Forget Private Network, DMZ, VLAN, Classic Firewall

Jan 17 2023

Zero Trust Model

Zero Trust model includes several key components

  • Identity and access management: Every user and device must be authenticated before being granted access to resources. This can include multi-factor authentication, device health checks, and user behavioral analysis

  • Micro-segmentation: The network is divided into small segments, with each segment containing only the resources that a user or device needs to perform its intended function.

  • Least privilege access: Users and devices are granted the least amount of access necessary to perform their intended function.

  • Continuous monitoring: Network traffic is continuously monitored for suspicious activity, and any anomalies are flagged for further investigation.

There is a little problem, with implementing Zero Trust policy for the current network design

Network packets do not have an authentication header, packets have only TCP/UDP/IP headers with these headers, writing security rules is limited

FerrumGate Zero Trust Virtual Network

Authentication

FerrumGate implements a Zero Trust Model successfully

First of all, every user or device is checked before connecting to the network

FerrumGate supports all authentication methods like (more)

  • Local
  • OAuth2
  • Saml
and IdP providers like
  • Local
  • Active Directory
  • Google Workspace
  • Azure AD
  • Linkedin
  • etc...

and device postures, ip filtering, location filtering and etc...

After authentication we know lots of information about packets that flows in our virtual Zero Trust network (more)

Authorization

After a successful connection to network, Zero Trust least privileges policy executes, by default, there is no access to any resource in the network.

In FerrumGate a service (more) maps to a resource where is somewhere, with services FerrumGate executes more detailed policy checking to access resources

  • User or Group
  • Ip
  • Location
  • 2FA
  • Protocol specific rules(http post, http get, ntfs)
  • etc...

how zero trust access works

Monitoring

FerrumGate logs every allowed or denied request

Logs are more detailed than a Firewall, who, when, why, from, to, and result questions are answered

Conclusion

FerrumGate is new software defined virtual network for Zero Trust that succeeds

  • Identity and access management

  • Micro-segmentation

  • Least privilege access

  • Continuous monitoring