JONATHAN SINCLAIR
Architecting Trust in the Digital
Landscape, or lack thereof
 Ponemon 2016:
 From 874 incidents 568 were caused by employee or contractor negligence
 Companies investing upwards of $4 million to mitigate these threats
 Verizon Data Breach Investigations report 2017:
 Those involved in breaches: 25% from internal actors
 2016 IBM Cyber Security Intelligence Index:
 60% of all attacks were carried out by insiders
Zero trust model
 US House of Representatives Committee recommends Zero-trust model to federal
agencies
 Forrester Report coins the term Zero-trust model and suggests focus on data-driven
network design
 VMWare: Time to build a Zero-Trust network
 Trust, but verify (Russian proverb made famous by Roland Reagan in reference to nuclear
disarmament)
Zero trust model cont.
Trust No One
 Build in four-eyes
 Role based access
 Divide and Conquer
 Modular segregation of duties
 No perimeter is the perimeter
 Jump hosts, Privileged Access Workstations (PAWs)
Architectural Complexities
 Logically segment subnets
 Control routing behavior
 Enable Forced Tunneling
 Use Virtual network appliances
 Deploy DMZs for security zoning
 Avoid exposure to the Internet with dedicated WAN links
 Optimize uptime and performance
 Use global load balancing
 Disable RDP Access to Azure Virtual Machines
 Enable Azure Security Center
 Extend your datacenter into Azure
Security Best-Practices (Azure)
 Lock away master keys
 Create individual groups
 Define policies to govern access permission's
 Grant least privilege
 Four-eye approval for granting access levels
 Configure strong password policies
 Enable MFA
 Delegate roles instead of sharing
 Automate on-boarding, off-boarding procedures
User Access Controls
 Ensure security policy compliance
 Encrypt Data
 Limit Access to information
 Classify information assets (PII relevancy)
 Privacy by design
GDPR and Privacy Best Practices
 Develop protection mechanisms on the data itself and ensure
it’s transient
 Format-Preserving Encryption
 Secure Stateless Tokenization
Data-centric security
NIST Reference Architecture
AWS Reference Architecture(s)
Azure Reference Architecture(s)
Mosiac of Reference Architectures
 To big to be agile?
 Old vs. new mindset:
 DevOp’s design (integrated with Sec and Priv Op’s)
 SDN’s,
 Agile API connectivity
 Container technology
 Cloud scalability
 Federated global access
The Enterprise: A Sleeping Dinosaur
Security Design (the white slide)
 Re-build your architectures under the Zero-trust mindset
 Fire or re-train existing staff-base
 Tear up existing infrastructure (dept-by-dept) and start again, or build out and replace
 Hire security, privacy and engineering staff, remove infrastructure, maintenance
 Re-architect for data-centric security design
 Leverage generic best-practice cloud provided architectures and automatic deployment
Where does the model leave us?
Pause…..!
Everyone agree?
Is this really feasible?
Who trusts who?
 Do you trust your vendors?
 Do you trust your co-workers (internal or external)?
 Do you trust your IT?
Choice or necessity?
But wait!
“Complexity is the worst enemy of security” -- Schneier
Conflicting positions
Outsource, but trust
No choice
Complicated architectures
Not simple
Zero-trust model
Incredibly hard to implement, hinders productivity, transparency, time to market etc.
Security unicorn to the rescue
Chains of trust.. everywhere
Block-chain and the power of everyone
The new trust chain
 Now you have a distributed ledger
 Powered by your group
 (Can remain corporate, but being public offers the most advantages, but now you have to be
transparent)
 Can track tampering across platforms
 Transparency
Combined with more chains
Hardware-to-Software
Secure enclaves: Intel’s SGX: ARM Trustzone
Chains of trust can be established
 Chain your hardware key-chain
 TPM is making a come back
 Chain your data
 With transactional and distributed ledger
 Control your ID’s
 Trust: “At the heart of everything is identity” - Russinovich
Track and Monitor everything!
 Really?
 Show me the money calls your Splunk agent …
 Craziness raises it’s head again
 SIEM data storage on average = 6, 9 or 12 months
 Statistics on data breach detections:
 ~4, 6 months globally
 ~ 15 months in EMEA
 APT detection (Stuxnet)?
 Compromises usually identified by external source
Track and Monitor everything!
 HPE Recognised this issue long before anyone else: but will we ever see the fruits of the research
labour: “The Machine”
 Data Rich but insight poor
 Design a machine that scales
 Exponential data explosion
 Datacentre energy consumption > UK, forecast to grow
 Memory-driven computing
Concluding remarks
Do I think this will work?
At every iteration no one talks about simplification
More intricate architecture to support simplicity
Every abstraction reveals another attack surface
The onion bites back: Row hammer, Spectre, SgxSpectre, Meltdown, etc.
Zero-trust model simply isn’t workable when business demands
lightning response times and agility
Company loyalty dead in an outsourced world
Apple (backup) , Google (MFA) and China?
There is always hope – there must be hope!
 Aragorn: "What is your name?“
 Háleth: "Háleth, son of Háma, my lord.“
 Háleth: "The men are saying that we will not live out the night. They say that it is
hopeless.“
 Aragorn: "There is always hope."
We live in a world of faith not trust!
 Reiterating Dan Geer’s Cybersecurity requirements (BH 2014)
1. Mandatory reporting
2. Net neutrality
3. Source code liability
4. Strike back
5. Resiliency
6. Vulnerability finding
7. Right to Be Forgotten
8. Internet voting
9. Abandonment (open src)
10. Convergence (physical and cyber)
11. In-souring (JS)
12. Quantum technologies (JS)

