{"id":98378,"date":"2019-05-01T06:00:33","date_gmt":"2019-05-01T13:00:33","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=98378"},"modified":"2019-05-01T10:19:32","modified_gmt":"2019-05-01T17:19:32","slug":"network-layers-not-created-equal","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2019\/05\/network-layers-not-created-equal\/","title":{"rendered":"All Layers Are Not Created Equal"},"content":{"rendered":"<p>&nbsp;<\/p>\n<h3><strong><em>How the Principles of Journalism Help Define Zero Trust Policy<\/em><\/strong><\/h3>\n<p>Everyone knows that in order for a news article, blog post or white paper to have any credibility, a writer needs to cover the \u201cwho, what, where, when, why and how\u201d of the topic. Without covering these things, the reader is left with a partial story. We can credit Rudyard Kipling for clearly defining these journalistic essentials for us:<\/p>\n<p>&nbsp;<\/p>\n<p><em>I keep six honest serving-men<\/em><\/p>\n<p><em>(They taught me all I knew);<\/em><\/p>\n<p><em>Their names are What and Why and When<\/em><\/p>\n<p><em>And How and Where and Who.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>-Rudyard Kipling, <em>Just So Stories<\/em>, 1902<\/p>\n<p>&nbsp;<\/p>\n<p>However, the usefulness of this \u201cKipling Method\u201d extends far beyond journalistic best practices. For years, I have used the Kipling Method to help companies define policy and build Zero Trust networks. It ensures that security teams are thorough in their definitions and that anyone, including non-technical business executives, can understand cybersecurity policies due to the simplicity of the approach. Given that the first design principle of Zero Trust is to focus on business objectives, this method is particularly useful.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Policy at Layer 3 vs. Policy at Layer 7<\/strong><\/p>\n<p>In order to actually apply the Kipling Method and build a real Zero Trust architecture, you need to understand why it cannot be done with Layer 3 technologies.<\/p>\n<p>First, what is the difference between Layer 3 and Layer 7? Layer 3 is the layer where information is evaluated based only on IP address, port or protocol. It is severely limited by the lack of information that can be seen. IP addresses can be spoofed. Simple port scans will uncover all the open ports so that the attacker can encapsulate stolen data and exfiltrated across the open port, and the protocol is really just a metadata tag to help the administrator understand the type of traffic that is supposed to be traversing a specific port. Most importantly, ALL adversaries know how to bypass Layer 3 controls. You need to be able to define things with higher fidelity to keep your company secure.<\/p>\n<p>Layer 7 is much more specific. It is where information is evaluated based on the actual application that\u2019s being used (for example, defining Facebook as a unique application rather than traffic running across ports 80 and 443). While at Forrester, I created a five-step methodology to a Zero Trust network. The fourth step states that you need to write policy rules for your segmentation gateway based on the expected behavior of the data and the user or applications that interact with that data. This is what the Palo Alto Networks Next-Generation Firewall, serving as a <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/01\/you-want-network-segmentation-but-you-need-zero-trust\/\">segmentation gateway<\/a> in a Zero Trust environment, allows you to do, and due to the granularity of the policy, it can only be done at Layer 7.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/04\/Old-Layer-3-500x281.png\"><div style=\"max-width:100%\" data-width=\"573\"><span class=\"ar-custom\" style=\"padding-bottom:56.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\" wp-image-98379 aligncenter lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/04\/Old-Layer-3-500x281.png\" alt=\"\" width=\"573\" height=\"322\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/04\/Old-Layer-3-500x281.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/04\/Old-Layer-3-230x129.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/04\/Old-Layer-3-768x432.png 768w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/04\/Old-Layer-3-510x287.png 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/04\/Old-Layer-3-71x40.png 71w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/04\/Old-Layer-3-534x300.png 534w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/04\/Old-Layer-3.png 843w\" sizes=\"auto, (max-width: 573px) 100vw, 573px\" \/><\/span><\/div><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Applying the Kipling Method Using the Palo Alto Networks Next-Generation Firewall<\/strong><\/p>\n<p>Here\u2019s how you can apply the Kipling Method when deploying the Palo Alto Networks Next-Generation Firewall, using our revolutionary User-ID, App-ID and Content-ID technologies:<\/p>\n<ul>\n<li>User-ID becomes a <strong>WHO<\/strong> statement: \u201c<strong>Who<\/strong> is accessing a resource?