{"id":464,"date":"2023-01-13T22:37:12","date_gmt":"2023-01-13T22:37:12","guid":{"rendered":"https:\/\/www.iterudio.com\/?p=464"},"modified":"2023-01-13T22:37:12","modified_gmt":"2023-01-13T22:37:12","slug":"authentication-least-privilege-and-zero-trust","status":"publish","type":"post","link":"https:\/\/www.iterudio.com\/?p=464","title":{"rendered":"authentication, least privilege, and zero trust"},"content":{"rendered":"\n<p>When we are discussing &#8220;network security&#8221; phrases like &#8220;authentication&#8221;, &#8220;least privilege&#8221;, and &#8220;zero trust&#8221; tend to come up. The three terms are related, and can be easily confused. <\/p>\n\n\n\n<p>I&#8217;ve been in &#8220;I.T.&#8221; for a while (the late 1980&#8217;s) &#8211; I&#8217;ve gone from an &#8220;in the field professional&#8221; to &#8220;network technician&#8221; to &#8220;the computer guy&#8221; and now as a &#8220;white bearded instructor.&#8221; <\/p>\n\n\n\n<p>Occasionally I&#8217;ve listened to other &#8220;I.T. professionals&#8221; struggle trying to explain the above concepts &#8211; and as I mentioned, they are easy to confuse. <br><br>Part of my job was teaching &#8220;network security&#8221; BEFORE this whole &#8220;cyber-security&#8221; thing became a buzzword. I&#8217;ve also had the luxury of &#8220;time&#8221; as well as the opportunity\/obligation to explain the concepts to &#8220;non I.T. professionals&#8221; in &#8220;non technical jargon.&#8221; <\/p>\n\n\n\n<p>With that said, I&#8217;m sure I will get something not 100% correct. The terms are not carved in stone &#8211; and &#8220;marketing speak&#8221; can change usage. SO in generic, non-technical jargon, here we go &#8230;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Security<\/h2>\n\n\n\n<p>First, security as a concept is always an illusion. No I&#8217;m not being pessimistic &#8211; as human beings we can never be 100% secure because it is simply not possible to have 100% of the &#8220;essential information.&#8221;<br><\/p>\n\n\n\n<p>SO we talk in terms of &#8220;risk&#8221; and &#8220;vulnerabilities.&#8221; From a practical point of view we have a &#8220;sliding scale&#8221; with &#8220;convenience and usability&#8221; on one end and &#8220;security&#8221; on the other. e.g. &#8220;something&#8221; that is &#8220;convenient&#8221; and &#8220;easy to use&#8221;, isn&#8217;t going to be &#8220;secure.&#8221; If we enclose the &#8220;something&#8221; in a steel cage, surround the steel cage with concrete, and bury the concrete block 100 feet in the ground, it is much more &#8220;secure&#8221; &#8211; but almost impossible to use.<br><br>All of which means that trying to make a &#8220;something&#8221; usable and reasonably secure requires some tradeoffs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Computer Network Security<\/h2>\n\n\n\n<p>Securing a &#8220;computer&#8221; used to mean &#8220;locking the doors of the computer room.&#8221; The whole idea of &#8220;remote access&#8221; obviously requires a means of accessing the computer remotely &#8212; which is &#8220;computer networking&#8221; in a nutshell.<\/p>\n\n\n\n<p>The &#8220;physical&#8221; part of computer networking isn&#8217;t fundamentally different from the telegraph. Dots and dashes sent over the wire from one &#8220;operator&#8221; to another have been replaced with high and low voltages representing 1&#8217;s and 0&#8217;s and &#8220;encapsulated data&#8221; arranged in frames\/packets forwarded from one router to another &#8212; but it is still about sending a &#8220;message&#8221; from one point to another.<\/p>\n\n\n\n<p>With the old telegraph the service was easy to disrupt &#8211; just cut the wire (a 19th century &#8220;denial of service&#8221; attack). Security of the telegraph message involved trusting the telegraph operators OR sending an &#8220;encrypted message&#8221; that the legitimate recipient of the message could &#8220;un-encrypt.&#8221;<br><br>Modern computer networking approached the &#8220;message security&#8221; problem in the same way. The &#8220;message&#8221; (i.e. &#8220;data&#8221;) must be secured so that only the legitimate recipients have access. <\/p>\n\n\n\n<p>There are a multitude of possible modern technological solutions &#8211; which is obviously why &#8220;network administration&#8221; and &#8220;cyber-security&#8221; have become career fields &#8212; so I&#8217;m not going into specific technologies here.<\/p>\n\n\n\n<p>The &#8220;generic&#8221; method starts with &#8220;authentication&#8221; of the &#8220;recipient&#8221; (i.e. &#8220;user&#8221;).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Authentication<\/h2>\n\n\n\n<p>Our (imaginary) 19th Century telegraph operator didn&#8217;t have a lot of available options to verify someone was who they said they were. The operator might receive a message and then have to wait for someone to come to the telegraph office and ask for the message.<\/p>\n\n\n\n<p>If our operator in New Orleans receives a message for &#8220;Mr Smith from Chicago&#8221; &#8211; he has to wait until someone comes in asking for a telegraph for &#8220;Mr Smith from Chicago.