More Related Content

PDF
Operar con alertas, dashboards customizados y cronología
PDF
Poner en funcionamiento con alertas, dashboards customizados y líneas de tiempo
PDF
Obtén visibilidad completa y encuentra problemas de seguridad ocultos
PDF
Limitless xdr meetup
PDF
Conferencia principal: Evolución y visión de Elastic Security
PDF
Cylance_Protect_Datasheet
PDF
Avoiding Limitations of Traditional Approaches to Security
PDF
Avoiding Container Vulnerabilities
Operar con alertas, dashboards customizados y cronología
Poner en funcionamiento con alertas, dashboards customizados y líneas de tiempo
Obtén visibilidad completa y encuentra problemas de seguridad ocultos
Limitless xdr meetup
Conferencia principal: Evolución y visión de Elastic Security
Cylance_Protect_Datasheet
Avoiding Limitations of Traditional Approaches to Security
Avoiding Container Vulnerabilities

What's hot (20)

PDF
Building Security Into Your Cloud IT Practices
PDF
Opérez vos processus avec l'alerting, les tableaux de bord personnalisés et l...
PDF
Automatisez la détection des menaces et évitez les faux positifs
PDF
7 Experts on Implementing Azure Sentinel
PDF
7 cloud security tips
PDF
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
PDF
Defense In-Depth
PPTX
Insider Threat: How Does Your Security Stack Measure Up?
PPTX
Dragos S4X20: Mapping ICS Incidents to the MITRE Attack Framework
PPTX
Cloud – Helps or Hurts Insider Threat?
PDF
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
PPTX
Purple Teaming ICS Networks
PPTX
Comprehensive Cloud Security Requires an Automated Approach
PDF
A Pragmatic Union: Security and SRE
PDF
Is Penetration Testing Worth It
PDF
Microsoft Azure Sentinel
PDF
Host-based Security, by Dmitry Khlebnikov @ Secure Development Melbourne
PDF
Operationalize with alerting, custom dashboards, and timelines
PDF
Integrated Network Security Strategies
PDF
Embracing Threat Intelligence and Finding ROI in Your Decision
Building Security Into Your Cloud IT Practices
Opérez vos processus avec l'alerting, les tableaux de bord personnalisés et l...
Automatisez la détection des menaces et évitez les faux positifs
7 Experts on Implementing Azure Sentinel
7 cloud security tips
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Defense In-Depth
Insider Threat: How Does Your Security Stack Measure Up?
Dragos S4X20: Mapping ICS Incidents to the MITRE Attack Framework
Cloud – Helps or Hurts Insider Threat?
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Purple Teaming ICS Networks
Comprehensive Cloud Security Requires an Automated Approach
A Pragmatic Union: Security and SRE
Is Penetration Testing Worth It
Microsoft Azure Sentinel
Host-based Security, by Dmitry Khlebnikov @ Secure Development Melbourne
Operationalize with alerting, custom dashboards, and timelines
Integrated Network Security Strategies
Embracing Threat Intelligence and Finding ROI in Your Decision
Ad

