Access Control Policy Enforcement for Zero-Trust-Networking
Abstract
Abstract—The evolution of the enterprise computing landscape towards emerging trends such as fog/edge computing and the Industrial Internet of Things (IIoT) are leading to a change of approach to securing computer networks... [ view full abstract ]
Abstract—The evolution of the enterprise computing landscape towards emerging trends such as fog/edge computing and the Industrial Internet of Things (IIoT) are leading to a change of approach to securing computer networks to deal with challenges such as mobility, virtualized infrastructures, dynamic and heterogeneous user contexts and transaction-based interactions. The uncertainty introduced by such dynamicity introduces greater uncertainty into the access control process and motivates the need for risk-based access control decision making. Thus the traditional perimeter-based security paradigm is increasingly being abandoned in favour of a so called “zero trust networking” (ZTN). In ZTN networks are partitioned into zones with different levels of trust required to access the zone resources depending on the assets protected by the zone. All accesses to sensitive information is subject to rigorous access control based on user and device profile and context. In this paper we outline a policy enforcement framework to address many of open challenges for risk-based access control for ZTN. We specify the design of required policy languages including a generic firewall policy language to express firewall rules. We design a mechanism to map these rules to specific firewall syntax and to install the rules on the firewall. We show the viability of our design with a small proof-of-concept.
Authors
-
Romans Vanickis
(Athlone IT)
-
Paul Jacob
(Athlone IT)
-
Sohelia Deghanzadeh
(Athlone IT)
-
Brian Lee
(Athlone IT)
Topic Areas
Cyber security , Network Security
Session
Th1b » Cybersecurity I (10:30 - Thursday, 21st June, 02.016 (Ashby))
Presentation Files
The presenter has not uploaded any presentation files.