{"id":36815,"date":"2022-07-13T15:17:36","date_gmt":"2022-07-13T19:17:36","guid":{"rendered":"https:\/\/centricconsulting.com\/?p=36815"},"modified":"2022-10-14T08:40:36","modified_gmt":"2022-10-14T12:40:36","slug":"include-apps-in-your-zero-trust-architecture","status":"publish","type":"post","link":"https:\/\/centricconsulting.com\/blog\/include-apps-in-your-zero-trust-architecture\/","title":{"rendered":"Include Apps in Your Zero-Trust Architecture"},"content":{"rendered":"

Data theft and shadow IT present an international threat. In addition to locking down online identities and endpoints, you must also secure your apps to build a true Zero-Trust architecture.<\/h2>\n
\n

In previous posts in this series, I described how tools like multi-factor authorization (MFA) secure data by safeguarding online identities<\/a> and endpoints<\/a>. In this post, I will look a little deeper into how these tools can also function at the app level. In other words, even if bad actors steal an identity or breach a device, they can\u2019t access sensitive data if you\u2019ve protected the apps.<\/p>\n

For example, we recently set up Microsoft Defender for Cloud Apps (MDCA, formerly MCAS) for a client. MDCA conditional application logic allowed users to access Workday from company-issued endpoints to download their paycheck stubs.<\/p>\n

However, one bad actor attempted to access Workday from a company-issued endpoint. The attacker harvested the intended victim\u2019s device sign-on and password from the dark web, giving them access to the device. Fortunately, our client had also enabled MDCA. When the hacker tried to access Workday, MDCA recognized the request was coming from an unusual geographic location and put up an additional MFA requirement that denied them access to Workday.<\/strong><\/p>\n

But app attacks can be much more complicated and harder to defend against. Most IT professionals are now familiar with the Log4Shell bug, which began wreaking havoc throughout the public and private sectors toward the end of 2021. The bug attacked Apache Log4j, a common Java-based utility many vendors use within their applications to log system activity.<\/p>\n

The catch? Because numerous software vendors widely used Apache Log4j for more than 20 years, many organizations didn\u2019t know they were vulnerable to its attack. The result? Bad actors broke in and executed remote code that reached into organizations worldwide. While companies have since deployed tools to identify exposed Apache Log4j systems, hackers continue to look for other places where vulnerabilities exist \u2014 requiring security analysts to remain on the lookout for the Log4Shell bug.<\/p>\n

As we helped our client do successfully with the attempted Workday attack, vendors could have protected Apache Log4j from the Log4Shell bug with conditional access requirements based simply on where the attack originated. An additional layer of protection would have kept attackers out.<\/strong><\/p>\n

App Protection in the Grand Scheme of Zero-Trust Architecture<\/h2>\n

Like identity and endpoint security, adopting a Zero-Trust approach<\/a> to apps requires new thinking. Zero-Trust app protection is a shift from asking, \u201cCan a user access this app?\u201d to asking, \u201cCan a user access this app from this particular location or endpoint?\u201d<\/p>\n

Thinking more about our MDCA experience, recall how the bad actor found a user’s endpoint credentials on the dark web. If not for MFA, they would have been able to get into Workday and retrieve data or execute malicious code.<\/strong> The conditional access to the endpoint kept them out.<\/p>\n

Similarly, MFA or a different conditional access tool would have intervened as soon as bad actors launched their attack on Apache Log4j. That simple tool would have prevented the chain of events that allowed them to insert Java Naming and Directory Interface (JNDI) code into the vulnerable server housing Apache Log4j.<\/p>\n

How to Protect Your Apps<\/h2>\n

Fortunately, while a damage attack like the Log4Shell bug is difficult to repair once it\u2019s done, numerous tools are available to help with app protection. Known collectively as cloud access security brokers (CASBs), they stand between apps in the cloud and app users to enforce your policies regarding everything from credential mapping to tokenization, encryption, device profiling and more.<\/p>\n

Symantec, Forcepoint, Cisco and Netskope are some common CASBs to look for when comparing offerings. But if you are a Microsoft 365<\/a> (M365) shop with an M365 E5 license, you already have access to Microsoft\u2019s<\/a> most advanced Enterprise Mobility and Security (EMS) tool, EMS E5.<\/p>\n

Otherwise, Microsoft customers can add EMS E5 to their existing license. Below I have listed various Microsoft subscriptions and the necessary add-on to request, depending on your M365 license type.<\/strong><\/p>\n

\"Zero-Trust<\/a><\/p>\n

 <\/p>\n

Conclusion<\/h2>\n

Online identity, endpoint and application security work together to deliver a comprehensive approach to Zero-Trust architecture. They protect against attacks that use individual credentials, vulnerable devices \u2014 remote or not \u2014 and the apps that live on those devices.<\/strong><\/p>\n

The next evolution of Zero-Trust thinking requires going beyond the resources people very personally interact with every day to the bigger digital assets and systems that usually hum along quietly in the background \u2014 your company\u2019s data, infrastructure and network. Those will be the topics of my next three blogs. Until then, stay alert and stay safe!<\/p>\n","protected":false},"excerpt":{"rendered":"

In addition to locking down online identities and endpoints, you must also secure your apps to build a true Zero-Trust architecture.<\/p>\n","protected":false},"author":63,"featured_media":36818,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[1],"tags":[23660,23681],"coauthors":[15012],"acf":[],"publishpress_future_action":{"enabled":false,"date":"2024-07-22 07:48:33","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category"},"_links":{"self":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/36815"}],"collection":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/users\/63"}],"replies":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/comments?post=36815"}],"version-history":[{"count":0,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/36815\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/media\/36818"}],"wp:attachment":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/media?parent=36815"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/categories?post=36815"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/tags?post=36815"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/coauthors?post=36815"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}