Similar to Architecting trust in the digital landscape, or lack thereof (20)

PDF
BATbern48_How Zero Trust can help your organisation keep safe.pdf
PPSX
Zero-Trust SASE DevSecOps
PDF
Zero Trust Networks Evan Gilman Doug Barth
PDF
Zero Trust Networks Evan Gilman Doug Barth
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
The Open Group - ZT Commandments and Reference Model.pptx
PPT
Security in Web 2.0, Social Web and Cloud
PPTX
Securing your Cloud Deployment
PDF
Yuriy Chapran: Zero Trust and Beyond: OpenVPN’s Role in Next-Gen Network Secu...
PPT
Lecture31.ppt
PDF
Martin Vliem (Microsoft): Met vertrouwen naar de cloud
PPTX
Zero Trust: Redefining Security in the Digital Age
PPTX
MS. Cybersecurity Reference Architecture
PPTX
Securing the Digital Economy: Reinventing the Internet
PDF
Securing the digital economy
PDF
New technologies - Amer Haza'a
PDF
Trust in a Digital World
PPTX
Zero trust model for cloud computing.pptx
PDF
Cybersecurity_Security_architecture_2023.pdf
PDF
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
BATbern48_How Zero Trust can help your organisation keep safe.pdf
Zero-Trust SASE DevSecOps
Zero Trust Networks Evan Gilman Doug Barth
Zero Trust Networks Evan Gilman Doug Barth
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
The Open Group - ZT Commandments and Reference Model.pptx
Security in Web 2.0, Social Web and Cloud
Securing your Cloud Deployment
Yuriy Chapran: Zero Trust and Beyond: OpenVPN’s Role in Next-Gen Network Secu...
Lecture31.ppt
Martin Vliem (Microsoft): Met vertrouwen naar de cloud
Zero Trust: Redefining Security in the Digital Age
MS. Cybersecurity Reference Architecture
Securing the Digital Economy: Reinventing the Internet
Securing the digital economy
New technologies - Amer Haza'a
Trust in a Digital World
Zero trust model for cloud computing.pptx
Cybersecurity_Security_architecture_2023.pdf
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Ad

More from Jonathan Sinclair (11)

PPTX
Is the SOC working as a viable business model (or security model)?
PPTX
Machine learning 101 - or less
PDF
The cyber security hype cycle is upon us
PPTX
SOC: Use cases and are we asking the right questions?
PPTX
XAI – accountability unchecked
PPTX
Cyber speed – the unknown velocity component
PPTX
Cyber Security: Strategies, Defence and what’s not working
PPT
Blue Ocean IT Security
PPTX
Vulnerability management today and tomorrow
PPTX
State of virtualisation -- 2012
PPTX
Breach analysis slideshare
Is the SOC working as a viable business model (or security model)?
Machine learning 101 - or less
The cyber security hype cycle is upon us
SOC: Use cases and are we asking the right questions?
XAI – accountability unchecked
Cyber speed – the unknown velocity component
Cyber Security: Strategies, Defence and what’s not working
Blue Ocean IT Security
Vulnerability management today and tomorrow
State of virtualisation -- 2012
Breach analysis slideshare

Recently uploaded (20)

PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
Auditboard EB SOX Playbook 2023 edition.
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
Comparative analysis of machine learning models for fake news detection in so...
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PPTX
Microsoft User Copilot Training Slide Deck
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PPTX
Training Program for knowledge in solar cell and solar industry
giants, standing on the shoulders of - by Daniel Stenberg
A symptom-driven medical diagnosis support model based on machine learning te...
Auditboard EB SOX Playbook 2023 edition.
SGT Report The Beast Plan and Cyberphysical Systems of Control
Comparative analysis of machine learning models for fake news detection in so...
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
Convolutional neural network based encoder-decoder for efficient real-time ob...
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
EIS-Webinar-Regulated-Industries-2025-08.pdf
Rapid Prototyping: A lecture on prototyping techniques for interface design
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
Microsoft User Copilot Training Slide Deck
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Lung cancer patients survival prediction using outlier detection and optimize...
Improvisation in detection of pomegranate leaf disease using transfer learni...
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
Early detection and classification of bone marrow changes in lumbar vertebrae...
Introduction to MCP and A2A Protocols: Enabling Agent Communication
Training Program for knowledge in solar cell and solar industry

