SlideShare a Scribd company logo
Zero-Trust Server Management 
Boston DevOps August 2014
Traditional server access management 
has been based on Active Directory and 
VPN / perimeter
Data center - “Chewy interior” 
Perimeter - “Crunchy exterior”
What do you do when your 
perimeter is taken away?
Service A Service B 
Service C Service D
Zero-Trust: 
No “root” privilege 
Division of systems into sub-systems 
Least privilege among all users, machines and code
Zero-Trust is the future of infrastructure 
management 
http://www.slideshare.net/mdkail/it-ops-2014-technology-roadmap
Zero trust server management - lightning
Zero trust server management - lightning
What’s the practical challenge to implement zero-trust 
auth for systems management?
Don’t try and use Active Directory 
in the cloud. It won’t work, for more reasons 
than I can list here.
Front-End Back-End 
◁ Corporate, password 
authentication 
◁ Second factor 
◁ Location-independent 
◁ Public key 
authentication 
◁ No shared keys 
◁ Integrated with security 
“zones” such as cloud 
accounts and security 
groups 
Identity hand-off
ssh 
Corporate Password Authority 
ssh 
Bastion 
Service A 
Service B 
ssh 
Public key and 
systems authz 
authority
Apply intelligent use of openssh and PAM 
◁ Public keys available as a network service 
◁ Granular authorization via PAM 
◁ Automatic audit of login/logout events
Use Bastions to create security zones 
◁ Dedicated admin bastion(s) for access to management 
services such as Chef/Puppet server, log server, Conjur 
◁ General-purpose bastions for access to everything else 
◁ Let the back-end authz system provide most of the 
access control
Zero-Trust Server Management 
Boston DevOps August 2014

More Related Content

PDF
Building A Self-Documenting Application: A Study in Chef and Compliance
PPT
Bio IT World 2015 - DevOps Security and Transparency
PPTX
SecDevOps 2.0 - Managing Your Robot Army
PPTX
Is DevOps Braking Your Company?
PPTX
The user s identities
PPTX
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...
PDF
BeyondCorp - Google Security for Everyone Else
PPTX
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
Building A Self-Documenting Application: A Study in Chef and Compliance
Bio IT World 2015 - DevOps Security and Transparency
SecDevOps 2.0 - Managing Your Robot Army
Is DevOps Braking Your Company?
The user s identities
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...
BeyondCorp - Google Security for Everyone Else
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS

What's hot (20)

PPTX
Security for cloud native workloads
PDF
BeyondCorp and Zero Trust
PPTX
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
PDF
Microsegmentation from strategy to execution
PPTX
2018 11-19 improving business agility with security policy automation final
PPTX
How to Overcome Network Access Control Limitations for Better Network Security
PDF
CSA SV Threat detection and prediction
PDF
[OPD 2019] Governance as a missing part of IT security architecture
PPTX
CSA Presentation - Software Defined Perimeter
PPTX
Technologies You Need to Safely Use the Cloud
PPTX
Jason Kent - AppSec Without Additional Tools
PDF
Dev seccon london 2016 intelliment security
PDF
Safe and Secure Applications: Deploying in a Cloud or Multi-Cloud Environment
PDF
2021 01-13 reducing risk-of_ransomware
PPTX
Stephen Sadowski - Securely automating infrastructure in the cloud
PDF
Build and enforce defense in depth - an algo sec-cisco tetration webinar
PDF
compliance made easy. pass your audits stress-free webinar
PDF
VMUGIT UC 2013 - 03b Trend Micro
PDF
BeyondCorp: Closing the Adherence Gap
PDF
Introducing a Security Feedback Loop to your CI Pipelines
Security for cloud native workloads
BeyondCorp and Zero Trust
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Microsegmentation from strategy to execution
2018 11-19 improving business agility with security policy automation final
How to Overcome Network Access Control Limitations for Better Network Security
CSA SV Threat detection and prediction
[OPD 2019] Governance as a missing part of IT security architecture
CSA Presentation - Software Defined Perimeter
Technologies You Need to Safely Use the Cloud
Jason Kent - AppSec Without Additional Tools
Dev seccon london 2016 intelliment security
Safe and Secure Applications: Deploying in a Cloud or Multi-Cloud Environment
2021 01-13 reducing risk-of_ransomware
Stephen Sadowski - Securely automating infrastructure in the cloud
Build and enforce defense in depth - an algo sec-cisco tetration webinar
compliance made easy. pass your audits stress-free webinar
VMUGIT UC 2013 - 03b Trend Micro
BeyondCorp: Closing the Adherence Gap
Introducing a Security Feedback Loop to your CI Pipelines
Ad

