Zero Trust Micro-Segmentation with Cisco
Zero Trust Micro-Segmentation with Cisco
Secure Workload
Journey from Baremetal to Cloud-Native Security
Jorge Quintero
Technical Marketing Engineer
14/07/2022
Understand micro segmentation
1 challenges and Secure Workload
solution approach
Learning
Mapping Zero Trust Frameworks to
Objectives 2
Secure Workload
3 Encryption
Lateral
2
Movement
1 Initial Access
4 Exfiltration
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Policy Control Challenges
Network Server/VM Cloud-Native
Security Security
Cloud Security
Security
Organizational Challenges
Multiple teams,
People
NetOps/SecOps Server/VM Admin Cloud Architect DevSecOps organizations and
environments
Process
Inconsistent islands
of policy controls
Technology
across
environments
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Application and Workload Security Transition
Secure Workload
Server/VM
Security
Server/VM Admin
Network
Security Cloud Security
NetOps/SecOps Cloud Architect
Cloud-Native
Security
DevSecOps
Application Protection
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Secure Workload – Breaking Down Silos
NetOps/SecOps DevSecOps
• Security at application
• Full visibility and control Compliance speed
• Guardrails for app-
• Full Visibility & Automation
owners
• Compliance
Discover/Define
Enforce
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Zero Trust Frameworks
and Secure Workload
Secure Workload Zero Trust Capabilities
Respond
Establish Enforce Trust- Continuously to Change
Trust Based Access Verify Trust in Trust
• Agent and agentless • Across bare metal, VMs, • New application • Policy versioning
visibility containers communications • Quarantining
• Behavior and risk • Across on-prem and • New vulnerability landscape • New policy enforcement
monitoring public cloud • Application migrations
• Automatically discovered • Across firewalls, load • Re-assessment of trust
policy balancers, security groups
• AI/ML-based grouping
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Cisco Secure Workload and NIST 800-207
Inventory a nd
Automated integration Annotations Hi erarchical, ML
✓ ServiceNow ✓ Unlimited automated a utomated, dynamic Secure Workload Secure Workload
annotations
✓ vCenter pol icy engine cluster and user segmentation
✓ Up to 32 custom
✓ AWS, Azure, GCP
✓ Kubernetes
annotations interface policies
✓ Firewalls, Load Balancers
✓ Cisco ISE & AnyConnect
✓ Infoblox Cryptography used for
✓ DNS securing agent,
workload, and cluster
communication
Industry and enterprise Role based,
compliance policies decentralized
combined with application policy Identity learned
policies administration from AD, ISE,
AnyConnect
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Zero Trust Segmentation –
Where to Start?
Zero Trust Segmentation Approaches
Common Approach: Bottom-Up Top-Down
Pick an App and do reverse-discovery Define and segment trust zones first
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Benefits of a Top-Down Segmentation Approach
• Aligns with Zero-Trust Architecture to define and Top-Down Approach
segment trust zones first
• Value realization starts faster paired with a phased
approach EMEAR
Phased
App
A
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Top-Down: Phased Approach 1
Internal
Global PolicyPolicy
Policy
Application 2
Examples:
Examples:
OT
Users
Internet Web
Internal IT
Networks HTTPS Protocol
RDPAny 443
Protocol
Protocol 3389 3
Production
Web
Internet Development
App
Internal Networks Application
SMB Protocols
AnyProtocol
Protocol
445
Phase
Phase3:
2:Application
1: Global Policy
Zone toPolicy
Zone
PCI
App
Internal OOS
Networks PCI
DBCDE
DNS SQL Protocol
Any
UDP 3306
Protocol
Protocol 53
Internal Networks AD
Internal AD Ports3389
RDP Protocol
•• Delegated
Define global
Delegated policies to (e.g
responsibility
responsibility protect
([Link]
Secure Management DenyNetworks
All
against
Team)
NetSec) high-risk protocols such
Internal
Ansible
Networks Workloads
Approved File Shares SMB
SSH Protocol
Protocol 445
22 •• Application
as RDP andpolicy
Common SMB for
policyand InfoSec
bounded
all by
workloads
• higher
policies
Definelevel
Zonespolicy
•• Define
Reduce attack
of surface
Intra-zone
Limit scope and
Application-to-
malware
restrict unused
Application
proliferation and open ports
Application-to-
• Reactive: Prevent spread of
Zone Policy
• Automatically
ransomware to generate, verify
uninfected
and enforce allow-list policy
systems
• Deny anything else
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
What is new?