Architecting trust in the digital landscape, or lack thereof

  • 1. JONATHAN SINCLAIR Architecting Trust in the Digital Landscape, or lack thereof
  • 2.  Ponemon 2016:  From 874 incidents 568 were caused by employee or contractor negligence  Companies investing upwards of $4 million to mitigate these threats  Verizon Data Breach Investigations report 2017:  Those involved in breaches: 25% from internal actors  2016 IBM Cyber Security Intelligence Index:  60% of all attacks were carried out by insiders Zero trust model
  • 3.  US House of Representatives Committee recommends Zero-trust model to federal agencies  Forrester Report coins the term Zero-trust model and suggests focus on data-driven network design  VMWare: Time to build a Zero-Trust network  Trust, but verify (Russian proverb made famous by Roland Reagan in reference to nuclear disarmament) Zero trust model cont.
  • 5.  Build in four-eyes  Role based access  Divide and Conquer  Modular segregation of duties  No perimeter is the perimeter  Jump hosts, Privileged Access Workstations (PAWs) Architectural Complexities
  • 6.  Logically segment subnets  Control routing behavior  Enable Forced Tunneling  Use Virtual network appliances  Deploy DMZs for security zoning  Avoid exposure to the Internet with dedicated WAN links  Optimize uptime and performance  Use global load balancing  Disable RDP Access to Azure Virtual Machines  Enable Azure Security Center  Extend your datacenter into Azure Security Best-Practices (Azure)
  • 7.  Lock away master keys  Create individual groups  Define policies to govern access permission's  Grant least privilege  Four-eye approval for granting access levels  Configure strong password policies  Enable MFA  Delegate roles instead of sharing  Automate on-boarding, off-boarding procedures User Access Controls
  • 8.  Ensure security policy compliance  Encrypt Data  Limit Access to information  Classify information assets (PII relevancy)  Privacy by design GDPR and Privacy Best Practices
  • 9.  Develop protection mechanisms on the data itself and ensure it’s transient  Format-Preserving Encryption  Secure Stateless Tokenization Data-centric security
  • 10. NIST Reference Architecture AWS Reference Architecture(s) Azure Reference Architecture(s) Mosiac of Reference Architectures
  • 11.  To big to be agile?  Old vs. new mindset:  DevOp’s design (integrated with Sec and Priv Op’s)  SDN’s,  Agile API connectivity  Container technology  Cloud scalability  Federated global access The Enterprise: A Sleeping Dinosaur
  • 12. Security Design (the white slide)
  • 13.  Re-build your architectures under the Zero-trust mindset  Fire or re-train existing staff-base  Tear up existing infrastructure (dept-by-dept) and start again, or build out and replace  Hire security, privacy and engineering staff, remove infrastructure, maintenance  Re-architect for data-centric security design  Leverage generic best-practice cloud provided architectures and automatic deployment Where does the model leave us?
  • 15. Is this really feasible?
  • 16. Who trusts who?  Do you trust your vendors?  Do you trust your co-workers (internal or external)?  Do you trust your IT? Choice or necessity?
  • 17. But wait! “Complexity is the worst enemy of security” -- Schneier
  • 18. Conflicting positions Outsource, but trust No choice Complicated architectures Not simple Zero-trust model Incredibly hard to implement, hinders productivity, transparency, time to market etc.
  • 19. Security unicorn to the rescue
  • 20. Chains of trust.. everywhere
  • 21. Block-chain and the power of everyone
  • 22. The new trust chain  Now you have a distributed ledger  Powered by your group  (Can remain corporate, but being public offers the most advantages, but now you have to be transparent)  Can track tampering across platforms  Transparency
  • 25. Chains of trust can be established  Chain your hardware key-chain  TPM is making a come back  Chain your data  With transactional and distributed ledger  Control your ID’s  Trust: “At the heart of everything is identity” - Russinovich
  • 26. Track and Monitor everything!  Really?  Show me the money calls your Splunk agent …  Craziness raises it’s head again  SIEM data storage on average = 6, 9 or 12 months  Statistics on data breach detections:  ~4, 6 months globally  ~ 15 months in EMEA  APT detection (Stuxnet)?  Compromises usually identified by external source
  • 27. Track and Monitor everything!  HPE Recognised this issue long before anyone else: but will we ever see the fruits of the research labour: “The Machine”  Data Rich but insight poor  Design a machine that scales  Exponential data explosion  Datacentre energy consumption > UK, forecast to grow  Memory-driven computing
  • 29. Do I think this will work? At every iteration no one talks about simplification More intricate architecture to support simplicity Every abstraction reveals another attack surface The onion bites back: Row hammer, Spectre, SgxSpectre, Meltdown, etc. Zero-trust model simply isn’t workable when business demands lightning response times and agility Company loyalty dead in an outsourced world Apple (backup) , Google (MFA) and China?
  • 30. There is always hope – there must be hope!  Aragorn: "What is your name?“  Háleth: "Háleth, son of Háma, my lord.“  Háleth: "The men are saying that we will not live out the night. They say that it is hopeless.“  Aragorn: "There is always hope."
  • 31. We live in a world of faith not trust!  Reiterating Dan Geer’s Cybersecurity requirements (BH 2014) 1. Mandatory reporting 2. Net neutrality 3. Source code liability 4. Strike back 5. Resiliency 6. Vulnerability finding 7. Right to Be Forgotten 8. Internet voting 9. Abandonment (open src) 10. Convergence (physical and cyber) 11. In-souring (JS) 12. Quantum technologies (JS)