\u201d<\/li>\n<\/ul>\n<p>User-ID is a Layer 7 instantiation of the approximation given by the source IP address. For example, we can grab OUs from Active Directory to pull domain users into a custom User-ID. We can then add things like multifactor authentication (MFA) or the Host Information Profile (HIP) from our GlobalProtect client to enrich the fidelity of the \u201cWho\u201d statement. We can also add MFA to a User-ID and an additional attribute for more granular control.<\/p>\n<ul>\n<li>App-ID becomes a <strong>WHAT<\/strong> statement: \u201c<strong>What<\/strong> application is being used to access the resource?\u201d<\/li>\n<\/ul>\n<p>Palo Alto Networks currently has more than 2800 published App-IDs (visit <a href=\"https:\/\/applipedia.paloaltonetworks.com\/\">Applipedia<\/a> to see the growing list) to be used in building these rules. This means that attackers can no longer use a generic application, such as web services (HTTP\/HTTPS), to bypass the security control.<\/p>\n<ul>\n<li>Content-ID becomes a <strong>HOW<\/strong> statement: \u201c<strong>How<\/strong> should the User-ID and App-ID traffic be allowed to access a resource?\u201d<\/li>\n<\/ul>\n<p>Content-ID includes Threat Prevention rules, our advanced intrusion prevention capability; SSL Decryption so that malicious traffic and stolen data can\u2019t hide inside of encrypted tunnels; URL Filtering so that users don\u2019t go to malicious or phishing domains; WildFire, our state-of-the-art sandbox technology that redefines the way malware is stopped; and our new DNS Security service, which applies predictive analytics for automated protections to thwart attacks that use DNS.<\/p>\n<p>With these three technologies defining <strong>WHO<\/strong>, <strong>WHAT<\/strong> and <strong>HOW<\/strong> statements, a basic Kipling Method Layer 7 rule can be easily defined and then implemented using our Panorama management system. Additionally, PAN-OS has the ability to add a <strong>WHEN<\/strong> statement (a time delineated rule); a <strong>WHERE<\/strong> statement, which is the location of the resource (this can often be automatically pulled into Panorama via an API); or a <strong>WHY<\/strong> statement by reading metadata from a data classification tool and using that in the rule.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"512\"><span class=\"ar-custom\" style=\"padding-bottom:56.84%;\"><img loading=\"lazy\" decoding=\"async\"  class=\" wp-image-98424 aligncenter lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-01-at-10.19.06-AM-500x284.png\" alt=\"\" width=\"512\" height=\"291\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-01-at-10.19.06-AM-500x284.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-01-at-10.19.06-AM-230x130.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-01-at-10.19.06-AM-768x436.png 768w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-01-at-10.19.06-AM-510x289.png 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-01-at-10.19.06-AM-71x40.png 71w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-01-at-10.19.06-AM-529x300.png 529w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-01-at-10.19.06-AM.png 1400w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>The Kipling method has been designed to help both business leaders and security administrators define granular, Layer 7 policies using the simple who, what, when, where, why and how methodology given to us by Rudyard Kipling. Individuals who have never considered writing firewall policy can easily understand this methodology and help define the criteria necessary to create a rule set for your segmentation gateway.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In order to build a real Zero Trust architecture, you need to understand why it cannot be done with Layer 3 technologies.<\/p>\n","protected":false},"author":391,"featured_media":86654,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,6765],"tags":[59,1156,80,4779,412,73],"coauthors":[4243],"class_list":["post-98378","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-2","category-secure-the-enterprise","tag-app-id","tag-content-id","tag-network-segmentation","tag-thought-bubble-with-john-kindervag","tag-user-id","tag-zero-trust"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/08\/thought-bubble-blog-feature-img-650x300.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/98378","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/391"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=98378"}],"version-history":[{"count":12,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/98378\/revisions"}],"predecessor-version":[{"id":98437,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/98378\/revisions\/98437"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/86654"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=98378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=98378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=98378"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=98378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}