We can't find the internet
Attempting to reconnect
Something went wrong!
Hang in there while we get back on track
MRMCD2024 we know perimeter security is dead - how to get over it and where to?
Learn why perimeter security is obsolete in modern enterprises and explore practical steps toward zero-trust architecture, cloud security, and securing remote workforces.
-
Perimeter security based solely on network boundaries is no longer effective in modern enterprise environments - companies need to evolve beyond the “castle and moat” model
-
Zero-trust architecture principles are critical:
- Never trust, always verify
- Base trust on cryptographic verification rather than network location
- Implement mutual TLS with client certificates
- Assume breach and plan accordingly
-
Network segmentation recommendations:
- Break networks into smaller micro-segments
- Reduce dependencies between segments
- Implement least privilege access
- Use Bastion hosts for administrative access
- Treat company network like the internet
-
Legacy systems pose challenges:
- Old applications often depend on perimeter security
- Legacy crypto libraries may not support modern security
- Need strategies to isolate and protect legacy components
- Consider cloud migration as opportunity to modernize
-
Cloud transition considerations:
- Don’t just “lift and shift” to cloud
- Leverage cloud-native security capabilities
- Use infrastructure as code
- Implement proper identity management
- Plan for hybrid/multi-cloud environments
-
Key focus areas for modern security:
- Application security becomes critical
- Proper logging and monitoring
- Identity and access management
- Incident response planning
- Regular backup testing
-
Remote work implications:
- Physical office boundaries are disappearing
- Need to secure distributed workforce
- VPN-centric approaches don’t scale well
- Consider zero-trust network access solutions