Editor's Notes

  • #3: https://securityintelligence.com/media/2016-cost-data-breach-study/ http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/ https://hbr.org/2016/09/the-biggest-cybersecurity-threats-are-inside-your-company https://www.ibm.com/security/data-breach/threat-intelligence
  • #4: https://blogs.vmware.com/networkvirtualization/2015/12/time-to-build-a-zero-trust-network.html/ https://www.darkreading.com/attacks-breaches/zero-trust-the-way-forward-in-cybersecurity/a/d-id/1327827? https://www.networkworld.com/article/2218659/malware-cybercrime/forrester--trust-no-one-when-it-comes-to-it-security.html
  • #7: https://docs.microsoft.com/en-us/azure/security/azure-security-network-security-best-practices
  • #11: https://bigdatawg.nist.gov/_uploadfiles/M0007_v1_3376532289.pdf https://d1.awsstatic.com/Industries/HCLS/Resources/Real%20World%20Evidence%20Using%20AWS%20Services%20Final%20090717.pdf https://docs.microsoft.com/en-us/azure/architecture/reference-architectures/dmz/secure-vnet-hybrid
  • #13: https://www.sans.org/reading-room/whitepapers/bestprac/infrastructure-security-architecture-effective-security-monitoring-36512 https://docs.microsoft.com/en-us/azure/architecture/reference-architectures/dmz/secure-vnet-hybrid https://medium.com/aws-activate-startup-blog/architecting-your-healthcare-application-for-hipaa-compliance-part-2-ea841a6f62a7
  • #18: https://blog.gemalto.com/security/2013/04/05/complexity-is-the-worst-enemy-of-security/
  • #27: https://itspmagazine.com/from-the-newsroom/keep-calm-and-here-is-a-list-of-alarming-cybersecurity-statistics https://www.infocyte.com/blog/2016/7/26/how-many-days-does-it-take-to-discover-a-breach-the-answer-may-shock-you https://www.computerworlduk.com/security/most-data-breaches-still-discovered-by-third-parties-3615783/
  • #28: https://www.labs.hpe.com/the-machine/behind-the-machine https://www.youtube.com/watch?v=NZ_rbeBy-ms https://www.youtube.com/watch?v=5acFAMREcjM
  • #30: https://www.bleepingcomputer.com/news/security/sgxspectre-attack-can-extract-data-from-intel-sgx-enclaves/
  • #32: https://www.youtube.com/watch?v=nT-TGvYOBpI