passwordless Authentication

Page 24: State of Love & Trust...WAN Routing Visibility Policy Enforce Report + All Corp IT C2 Malware Phishing Cloud Resources Umbrella B W B L AMP Stealthwatch CES ISE TALOS Administrators

CONFIDENTIAL INFORMATION PROPERTY OF DUO SECURITY, INC.

webauthn.guide / webauthn.io

Page 25: State of Love & Trust...WAN Routing Visibility Policy Enforce Report + All Corp IT C2 Malware Phishing Cloud Resources Umbrella B W B L AMP Stealthwatch CES ISE TALOS Administrators

Trust Engine

https://duo.com/labs

https://twitter.com/duo_labs

Page 26: State of Love & Trust...WAN Routing Visibility Policy Enforce Report + All Corp IT C2 Malware Phishing Cloud Resources Umbrella B W B L AMP Stealthwatch CES ISE TALOS Administrators
Page 27: State of Love & Trust...WAN Routing Visibility Policy Enforce Report + All Corp IT C2 Malware Phishing Cloud Resources Umbrella B W B L AMP Stealthwatch CES ISE TALOS Administrators

CONFIDENTIAL INFORMATION PROPERTY OF DUO SECURITY, INC.

What is BeyondCorp?

● 2014 - Google BeyondCorp paper

● 2016 - Google BeyondCorp

progress update

● 2017 - BeyondCorp migration,

user experience and lessons learned

Page 28: State of Love & Trust...WAN Routing Visibility Policy Enforce Report + All Corp IT C2 Malware Phishing Cloud Resources Umbrella B W B L AMP Stealthwatch CES ISE TALOS Administrators

Google BeyondCorp: Zero-Trust at Work

Page 29: State of Love & Trust...WAN Routing Visibility Policy Enforce Report + All Corp IT C2 Malware Phishing Cloud Resources Umbrella B W B L AMP Stealthwatch CES ISE TALOS Administrators