Similar to Zero trust server management - lightning (20)

PDF
Proven Practices for Office 365 Deployment, Security and Management
PDF
Red Hat Summit - OpenShift Identity Management and Compliance
PPTX
Hitchhiker's Guide to Azure AD - SPS St Louis 2018
PPTX
Decentralized access control with anonymous authentication of data stored in ...
PPTX
Azure Community Tour 2019 - AZUGDK
PDF
CIS13: Next Generation Privileged Identity Management: A Market Overview
PDF
Premier Webcast - Identity Management with Windows Azure AD
PPTX
Privileged Access Management (PAM)
PDF
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
PDF
SSL VPN Evaluation Guide
PDF
Webinar hiware
PDF
Why Should Organizations Secure User Access Across Borderless Workspaces?
PPTX
Secure Application Development InfoShare 2022
PPTX
Taw opening session
PPTX
Secure your Azure Web App 2019
PPT
Cloud Security Overview
PDF
ClearPass Overview
PDF
UiPath - IT Automation.pdf
PDF
UiPath - IT Automation (1).pdf
PPTX
When Your CISO Says No - Security & Compliance in Office 365
Proven Practices for Office 365 Deployment, Security and Management
Red Hat Summit - OpenShift Identity Management and Compliance
Hitchhiker's Guide to Azure AD - SPS St Louis 2018
Decentralized access control with anonymous authentication of data stored in ...
Azure Community Tour 2019 - AZUGDK
CIS13: Next Generation Privileged Identity Management: A Market Overview
Premier Webcast - Identity Management with Windows Azure AD
Privileged Access Management (PAM)
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
SSL VPN Evaluation Guide
Webinar hiware
Why Should Organizations Secure User Access Across Borderless Workspaces?
Secure Application Development InfoShare 2022
Taw opening session
Secure your Azure Web App 2019
Cloud Security Overview
ClearPass Overview
UiPath - IT Automation.pdf
UiPath - IT Automation (1).pdf
When Your CISO Says No - Security & Compliance in Office 365
Ad

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Encapsulation theory and applications.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Electronic commerce courselecture one. Pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Empathic Computing: Creating Shared Understanding
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
A Presentation on Artificial Intelligence
PDF
KodekX | Application Modernization Development
PDF
Modernizing your data center with Dell and AMD
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
cuic standard and advanced reporting.pdf
Chapter 3 Spatial Domain Image Processing.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Encapsulation theory and applications.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Electronic commerce courselecture one. Pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Reach Out and Touch Someone: Haptics and Empathic Computing
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Empathic Computing: Creating Shared Understanding
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Encapsulation_ Review paper, used for researhc scholars
A Presentation on Artificial Intelligence
KodekX | Application Modernization Development
Modernizing your data center with Dell and AMD
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
NewMind AI Weekly Chronicles - August'25 Week I
cuic standard and advanced reporting.pdf

Zero trust server management - lightning

  • 1. Zero-Trust Server Management Boston DevOps August 2014
  • 2. Traditional server access management has been based on Active Directory and VPN / perimeter
  • 3. Data center - “Chewy interior” Perimeter - “Crunchy exterior”
  • 4. What do you do when your perimeter is taken away?
  • 5. Service A Service B Service C Service D
  • 6. Zero-Trust: No “root” privilege Division of systems into sub-systems Least privilege among all users, machines and code
  • 7. Zero-Trust is the future of infrastructure management http://www.slideshare.net/mdkail/it-ops-2014-technology-roadmap
  • 10. What’s the practical challenge to implement zero-trust auth for systems management?
  • 11. Don’t try and use Active Directory in the cloud. It won’t work, for more reasons than I can list here.
  • 12. Front-End Back-End ◁ Corporate, password authentication ◁ Second factor ◁ Location-independent ◁ Public key authentication ◁ No shared keys ◁ Integrated with security “zones” such as cloud accounts and security groups Identity hand-off
  • 13. ssh Corporate Password Authority ssh Bastion Service A Service B ssh Public key and systems authz authority
  • 14. Apply intelligent use of openssh and PAM ◁ Public keys available as a network service ◁ Granular authorization via PAM ◁ Automatic audit of login/logout events
  • 15. Use Bastions to create security zones ◁ Dedicated admin bastion(s) for access to management services such as Chef/Puppet server, log server, Conjur ◁ General-purpose bastions for access to everything else ◁ Let the back-end authz system provide most of the access control
  • 16. Zero-Trust Server Management Boston DevOps August 2014