MRMCD2024 we know perimeter security is dead - how to get over it and where to?

Learn why perimeter security is obsolete in modern enterprises and explore practical steps toward zero-trust architecture, cloud security, and securing remote workforces.

Key takeaways
  • Perimeter security based solely on network boundaries is no longer effective in modern enterprise environments - companies need to evolve beyond the “castle and moat” model

  • Zero-trust architecture principles are critical:

    • Never trust, always verify
    • Base trust on cryptographic verification rather than network location
    • Implement mutual TLS with client certificates
    • Assume breach and plan accordingly
  • Network segmentation recommendations:

    • Break networks into smaller micro-segments
    • Reduce dependencies between segments
    • Implement least privilege access
    • Use Bastion hosts for administrative access
    • Treat company network like the internet
  • Legacy systems pose challenges:

    • Old applications often depend on perimeter security
    • Legacy crypto libraries may not support modern security
    • Need strategies to isolate and protect legacy components
    • Consider cloud migration as opportunity to modernize
  • Cloud transition considerations:

    • Don’t just “lift and shift” to cloud
    • Leverage cloud-native security capabilities
    • Use infrastructure as code
    • Implement proper identity management
    • Plan for hybrid/multi-cloud environments
  • Key focus areas for modern security:

    • Application security becomes critical
    • Proper logging and monitoring
    • Identity and access management
    • Incident response planning
    • Regular backup testing
  • Remote work implications:

    • Physical office boundaries are disappearing
    • Need to secure distributed workforce
    • VPN-centric approaches don’t scale well
    • Consider zero-trust network access solutions