SlideShare a Scribd company logo
SEARCH GUARD
ZERO TRUSTED
NETWORKS
© 2018 floragunn GmbH - All Rights Reserved
OR: WHY PERIMETER
SECURITY IS DEAD
© 2018 floragunn GmbH - All Rights Reserved
ABOUT ME
Jochen Kressin, Co-Founder & CTO of floragunn GmbH
Makers of Search Guard
Enterprise Security Suite for Elasticsearch
Founded 2012
Main office: Berlin, Germany
Partner offices: Seattle, New York, Miami, Bordeaux
Meet us at booth #15
01.
© 2018 floragunn GmbH - All Rights Reserved
WHY THIS TOPIC?
I talk a lot to customers that are using Elasticsearch
Most of them store sensitive data inside Elasticsearch
Personally identifiable information: User- or customer data
Financial information: Transaction data
Healthcare information: Patient data
Elasticsearch does not offer security out-of-the-box
Natural question: How do you secure Elasticsearch?
Answers are scary …
02.
© 2018 floragunn GmbH - All Rights Reserved
ANSWERS
03.
Evil Internet
Sensitive Data
Elasticsearch
“It’s unprotected”
Elasticsearch
“Firewall”
Elasticsearch
“VPN and Firewall”
© 2018 floragunn GmbH - All Rights Reserved
PERIMETER SECURITY
04.
Elasticsearch
Evil Internet Firewall Loadbalancer Data Lake
HTTPS HTTPS HTTPS HTTP
“Untrusted” “Trusted Perimeter”
© 2018 floragunn GmbH - All Rights Reserved
ASSUMPTIONS
Traffic from the outside cannot be trusted
Traffic inside the perimeter can be trusted
Access to the perimeter can be controlled
Consequences
VPNs, firewalls and loadbalancers are sufficient
At any point in time, we know who has access to the data
Traffic inside the VPN does not need to be encrypted end-to-end
Performance is more important than encryption
Security breaches will be detected
05.
© 2018 floragunn GmbH - All Rights Reserved
REALITY CHECK
Does perimeter security work?
If it works, why do we still suffer from security breaches and data loss?
Data breach @ Exactis
Close to 340 million personal records leaked
Phone number, home address
Number, age and gender of children
Elasticsearch cluster publicly accessible
I don’t think this was on purpose, but a human mistake
06.
© 2018 floragunn GmbH - All Rights Reserved
WHAT HAS CHANGED?
Access control
Partners, freelancers, part-time contractors etc.
These are all potential inside threats
Locations
Remote offices
Remote workers
Devices
Laptops, smartphone, tablets
Bring your own device
07.
© 2018 floragunn GmbH - All Rights Reserved
WHAT HAS CHANGED?
Cloud computing
Cloud storage
Microservices
SaaS / PaaS / IaaS
Containerization
Docker, Kubernetes etc.
How to apply IP-based security?
Decentralized systems / clusters
Internet of things
08.
© 2018 floragunn GmbH - All Rights Reserved
WHERE IS THE PERIMETER NOW?
09.
Office
Internet
Aynwhere
Cloud Storage
SaaS
Cloud Storage
Elasticsearch
Datacenter
© 2018 floragunn GmbH - All Rights Reserved
PERIMETER SECURITY REVISITED
10.
Elasticsearch
Evil Internet Firewall Loadbalancer Data Lake
HTTPS HTTPS HTTPS HTTP
“Untrusted” “Trusted Perimeter”
© 2018 floragunn GmbH - All Rights Reserved
ZERO TRUSTED NETWORK
11.
Office
Internet
Elasticsearch
Aynwhere Datacenter
Cloud Storage
SaaS
Cloud Storage
“Untrusted”
© 2018 floragunn GmbH - All Rights Reserved
FACT CHECK
Companies do not have full control anymore
Explosion of devices and locations
Data and services are moving to the cloud
Internet of Things
Inside attacks are ever increasing
60% of attacks originated from the inside (IBM study 2016)
Attacks via social engineering
Lines between inside and outside are blurry at best
12.
© 2018 floragunn GmbH - All Rights Reserved
PARADIGM SHIFT
No traffic can be trusted
Regardless where it originates
Regardless from which device
No IP / port / application can be trusted
Cloud, containers, IoT
Traditional firewall approach flawed
No user can be trusted
Beware of inside attacks
Outside personell
13.
© 2018 floragunn GmbH - All Rights Reserved
PARADIGM SHIFT
Move security to where the data lives
No unsecured services
Not even in a VPN
No unencrypted traffic, anywhere
Not even in a VPN
Assume attackers are already in your network
Never trust, always verify
Apply least privilege strategies
Inspect and log all traffic
14.
© 2018 floragunn GmbH - All Rights Reserved
EXAMPLE: ELASTICSEARCH
15.
Search
Guard
Search
Guard
Search
Guard
Search
Guard
Node Node
TLS
Secured
TLS
Secured
RESTTRANSPORT
TLS
Secured
https://example.com:
© 2018 floragunn GmbH - All Rights Reserved
EXAMPLE: ELASTICSEARCH
16.
Any location
Any device
HTTPS
Validate certificates
Hostname verification
DNS Lookups
Authentication
Certificate revocation
TLS
Role-based access control
Least privilege approach
No defaults
RBAC
Document-level
Field-level
Filtering
Anonymization
Data Audit
Logs
Track access
Monitor anomalies
Alerting
Data Lake
Elasticsearch
© 2018 floragunn GmbH - All Rights Reserved
OPEN SOURCE / OPEN CODE
Complete Search Guard code has always been publicly accessible
Code has been audited several times
By the community
By security experts and auditors of customers
Verified by Veracode
Download, inspect, audit, compile
https://github.com/floragunncom/search-guard
https://github.com/floragunncom/search-guard-enterprise-modules
17.
© 2018 floragunn GmbH - All Rights Reserved
RESOURCES
Search Guard website
https://search-guard.com/
Documentation
https://docs.search-guard.com
Community Forum
https://groups.google.com/d/forum/search-guard
GitHub
https://github.com/floragunncom
18.
SEARCH GUARD
info@search-guard.com
© 2018 floragunn GmbH - All Rights Reserved
send us a message:
20
© 2018 floragunn GmbH - All Rights Reserved
floragunn GmbH
Tempelhofer Ufer 16
D-10963 Berlin, Germany


