16
10/15/2018 1 Marc Rogers, VP Cybersecurity Strategy, Okta An Identity-based Approach to Protecting, Detecting, and Responding to Compromise. The DMZ Was the Perimeter Software is One Industry Employees CIOs are Technology Operators THE WORLD BEFORE The World is Changing Software is Eating the World CIOs are Business Enablers THE WORLD TODAY Partners Employees Contractors Customers

2G - Cloud Security & the Zero Trust Model PPT

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 2G - Cloud Security & the Zero Trust Model PPT

10/15/2018

1

Marc Rogers, VP Cybersecurity Strategy, Okta

An Identity-based Approach to Protecting, Detecting, and Responding to Compromise.

The DMZ Was the Perimeter

Software is One Industry

Employees

CIOs are Technology Operators

THE WORLD BEFORE

The World is Changing

Software is Eating the World

CIOs are Business Enablers

THE WORLD TODAY

Partners

Employees

Contractors

Customers

Page 2: 2G - Cloud Security & the Zero Trust Model PPT

10/15/2018

2

Enterprise Data Center

Enterprise Datacenter to Services

© Okta and/or its affiliates. All rights reserved. Okta Confidential

Cloud-Native Applications Are Dynamic and Public

Multiple Identity Providers

Organizational Identity

Professional Identity

Social Identity

National Identity

Device Identity

Partners

Employees

Contractors

Customers

Identity Store

Identity Store

Page 3: 2G - Cloud Security & the Zero Trust Model PPT

10/15/2018

3

New Use Cases + Client Types

Mobile Is the Center of Gravity for Identity for People

Identity Is the New Perimeter

http://blogs.wsj.com/cio/2015/05/11/google-moves-its-corporate-applications-to-the-internet/

“assumes that the internal network is as

dangerous as the Internet”

Page 4: 2G - Cloud Security & the Zero Trust Model PPT

10/15/2018

4

© Okta and/or its affiliates. All rights reserved. Okta Confidential 10

Customer perspective:Ron Zander, County of Placer

Ron ZanderIT Security Team

Who we are

380,000 residents2800 employees

Page 5: 2G - Cloud Security & the Zero Trust Model PPT

10/15/2018

5

Technology Strategy:As we adopt more cloud solutions….We need one secure method, to access all apps and tools

Why an IAM Solution?

Journey with Okta

Evaluation DecidingFactors

SSO

MFA

Page 6: 2G - Cloud Security & the Zero Trust Model PPT

10/15/2018

6

Transformation of IT Delivery

Identityisthenewperimeter

Manage access at the Identity Layer

17

Okta assesses device security posture before granting access to the cloud service

3

Devices connect directly to cloud service

1 Cloud service delegates to Oktafor authentication

2

Moving Forward

Page 7: 2G - Cloud Security & the Zero Trust Model PPT

10/15/2018

7

+ Okta = Connect everything

Zero Trust is giving people and systems access to the right things for the shortest time possible with little friction.

© Okta and/or its affiliates. All rights reserved. Okta Confidential 21

Network Perimeter

The “Castle and Moat” Approach To Securing The Enterprise

TRUSTED

Page 8: 2G - Cloud Security & the Zero Trust Model PPT

10/15/2018

8

© Okta and/or its affiliates. All rights reserved. Okta Confidential 22

Network Perimeter

The “Castle and Moat” Approach To Securing The Enterprise

TRUSTED UNTRUSTED

© Okta and/or its affiliates. All rights reserved. Okta Confidential

Mobile and cloud have dissolved the traditional perimeter

Result: We can no longer assume trust

PEOPLE

Employees Contractors Partners Suppliers Customers

DATA

Infrastructure Applications Platforms APIs

© Okta and/or its affiliates. All rights reserved. Okta Confidential

PEOPLE and SYSTEMS

Employees Contractors Customers Services Things

DATA

Infrastructure Applications Platforms APIs

The Perimeter Now Extends to the Identity of People and Systems.

