Traditional enterprise security relies on network perimeters to define and enforce network security policies. Emerging application-focused Zero Trust architectures attempt to address this long-standing challenge by moving business applications to the cloud and performing enhanced identity and access control checks within a web gateway. However, these solutions ignore the security needs of workstations, development servers, and device management interfaces. In this work, we propose Network Views (abbrev. NetViews) for least-privilege network access control where each host has a different, limited view of the other hosts and services within a network. We present an SDN-based design and demonstrate that our implementation has network latency and throughput comparable to baseline reactive forwarding. We further provide an optimization for multi-connection flows that significantly reduces both redundant access control checks and forwarding state storage in switches. As such, NetViews provides a practical primitive for removing the reliance on security perimeters within enterprise networks.
CITATION STYLE
Anjum, I., Kostecki, D., Leba, E., Sokal, J., Bharambe, R., Enck, W., … Reaves, B. (2022). Removing the Reliance on Perimeters for Security using Network Views. In Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT (pp. 151–162). Association for Computing Machinery. https://doi.org/10.1145/3532105.3535029
Mendeley helps you to discover research relevant for your work.