E-Mail: info@search-guard.com
Web: search-guard.com
Managing Directors: Claudia Kressin, Jochen Kressin

Registergericht: Amtsgericht Charlottenburg 

Registernummer: HRB 147010 B
E-Mail: info@floragunn.com
Search Guard is a trademark of floragunn GmbH, registered in the U.S. and in other countries.
Elasticsearch, Kibana, Logstash, and Beats are trademarks of Elasticsearch BV, registered in the U.S. and in other countries.
floragunn GmbH is not affiliated with Elasticsearch BV.

More Related Content

PPTX
Customer Data Privacy & Protection | Seclore
PPTX
Data Security For Insurance Solutions
PPTX
Seclore for Forcepoint DLP
PDF
Cloud Access Security Brokers - What's all the Hype
PPTX
CASB Cases: How Your Peers are Securing the Cloud
PPTX
Mcafee CASB/DLP + Seclore Rights Management Solutions
PPTX
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
PPTX
The Definitive CASB Business Case Kit - Presentation
Customer Data Privacy & Protection | Seclore
Data Security For Insurance Solutions
Seclore for Forcepoint DLP
Cloud Access Security Brokers - What's all the Hype
CASB Cases: How Your Peers are Securing the Cloud
Mcafee CASB/DLP + Seclore Rights Management Solutions
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
The Definitive CASB Business Case Kit - Presentation

What's hot (20)

