Intelligent Tech Channels Issue 04 | Page 43

INTELLIGENT ENTERPRISE SECURITY
Advances in hacking techniques

3

Traditionally , organisations deploy firewalls at the perimeter of the network for protection . Edge firewalls label all external traffic including Internet traffic as untrusted , while designating all intranetwork traffic as trusted , and handle them in two distinct ways . There are no grey areas , no ambiguity .
Unfortunately the world is not black and white anymore .
With the rise of attacks originating from weak segments of the network , the line delineating trusted and untrusted traffic has blurred . Merely deploying firewalls at the edge of the network is no longer adequate - organisations need to re-architecture their network such that internal firewalling can restrict malware flow between different segments of the organisation .
According to research firm Forrester , enterprises have built strong perimeters . Today well-organised cybercriminals have recruited insiders and developed new attack methods that bypass current security protections . Security and risk professionals must now make security ubiquitous throughout the network , not just at the perimeter .
Forrester advocates the zero trust security model , where the network is securely segmented , and all traffic is inspected and logged . With such a model , the information flow between an engineer and a marketing colleague seated next to each other , will no longer proceed unchecked .
Since these two employees are assigned different network segments and an internal segmentation firewall is in place , proper policies will be applied and logs will be generated for any traffic traversing between the two departments .
Internal segmentation firewall comprises two kinds of technologies : Policy-based segmentation that

1 identifies a user ’ s parameters , and

dynamically and consistently enforces a security policy controlling the user ’ s access to enterprises resources
An internal segmentation firewall provides multiple touch points within a network in order to provide security between existing network boundaries
Firewall segmentation that divides up

2 the internal network to enable traffic analysis , logging and full security control

An internal segmentation firewall does not replace the edge firewall . Instead , an internal segmentation firewall provides multiple touch points within a network in order to provide security between existing network boundaries . Or it can create entirely new segments inside of existing network boundaries . It also improves visibility by letting IT management see all layers of the network in one pane of glass .
Depending on the level of security needed between each network segment , the types of protection enabled will vary . Once a firewall is deployed into each segment of an enterprise network , its policy , logging and various modern detection features can help identify and quarantine users that have been compromised .
Also , firewalls would make it much harder for hackers to do reconnaissance and discovery even if they have started to make their way inside the company network .
Internal segmentation firewalls should work in synchronisation with one another , leveraging threat intelligence and being complemented by advanced persistent threat detection solutions . These include sandboxing and endpoint security solutions , so that actions can be taken to identify compromises and quarantine them as soon as they are discovered .
Traditional enterprise objections to putting a firewall in front of each network segment have been around performance and price . Because intra-network traffic volume can be many times that of Internet traffic volume , not many firewalls have the capability to handle the workloads without significant latency . Those that can handle it , when deployed in large numbers to cover each network segment within the enterprise , can make the cost prohibitive for many organisations .
Today however attainable solutions exist . Modern firewalls that leverage custom ASIC chips can be fast enough to handle internal firewalling and be cost effective at the same time .
Some may recall that per-port security was all the rage a few years ago , until implementation hurdles put an end to that promise . Current internal segmentation firewall technology is a step towards reviving that promise . As technologies in switching and access port security evolves and performance improves , we will be able to combine them with internal segmentation firewall to reach that goal .
The concept of internal segmentation firewalling has put the network security industry on the cusp of an exciting era . Firms that want to take their operations and their business , one step ahead of the competition should take advantage of it .
Michael Xie is Founder , President and Chief Technology Officer at Fortinet
43