Secure Workload New Features - Highlights
Agent and Agentless Micro segmentation Integrations and Ecosystem
• Azure Connector (Flow logs, tags, AKS and NSG) • FMC Domain Awareness, rule re-ordering and meaningful dynamic
• GCP Connector – GKE support objects naming
Consolidated Functionlality
Prod
Activate Connector
1 Select Capabilities
2 Roles and Settings
3 Select VNet
Activate Connector
1 Select Capabilities
2 Roles and Settings
3 Select VNet
Activate Connector
1 Select Capabilities
2 Roles and Settings
3 Select VNet
Compliance Discover/Define
Prod DEv
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Demo AWS Agentless
Enforcement
AWS Agentless Enforcement
DB
Users
Web
Proxy
Server NFS
Invoice App
Datacenter Sapphire App
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Containers
Kubernetes Cluster Native Support for GKE
Amazon Elastic
Kubernetes Service (EKS)
Azure
Kubernetes Service
(AKS)
User to Pod
(Visibility and Enforcement)
DaemonSet
Orders Queue
Pod to Pod
Payment (Visibility and Enforcement)
Users
Front-end
Catalogue
Container
runtime
OS
Pod to External Networks
(Visibility and Enforcement)
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Container Runtime NEW Containerd Support
Deprecated from
Kubernetes 1.20
container container
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
NEW Service Type Load
Service Type LB for K8s Balancer
Traffic
Load Balancer
Service
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Demo Pod-to-Pod
Enforcement
Pod-to-Pod Enforcement Sock-Shop
Service
Users Front-end
Cart
Catalogue
Payment
User
Orders
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Secure Workload Panoptica
Coverage Bare Metal, VM’s, Containers Containers, Serverless
Kubernetes All – any major K8s platform All – any major K8s platform
Deployment Architecture DaemonSet Pod-Based/Service Mesh
Micro-segmentation Micro-segmentation (BM, VM’s, Containers), Layer 3 & 4, Istio Service Mesh (Containers)
Agent & Agentless Layer 7 Enforcement
(Agentless policy enforcement for Containers in roadmap)
Firewall integration Yes (Cisco & 3rd party – i.e., AlgoSec). N/A
On prem agentless policy enforcement
Dedicated API Security N/A Inventory, OWASP API Top 10
CI/CD Integrations Yes Yes
Vulnerability Analysis VM, BareMetal Container, Serverless,
Deep at Container Image Level, SBOM, Code
Authentication
Integrations SecOps Focused Developer Focused
Primary Competitors VMware NSX, Illumio, Guardicore, Palo Alto Prisma Palo Prisma Cloud, Aqua, Sysdig, Styra, VMware (Mesh7
Cloud, Zscaler & Octarine acquisitions)
Persona Focus NetSec, SecOps, DevSecOps, Cloud Architects DevSecOps, Cloud Engineering
Readable Dynamic
Objects
Domain Awareness
Improved rule
ordering
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Demo
Secure Firewall Agentless
Enforcement
Zero Trust Segmentation for Invoice App
Sales Users
(alice)
TCP: 1936
TCP: 80,1936
TCP: 4567
TCP: 8081 TCP: 3306 TCP: 3306
Contractors
(bob)
Invoice App
IOT (Branch)
Datacenter
Developers
(chuck)
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Proactively protect applications and
1
contain lateral movement
Key Zero-Trust segmentation for agent
Takeaways 2
and agentless applications