PPTX
Data Security For Pharmaceutical Industry
PDF
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
PPTX
Balancing User Experience with Secure Access Control in Healthcare
PPTX
Seclore Advantage Channel Program
PDF
Hyperconverged: The Future of Data Centers Presentation
PPTX
Seclore For Spirion Data Classification | Seclore
PPTX
Cloud Data Security
PPTX
Mastering Next Gen SIEM Use Cases (Part 3)
PPTX
Understanding Global Data Protection Laws: Webinar
PPTX
Seclore Decrypter For Email
PPTX
The path to most GRC requirements
DOCX
Cyber Security Tips for Small Firms
PPTX
IRDAI Compliance & Data-Centric Security | Seclore
PPTX
Email encryption plus | Seclore
PPTX
Closing the Cloud Security Gap with a CASB (in partnership with Forrester)
PPTX
Insider Threat Protection | Seclore
PPT
C:\fakepath\wg xcs data_lossprevention
PPTX
20181110 sps leicester connect protecting your data in office 365
PPTX
securing the cloud for financial services
PPTX
Cloud Security is not equal to Cloud Data Security
Data Security For Pharmaceutical Industry
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Balancing User Experience with Secure Access Control in Healthcare
Seclore Advantage Channel Program
Hyperconverged: The Future of Data Centers Presentation
Seclore For Spirion Data Classification | Seclore
Cloud Data Security
Mastering Next Gen SIEM Use Cases (Part 3)
Understanding Global Data Protection Laws: Webinar
Seclore Decrypter For Email
The path to most GRC requirements
Cyber Security Tips for Small Firms
IRDAI Compliance & Data-Centric Security | Seclore
Email encryption plus | Seclore
Closing the Cloud Security Gap with a CASB (in partnership with Forrester)
Insider Threat Protection | Seclore
C:\fakepath\wg xcs data_lossprevention
20181110 sps leicester connect protecting your data in office 365
securing the cloud for financial services
Cloud Security is not equal to Cloud Data Security
Ad

Similar to Zero trusted networks: Why permiterer security is dead (20)

PDF
OSMC 2019 | Zero Trusted Networks – why Perimeter Security is dead by Jochen ...
PDF
Search Guard | Meetup Presentation | Security for Elasticsearch
PDF
Knowing where the safe zone is ovum october 22 2013
PDF
Practical Enterprise Security Architecture
PPTX
Remote Access Security
PDF
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
PDF
PLNOG 8: Merike Kaeo - Guide to Building Secure Infrastructures
PDF
Internet of Things (IoT) Security Measures Insights from Patents
PDF
Making Security Approachable for Developers and Operators
PDF
Security at Scale - Lessons from Six Months at Yahoo
PPSX
Zero-Trust SASE DevSecOps
PDF
Elastic Security keynote
PDF
Security Delivery Platform: Best practices
PPTX
DEVNET-1180 Security from the Cloud
PPTX
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
PDF
BeyondCorp - Google Security for Everyone Else
PPTX
Predicting The Future: Security and Compliance in the Cloud Age
PPTX
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
PDF
Search Guard Architecure | Security for Elasticsearch
PDF
Keynote: Elastic Security evolution and vision
OSMC 2019 | Zero Trusted Networks – why Perimeter Security is dead by Jochen ...
Search Guard | Meetup Presentation | Security for Elasticsearch
Knowing where the safe zone is ovum october 22 2013
Practical Enterprise Security Architecture
Remote Access Security
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
PLNOG 8: Merike Kaeo - Guide to Building Secure Infrastructures
Internet of Things (IoT) Security Measures Insights from Patents
Making Security Approachable for Developers and Operators
Security at Scale - Lessons from Six Months at Yahoo
Zero-Trust SASE DevSecOps
Elastic Security keynote
Security Delivery Platform: Best practices
DEVNET-1180 Security from the Cloud
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
BeyondCorp - Google Security for Everyone Else
Predicting The Future: Security and Compliance in the Cloud Age
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
Search Guard Architecure | Security for Elasticsearch
Keynote: Elastic Security evolution and vision
Ad

More from Jochen Kressin (6)

PDF
Elasticsearch audit logging | Search Guard
PDF
Elasticsearch JSON web token authentication | Search Guard
PDF
Elasticsearch Document- and Field-Level Security | Search Guard
PDF
Active Directory & LDAP | Security for Elasticsearch
PDF
Search Guard Configuration | Security for Elasticsearch
PDF
Search Guard Installation Quickstart | Security for Elasticsearch
Elasticsearch audit logging | Search Guard
Elasticsearch JSON web token authentication | Search Guard
Elasticsearch Document- and Field-Level Security | Search Guard
Active Directory & LDAP | Security for Elasticsearch
Search Guard Configuration | Security for Elasticsearch
Search Guard Installation Quickstart | Security for Elasticsearch

