Conference Paper
Removing the Reliance on Perimeters for Security Using Network Views
Iffat Anjum, Daniel Kostecki, Ethan Leba, Jessica Sokal, Rajit Bharambe, William Enck, Cristina Nita-Rotaru, and Bradley Reaves
Proceedings of the ACM Symposium on Access Control Models and Technologies, 2022
SDNs can provide least-privilege, zero-trust networking by implementing a concept we call “network views.”
Abstract
Traditional enterprise security relies on network perimeters to define and enforce network security policies. Emerging applicationfocused Zero Trust architectures attempt to address this longstanding challenge by moving business applications to the cloud and performing enhanced identity and access control checks within a web gateway. However, these solutions ignore the security needs of workstations, development servers, and device management interfaces. In this work, we propose Network Views (abbrev. NetViews) for least-privilege network access control where each host has a different, limited view of the other hosts and services within a network. We present an SDN-based design and demonstrate that our implementation has network latency and throughput comparable to baseline reactive forwarding. We further provide an optimization for multi-connection flows that significantly reduces both redundant access control checks and forwarding state storage in switches. As such, NetViews provides a practical primitive for removing the reliance on security perimeters within enterprise networks.
Test content.
Citation (IEEE)
I. Anjum, D. Kostecki, E. Leba, J. Sokal, R. Bharambe, W. Enck, C. Nita-Rotaru, and B. Reaves, “Removing the Reliance on Perimeters for Security Using Network Views,” in Proceedings of the ACM Symposium on Access Control Models and Technologies, 2022.
BibTeX
@inproceedings{akl+22,
author = {Anjum, Iffat and Kostecki, Daniel and Leba, Ethan and Sokal, Jessica and Bharambe, Rajit and Enck, William and Nita-Rotaru, Cristina and Reaves, Bradley},
booktitle = {Proceedings of the ACM Symposium on Access Control Models and Technologies},
date = {2022-06},
doi = {10.1145/3532105.3535029},
title = {Removing the Reliance on Perimeters for Security Using Network Views},
}