Simeon Tassev, MD and QSA at Galix .
Following the Covid-19 pandemic, many businesses restructured their entire office strategy by locking or reducing their office footprint, others introducing hot desk policies and some going completely remote.
This shift brings with it a variety of elements as well as challenges in terms of security. Policies and processes must be adapted, and controls need to become software-based to cater to a world where people are empowered to work from anywhere. The Secure Access Service Edge (SASE) is built on a zero-trust approach that requires all connecting devices to meet the criteria as defined by security policies and have the right levels of authentication. This framework offers an effective solution to security challenges faced today and in the future.
THE EDGE IS GROWING
The traditional approach of boundary protection with remote access becomes increasingly cumbersome and ineffective as the edge grows and boundaries become more amorphous. Environments need to open up to allow for an increased workforce of people who are not necessarily working from within the corporate physical
location.
A more flexible and scalable approach is needed, but at the same time, security needs to be tighter than ever. To facilitate current and future workforce requirements, enterprises need to ensure that all endpoints and connections are managed with consistent policies regardless of location.
The work-from-anywhere business model creates greater edge computing and changes network access needs, as more users, devices and applications become located outside of the corporate enterprise. Locking down the perimeter is no longer effective or even possible and doing so negatively impacts business efficiency. A different approach is essential to facilitate today’s dynamic access requirements.
TRUST IS EARNED
SASE starts from a base of zero trust. This means that, by default, all devices are untrusted. To earn trust and gain access, policies need to be applied and criteria met, such as various levels of authentication that must be implemented.
To do this, agents are loaded onto endpoint devices, which connect with the SASE system and receive the relevant levels of access and permissions to enable the connection. It allows businesses to facilitate a remote or hybrid workforce using public infrastructure, while still applying corporate security policies consistently and
homogenously.
The work-from-anywhere business model creates greater edge computing and changes network access needs, as more users, devices and applications become located outside of the corporate enterprise.
Using a SASE framework ensures more effective management, as policies and access controls are applied consistently regardless of device or location. This is also more secure because it is homogenous and leaves no room for error with regard to policy implementation. Using this type of network design places enterprises in a
more effective position to manage the complex workforce setup that the ‘new norm’ has created.
ENSURING EFFECTIVENESS
The first step in effectively implementing a SASE framework is to understand, from an architectural perspective, how it will function. An assessment is therefore required of the applications that are in place, what is required to access them, and where they need to be accessed from in order for employees to perform their jobs. Businesses need to map what users need to connect to and where. Only once this is understood can the relevant controls be put into place, and technology implemented to enforce and police these controls. Furthermore, this updates the permissions required along with access controls and authentication.
THE RIGHT PARTNER IS KEY
Technology is a crucial tool in facilitating a zero-tolerance network approach, as it is impossible to enforce controls otherwise, but choosing the right tool and customising it effectively can prove challenging. The most appropriate technology solution depends on the architecture and specific requirements of an enterprise. The right security partner can ensure that technology, access and strategies are linked to the particular needs of the enterprise and design a solution to suit. Risk mitigation is the key, and an effective partner can help businesses to navigate the unchartered waters of the current environment and position to meet future changes with greater ease.