Recently uploaded (20)

PPTX
Spectroscopy.pptx food analysis technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Machine learning based COVID-19 study performance prediction
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Tartificialntelligence_presentation.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Approach and Philosophy of On baking technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Encapsulation theory and applications.pdf
PPT
Teaching material agriculture food technology
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
A Presentation on Artificial Intelligence
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Machine Learning_overview_presentation.pptx
Spectroscopy.pptx food analysis technology
Per capita expenditure prediction using model stacking based on satellite ima...
Machine learning based COVID-19 study performance prediction
MYSQL Presentation for SQL database connectivity
Tartificialntelligence_presentation.pptx
Encapsulation_ Review paper, used for researhc scholars
Approach and Philosophy of On baking technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
Encapsulation theory and applications.pdf
Teaching material agriculture food technology
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
A comparative analysis of optical character recognition models for extracting...
Accuracy of neural networks in brain wave diagnosis of schizophrenia
A Presentation on Artificial Intelligence
20250228 LYD VKU AI Blended-Learning.pptx
cuic standard and advanced reporting.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Digital-Transformation-Roadmap-for-Companies.pptx
Machine Learning_overview_presentation.pptx

Zero trusted networks: Why permiterer security is dead

  • 1. SEARCH GUARD ZERO TRUSTED NETWORKS © 2018 floragunn GmbH - All Rights Reserved OR: WHY PERIMETER SECURITY IS DEAD
  • 2. © 2018 floragunn GmbH - All Rights Reserved ABOUT ME Jochen Kressin, Co-Founder & CTO of floragunn GmbH Makers of Search Guard Enterprise Security Suite for Elasticsearch Founded 2012 Main office: Berlin, Germany Partner offices: Seattle, New York, Miami, Bordeaux Meet us at booth #15 01.
  • 3. © 2018 floragunn GmbH - All Rights Reserved WHY THIS TOPIC? I talk a lot to customers that are using Elasticsearch Most of them store sensitive data inside Elasticsearch Personally identifiable information: User- or customer data Financial information: Transaction data Healthcare information: Patient data Elasticsearch does not offer security out-of-the-box Natural question: How do you secure Elasticsearch? Answers are scary … 02.
  • 4. © 2018 floragunn GmbH - All Rights Reserved ANSWERS 03. Evil Internet Sensitive Data Elasticsearch “It’s unprotected” Elasticsearch “Firewall” Elasticsearch “VPN and Firewall”
  • 5. © 2018 floragunn GmbH - All Rights Reserved PERIMETER SECURITY 04. Elasticsearch Evil Internet Firewall Loadbalancer Data Lake HTTPS HTTPS HTTPS HTTP “Untrusted” “Trusted Perimeter”
  • 6. © 2018 floragunn GmbH - All Rights Reserved ASSUMPTIONS Traffic from the outside cannot be trusted Traffic inside the perimeter can be trusted Access to the perimeter can be controlled Consequences VPNs, firewalls and loadbalancers are sufficient At any point in time, we know who has access to the data Traffic inside the VPN does not need to be encrypted end-to-end Performance is more important than encryption Security breaches will be detected 05.
  • 7. © 2018 floragunn GmbH - All Rights Reserved REALITY CHECK Does perimeter security work? If it works, why do we still suffer from security breaches and data loss? Data breach @ Exactis Close to 340 million personal records leaked Phone number, home address Number, age and gender of children Elasticsearch cluster publicly accessible I don’t think this was on purpose, but a human mistake 06.