Contextual Access

Page 9: 2G - Cloud Security & the Zero Trust Model PPT

10/15/2018

9

© Okta and/or its affiliates. All rights reserved. Okta Confidential

The Modern Enterprise In a Zero Trust WorldAuthentication

Assurance

Factors

Inactivity

Attestation

Known

Registered

Managed

Compliant

Device Trust

Conditional Access

MFA

Desktop SSO

EMM

On-Prem/Private Cloud

Access Gateway

Zero Trust: The Future of Identity + Security

The Future of Identity + Security

Page 10: 2G - Cloud Security & the Zero Trust Model PPT

10/15/2018

10

Attribute Authorities

Partner Status

Roles

Last Name

First Name

Team

Email

Phone

OSOS

VersionVersion

MDM EnrolledMDM Enrolled

Passcode ExistsPasscode Exists

Block LevelEncryptionBlock LevelEncryption

FIDO Certified

User Presence

TPM

© Okta and/or its affiliates. All rights reserved. Okta Confidential

Governance of Data and Privacy

IoT Data Actor Claim Holders Data Claims

• GPS location• Speed• Mileage• Acceleration• Battery• Radar• Temperature

Driver

Do not track my location Discard

Track Battery Usage Encrypt

Owner

Publish Battery for

StatisticsAnonymize

Different users often have different claims to data

The Future of Identity + Security

Page 11: 2G - Cloud Security & the Zero Trust Model PPT

10/15/2018

11

Assurance Decreases Over Time

Time

As

sura

nc

e

© Okta and/or its affiliates. All rights reserved. Okta Confidential

Modular Assurance

Partners

Employees

Contractors

Customers

© Okta and/or its affiliates. All rights reserved. Okta Confidential

New Models for Assurance

IdentityAssurance Level

(IAL)

Federation Assurance Level

(FAL)

AuthenticatorAssurance Level

(AAL)

NIST Special Publication 800-63-3 (Draft)

Page 12: 2G - Cloud Security & the Zero Trust Model PPT

10/15/2018

12

Modern Passwordless Authentication

AUTHENTICATOR

LOCAL ONLINE

Poor Easy

Wea

kS

tron

g

USABILITY

SE

CU

RIT

Y

Fast IDentity Online

Continuous Authentication

Time

As

su

ran

ce

Page 13: 2G - Cloud Security & the Zero Trust Model PPT

10/15/2018

13

The Future of Identity + Security

Risk Profiles

Real-Time Identity Intelligence

Humans are not able to prevent, detect and respond in this new world to

HacktivismCrimeEspionage

MischiefWarfare Terrorism

Page 14: 2G - Cloud Security & the Zero Trust Model PPT

10/15/2018

14

Risk-Based Dynamic Access Control

156 723

Risk-Based Dynamic Access Control

Customers

[email protected] IdP

The Future of Identity + Security

Page 15: 2G - Cloud Security & the Zero Trust Model PPT

10/15/2018

15

© Okta and/or its affiliates. All rights reserved. Okta Confidential

Shared Signals

Identity Provider

Connected Cloud App

Primary Email Provider

1

2

3

45

© Okta and/or its affiliates. All rights reserved. Okta Confidential

PEOPLE and SYSTEMS

Employees Contractors Customers Services Things

DATA

Infrastructure Applications Platforms APIs

Identity as the perimeter in context aware access

Contextual Access

Identity

Apps

Time

Location

Devices & Protocols

Activity

Behavioral Analytics

Risk Assessment

Adaptive Policy

Allow, Deny, or Challenge

Restrict App Scope/Actions

Alert/Report

Context-Aware Access Management

Page 16: 2G - Cloud Security & the Zero Trust Model PPT

10/15/2018

16

The Future of Identity + Security = Zero Trust

Single identity system for all your people, devices, services, & things

Attributes with authority, context, and attestation

Continuous authentication that is user-centric

Access control that is dynamic and based on risk

Shared signals across app boundaries

© Okta and/or its affiliates. All rights reserved. Okta Confidential 47

The Zero Trust journey starts with Identity

There’s no silver bullet for Zero

Trust

Okta is the modern Zero Trust Platform

Thank You