&#8221; Of course the operator had no way of verifying that the person asking for the message was ACTUALLY &#8220;Mr Smith from Chicago&#8221; and not &#8220;Mr Jones from Atlanta&#8221; who was stealing the message.<br><br>In modern computer networking this problem is what we call &#8220;authentication.&#8221; <\/p>\n\n\n\n<p>If our imaginary telegraph included a message to the operator that &#8220;Mr Smith from Chicago&#8221; would be wearing a blue suit, is 6 feet tall, and will spit on the ground and turn around 3 times after asking for the message &#8212; then our operator has a method of verifying\/&#8221;identifying&#8221; &#8220;Mr Smith from Chicago&#8221; and then &#8220;authenticating&#8221; him as the legitimate recipient.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Least Privilege<\/h2>\n\n\n\n<p>For the next concept we will leave the telegraph behind &#8211; and imagine we are going to a &#8220;popular music concert.&#8221; <\/p>\n\n\n\n<p>Imagine that we have purchased tickets to see &#8220;big name act&#8221; and the concert promoters are holding our tickets at the &#8220;will call&#8221; window.<\/p>\n\n\n\n<p>Our imaginary concert has multiple levels of seating &#8211; some seats close to the stage, some seats further away, some &#8220;seats&#8221; involve sitting on a grassy hill, and some &#8220;seats&#8221; are &#8220;all access Very Important Person.&#8221;<\/p>\n\n\n\n<p>On the day of the concert we go to the &#8220;will call&#8221; window and present our identification (e.g. drivers license, state issued ID card, credit card, etc) &#8211; the friendly attendant examines our individual identification (i.e. we get &#8220;authenticated&#8221;) and then gives us each a &#8220;concert access pass&#8221; on a lanyard (1 each) that we are supposed to hang around our necks.<\/p>\n\n\n\n<p>Next we go to the arena gate and present our &#8220;pass&#8221; to the friendly security guard. The guard examines the pass and allows us access BASED on the pass. <br><br>Personally I dislike large crowds &#8211; so MY &#8220;pass&#8221; only gives me access to the grassy area far away from the stage. Someone else might love dancing in the crowd all night, so their &#8220;pass&#8221; gives them access to the area much closer to the stage (where no one sill sit down all night). If &#8220;big recording executive&#8221; shows up, their &#8220;pass&#8221; might give them access to the entire facility.<\/p>\n\n\n\n<p>Distinguishing what we are allowed to do\/where we are allowed to go is called &#8220;authorization.&#8221;<\/p>\n\n\n\n<p>First we got &#8220;authenticated&#8221; and then we were giving a certain level of &#8220;authorized&#8221; access. <\/p>\n\n\n\n<p>Now, assume that I get lonely sitting up there on the hill &#8211; and try to sneak down to the floor level seats where all the cool kids are dancing. If the venue provider has some &#8220;no nonsense, shaved head&#8221; security guards controlling access to the &#8220;cool kids&#8221; area &#8211; then those guards (inside the venue) will check my pass and deny me entry.<\/p>\n\n\n\n<p>That concept of &#8220;only allowing &#8216;pass holders&#8217; to go\/do specifically where\/what they are authorized to go\/do&#8221; could be called &#8220;least privilege.&#8221;<\/p>\n\n\n\n<p>Notice that ensuring &#8220;least privilege&#8221; takes some additional planning on the part of the &#8220;venue provider.&#8221;<\/p>\n\n\n\n<p>First we authenticate users, then we authorize users to do something. &#8220;Least privilege&#8221; is attained when users can ONLY do what they NEED to do based on an assessment of their &#8220;required duties.&#8221;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Zero Trust<\/h2>\n\n\n\n<p>We come back around to the idea that &#8220;security&#8221; is a process and not an &#8220;end product&#8221; with the &#8220;new&#8221; idea of &#8220;zero trust.&#8221; &#8221; Well, &#8220;new&#8221; as in &#8220;increased in popularity.&#8221; <\/p>\n\n\n\n<p>Experienced &#8220;network security professionals&#8221; will often talk about &#8220;assuming that the network has been compromised.&#8221; This &#8220;assumption of breach&#8221; is really what &#8220;zero trust&#8221; is concerned.<\/p>\n\n\n\n<p> It might sound pessimistic to &#8220;assume a network breach&#8221; &#8211; but it implies that we need to be looking for &#8220;intruders&#8221; INSIDE the area that we have secured.<\/p>\n\n\n\n<p>Imagine a &#8220;secret agent movie&#8221; where the &#8220;secret agent&#8221; infiltrates the &#8220;super villain&#8217;s&#8221; lair by breaching the perimeter defense, then enters the main house through the roof.  Since the &#8220;super villain&#8221; is having a big party for some reason, out &#8220;secret agent&#8221; puts on a tuxedo and pretends to be a party guest.<br><br>Of course the super villain&#8217;s &#8220;henchmen&#8221; aren&#8217;t looking for intruders INSIDE the mansion that look like party guests &#8211; so the &#8220;secret agent&#8221; is free to collect\/gather intelligence about the super villain&#8217;s master plan and escape without notice.<\/p>\n\n\n\n<p>OR to extend the &#8220;concert&#8221; analogy &#8211; the security guards aren&#8217;t checking &#8220;passes&#8221; of individuals within the &#8220;VIP area.