  • 8. © 2018 floragunn GmbH - All Rights Reserved WHAT HAS CHANGED? Access control Partners, freelancers, part-time contractors etc. These are all potential inside threats Locations Remote offices Remote workers Devices Laptops, smartphone, tablets Bring your own device 07.
  • 9. © 2018 floragunn GmbH - All Rights Reserved WHAT HAS CHANGED? Cloud computing Cloud storage Microservices SaaS / PaaS / IaaS Containerization Docker, Kubernetes etc. How to apply IP-based security? Decentralized systems / clusters Internet of things 08.
  • 10. © 2018 floragunn GmbH - All Rights Reserved WHERE IS THE PERIMETER NOW? 09. Office Internet Aynwhere Cloud Storage SaaS Cloud Storage Elasticsearch Datacenter
  • 11. © 2018 floragunn GmbH - All Rights Reserved PERIMETER SECURITY REVISITED 10. Elasticsearch Evil Internet Firewall Loadbalancer Data Lake HTTPS HTTPS HTTPS HTTP “Untrusted” “Trusted Perimeter”
  • 12. © 2018 floragunn GmbH - All Rights Reserved ZERO TRUSTED NETWORK 11. Office Internet Elasticsearch Aynwhere Datacenter Cloud Storage SaaS Cloud Storage “Untrusted”
  • 13. © 2018 floragunn GmbH - All Rights Reserved FACT CHECK Companies do not have full control anymore Explosion of devices and locations Data and services are moving to the cloud Internet of Things Inside attacks are ever increasing 60% of attacks originated from the inside (IBM study 2016) Attacks via social engineering Lines between inside and outside are blurry at best 12.
  • 14. © 2018 floragunn GmbH - All Rights Reserved PARADIGM SHIFT No traffic can be trusted Regardless where it originates Regardless from which device No IP / port / application can be trusted Cloud, containers, IoT Traditional firewall approach flawed No user can be trusted Beware of inside attacks Outside personell 13.
  • 15. © 2018 floragunn GmbH - All Rights Reserved PARADIGM SHIFT Move security to where the data lives No unsecured services Not even in a VPN No unencrypted traffic, anywhere Not even in a VPN Assume attackers are already in your network Never trust, always verify Apply least privilege strategies Inspect and log all traffic 14.
  • 16. © 2018 floragunn GmbH - All Rights Reserved EXAMPLE: ELASTICSEARCH 15. Search Guard Search Guard Search Guard Search Guard Node Node TLS Secured TLS Secured RESTTRANSPORT TLS Secured https://example.com:
  • 17. © 2018 floragunn GmbH - All Rights Reserved EXAMPLE: ELASTICSEARCH 16. Any location Any device HTTPS Validate certificates Hostname verification DNS Lookups Authentication Certificate revocation TLS Role-based access control Least privilege approach No defaults RBAC Document-level Field-level Filtering Anonymization Data Audit Logs Track access Monitor anomalies Alerting Data Lake Elasticsearch
  • 18. © 2018 floragunn GmbH - All Rights Reserved OPEN SOURCE / OPEN CODE Complete Search Guard code has always been publicly accessible Code has been audited several times By the community By security experts and auditors of customers Verified by Veracode Download, inspect, audit, compile https://github.com/floragunncom/search-guard https://github.com/floragunncom/search-guard-enterprise-modules 17.
  • 19. © 2018 floragunn GmbH - All Rights Reserved RESOURCES Search Guard website https://search-guard.com/ Documentation https://docs.search-guard.com Community Forum https://groups.google.com/d/forum/search-guard GitHub https://github.com/floragunncom 18.
  • 20. SEARCH GUARD info@search-guard.com © 2018 floragunn GmbH - All Rights Reserved send us a message: 20
  • 21. © 2018 floragunn GmbH - All Rights Reserved floragunn GmbH Tempelhofer Ufer 16 D-10963 Berlin, Germany 
 E-Mail: info@search-guard.com Web: search-guard.com Managing Directors: Claudia Kressin, Jochen Kressin
 Registergericht: Amtsgericht Charlottenburg 
 Registernummer: HRB 147010 B E-Mail: info@floragunn.com Search Guard is a trademark of floragunn GmbH, registered in the U.S. and in other countries. Elasticsearch, Kibana, Logstash, and Beats are trademarks of Elasticsearch BV, registered in the U.S. and in other countries. floragunn GmbH is not affiliated with Elasticsearch BV.