Comment Re: What has not been hacked yet? (Score 1) 35
I see Zero Trust Architecture (ZTA) differently than just lip service. If the company actually commits to it (and its associated cost, which is usually somewhat significant), it is a totally valid defense strategy. With traditional "primarily relying on perimeter defense", companies are effectively setting up a single point of failure for their everything. I have seen so many companies who relied mostly on perimeter defense, with services not requiring auth, or they used long lived API keys (often hardcoded in source
ZTA is all about "Keeping control of the infrastructure, supply chain due diligence, and maintaining and understanding the perimeter". The real mind shift is the perimeter shifts from some centrally managed thing to the perimeter around a service. ZTA in my experience has mostly been things like:
- all service -> service comms are encrypted (usually trivial with HTTPS or mTLS). (you can get service -> service mTLS "for free" in k8s with stuff like istio, and HTTPS is well established for decades at this point)
- all service -> service comms use limited scoped auth with limited time windows (usually pretty easy with JWTs and some platform level key mgmt)
- services are only allowed to the other services they need to via network ACLs (usually pretty easy with IaC for the svc)
- services are not allowed to talk to the public internet by default, with exceptions OK when it is technically necessary (usually pretty easy with IaC for the svc)
I like to explain ZTA to normies like this: cyber security is best thought of as layered (like the concept of defense-in-depth). Imagine each layer is a piece of swiss cheese. Yes this layer may have holes in it. But if you stack a bunch of layers in just the right way, there are no holes which make it all the way through. Relying primarily on perimeter defense is like having only 1 or 2 layers. ZTA is like having dozens of layers.
I just got done implementing a 100% on-prem ZTA for a company, but after seeing the cost materialized after a few months, they not only reverted back to their old ways, they fired most of their security staff. The problem with a lot of this is not only does it require a mind shift from management, it requires a mind shift from software engineers who are notoriously lazy as fuck (and/or overworked and choose to not do security b/c mgmt doesn't care about it) when it comes to cyber sec implementation and/or estimation.
I really feel ZTA has lots of moral benefits, but the business incentives for it have not yet aligned, so most people aren't doing it.