&#8221; If someone steals\/impersonates a &#8220;VIP pass&#8221; then they are free to move around the &#8220;VIP area.&#8221;<\/p>\n\n\n\n<p>The simplest method for an &#8220;attacker&#8221; would be to acquire a &#8220;lower access&#8221; pass, and then try to get a &#8220;higher level&#8221; pass<br><br>Again &#8211; we start off with good authentication, have established least privilege, and the next step is checking users privileges each time they try to do ANYTHING.<\/p>\n\n\n\n<p>In the &#8220;concert&#8221; analogy, the &#8220;user pass&#8221; grants access to a specific area. BUT we are only checking &#8220;user credentials&#8221; when they try to move from one area to another. To achieve &#8220;zero trust&#8221; we need to do all of the above AND we assume that there has been a security breach &#8211; so we are checking &#8220;passes&#8221; on a continual basis.<\/p>\n\n\n\n<p>This is where the distinction between &#8220;authentication and least privilege&#8221; and &#8220;zero trust&#8221; can be hard to perceive. <\/p>\n\n\n\n<p>e.g. In our concert analogy &#8211; imagine that there is a &#8220;private bar&#8221; in the VIP area. If we ASSUME that a user should have access to the &#8220;private bar&#8221; because they are in the VIP area, that is NOT &#8220;zero trust.&#8221; If users have to authenticate themselves each time they go to the private bar &#8211; then that could be &#8220;zero trust.&#8221; We are guarding against the possibility that someone managed to breach the other security measures. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Eternal vigilance<\/h2>\n\n\n\n<p>If you have heard of &#8220;AAA&#8221; in regards to security &#8211; we have talked about the first two &#8220;A&#8217;s&#8221; (&#8220;Authentication&#8221;, and &#8220;Authorization&#8221;). <\/p>\n\n\n\n<p>Along with all of the above &#8211; we also need &#8220;auditing.&#8221; <\/p>\n\n\n\n<p>First we authenticate a user, THEN the user gets authorized to do something, and THEN we keep track of what the user does while they are in the system &#8211; which is usually called &#8220;auditing&#8221;. <\/p>\n\n\n\n<p>Of course what actions we will choose to &#8220;audit&#8221; requires some planning. If we audit EVERYTHING &#8211; then we will be swamped by &#8220;ordinary event&#8221; data. The &#8220;best practice&#8221; becomes &#8220;auditing&#8221; for the &#8220;unusual&#8221;\/failure.<\/p>\n\n\n\n<p>e.g. if it is &#8220;normal&#8221; for users to login between the hours of 7:00AM and 6:00PM and we start seeing a lot of &#8220;failed login attempts&#8221; at 10:00PM &#8211; that probably means someone is doing something they shouldn&#8217;t. <\/p>\n\n\n\n<p>Deciding what you need to audit, how to gather the data, and where\/when\/how to analyze that data is a primary function of (what gets called) &#8220;cyber-security.&#8221;<\/p>\n\n\n\n<p>&#8220;Security&#8221; is always best thought of as a &#8220;process&#8221; not an &#8220;end state.&#8221; Something like &#8220;zero trust&#8221; requires constant authorization of users &#8211; ideally against multiple forms of authentication. <\/p>\n\n\n\n<p>Ideally intruders will be prevented from entering, BUT finding\/detecting intrusion becomes essential.<\/p>\n\n\n\n<p>HOW to specifically achieve any of the above becomes a &#8220;it depends&#8221; situation requiring in depth analysis. Any plan is better than no planning at all, but the best plan will be tested and re-evaluated on a regular basis &#8212; which is obviously beyond the scope of this little story &#8230;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When we are discussing &#8220;network security&#8221; phrases like &#8220;authentication&#8221;, &#8220;least privilege&#8221;, and &#8220;zero trust&#8221; tend to come up. The three terms are related, and can be easily confused. I&#8217;ve been in &#8220;I.T.&#8221; for a while (the late 1980&#8217;s) &#8211; I&#8217;ve gone from an &#8220;in the field professional&#8221; to &#8220;network technician&#8221; to &#8220;the computer guy&#8221; and [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,3,13],"tags":[],"class_list":["post-464","post","type-post","status-publish","format-standard","hentry","category-business","category-computers","category-technology-history"],"_links":{"self":[{"href":"https:\/\/www.iterudio.com\/index.php?rest_route=\/wp\/v2\/posts\/464","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.iterudio.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iterudio.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iterudio.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iterudio.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=464"}],"version-history":[{"count":0,"href":"https:\/\/www.iterudio.com\/index.php?rest_route=\/wp\/v2\/posts\/464\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.iterudio.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=464"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iterudio.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=464"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iterudio.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}