Zero Trust Explained | Real World Example

CertBros
17 Oct 202321:46

Summary

TLDRThe video script delves into the concept of Zero Trust, emphasizing it's not a product but a security framework aiming to 'never trust, always verify.' It contrasts traditional perimeter-based security with the modern challenges posed by cloud computing and user-owned devices. The script introduces Twingate as a practical tool for implementing Zero Trust Network Access (ZTNA), showcasing how it verifies users, enforces least privilege access, and assumes potential breaches, ultimately enhancing security for remote and diverse work environments.

Takeaways

  • 🛡️ Zero Trust is not a single product but a security framework that involves continuous authentication, authorization, and assessment of every user and device.
  • 🏰 Traditional perimeter-based security has been challenged by the rise of cloud computing, web apps, and remote working, necessitating a new approach like Zero Trust.
  • 🔒 The core principle of Zero Trust is 'Never Trust, Always Verify', treating all users and devices the same regardless of their location or network.
  • 📋 Implementing Zero Trust involves a variety of technologies, products, and policies that align with its principles, such as multi-factor authentication and device compliance checks.
  • 👥 Zero Trust addresses issues like user-owned devices and lateral movement in networks, ensuring that even if an attacker breaches one point, they don't have access to everything.
  • 🔑 Least Privilege is a key aspect of Zero Trust, ensuring users, applications, or devices have only the permissions necessary to perform their tasks.
  • 🕊️ The concept of 'Assume Breach' in Zero Trust means planning defenses with the expectation that systems may be compromised, focusing on minimizing damage.
  • 🧩 Network and user segmentation are part of the breach minimization strategy, reducing the impact of any potential security breach by limiting access areas.
  • 📡 Twingate is highlighted as a tool that exemplifies Zero Trust Network Access (ZTNA), providing in-depth verification and least privileged policies for secure remote access.
  • 🔄 Twingate's setup process demonstrates how to implement Zero Trust principles practically, including defining resources, deploying connectors, and setting client access.
  • 🔒 Twingate allows for detailed device security requirements, such as mandatory screen locks and antivirus software, enhancing the verification process for connecting devices.

Q & A

  • What is the zero trust security concept?

    -Zero trust is a security framework that operates on the principle of 'Never Trust, Always Verify'. It requires continuous authentication, authorization, and assessment of every user and device, regardless of whether they are inside or outside the network perimeter.

  • Why is zero trust not a single product or technology?

    -Zero trust is not a single product because it is a comprehensive security architecture that needs to be built over time using various technologies, products, and policies to ensure a robust security posture.

  • What is the problem with traditional perimeter-based security in the context of modern challenges like cloud computing and remote working?

    -Traditional perimeter-based security struggles with modern challenges because it assumes all internal network traffic is safe once past the perimeter. However, with cloud computing and remote working, access to resources can come from anywhere, and perimeter security does not effectively verify the security of the access or the identity of the user/device requesting access.

  • What is the concept of 'least privilege' in zero trust?

    -The principle of least privilege in zero trust means providing only the minimum level of access necessary for a user or device to perform its required tasks. This minimizes the risk of unauthorized access and potential damage in case of a security breach.

  • How does the zero trust model address the issue of lateral movement in a network?

    -Zero trust addresses lateral movement by ensuring that even if an attacker gains access to one point in the network, they do not automatically have access to other resources. Each access request is verified and authorized individually, preventing the spread of an attack.

  • What is the role of multi-factor authentication (MFA) in the zero trust framework?

    -Multi-factor authentication (MFA) plays a crucial role in the zero trust framework by adding an additional layer of security during the verification process. It ensures that the user is who they claim to be by requiring more than one form of identification before granting access.

  • What is the purpose of network segmentation in the context of zero trust?

    -Network segmentation in zero trust is used to divide a network into smaller sections, which helps to reduce the blast radius of a potential breach. By limiting the scope of access, the damage an attacker can cause is minimized if they manage to compromise a segment.

  • Can you explain the term 'Just in Time' access in zero trust?

    -Just in Time (JIT) access in zero trust refers to a practice where access to resources is granted only when needed and for the shortest period necessary. Once the task is completed, the access is revoked, reducing the window of opportunity for potential attacks.

  • How does Twingate implement zero trust network access (ZTNA)?

    -Twingate implements zero trust network access by providing in-depth verification, least privilege policies, and secure remote access to corporate resources. It allows users to access specific resources securely from anywhere, ensuring that access is tightly controlled and aligned with zero trust principles.

  • What is the significance of the 'assume breach' mentality in zero trust?

    -The 'assume breach' mentality is a proactive approach in zero trust that acknowledges the possibility of a system being compromised. By planning for potential breaches, organizations can implement measures to detect, respond, and limit the impact of such incidents effectively.

  • How does Twingate ensure that only secure devices can connect to a resource?

    -Twingate ensures device security by allowing administrators to set minimum device requirements, such as requiring a screen lock, antivirus software, and encryption. Devices that do not meet these criteria are not allowed to connect, adding an extra layer of security to the access control process.

Outlines

00:00

🛡️ Introduction to Zero Trust Security Concept

This paragraph introduces the concept of Zero Trust, emphasizing that it is not a single technology, product, or protocol but a security framework. The goal of Zero Trust is to continuously authenticate, authorize, and assess every user and device, rather than relying on traditional perimeter-based security. The sponsor, Twin Gate, is introduced as a tool that supports Zero Trust principles by offering secure remote access with advanced user authentication and minimal access rights based on the security health of the device.

05:00

🏰 Challenges to Traditional Perimeter Security

The paragraph discusses the limitations of traditional perimeter-based security, which is likened to a medieval castle. It explains how the rise of cloud computing, web applications, and remote working have challenged this model, as these new ways of working require access to resources from various locations and devices. The paragraph also highlights issues such as user-owned devices, lateral movement within networks, and the increased risks posed by the pandemic, which necessitated a shift towards a new security approach, namely Zero Trust.

10:01

🔒 Core Principles of Zero Trust Implementation

This paragraph delves into the core principles of Zero Trust, starting with the principle of 'Never Trust, always verify,' which means that continuous verification is required regardless of the user's location or the device being used. It also covers the principle of least privilege, which involves granting only the necessary access to users, applications, or devices. Additionally, the paragraph introduces the concept of assuming a breach, which involves planning defenses to limit the impact of potential security breaches, including system segmentation and real-time threat response.

15:02

🌐 Setting Up Zero Trust with Twingate ZTNA

The paragraph provides a practical guide on implementing Zero Trust using Twingate, a Zero Trust Network Access (ZTNA) solution. It outlines the process of setting up a network, creating resources with specific access controls, and deploying a connector to enable secure access. The example given involves accessing a home NAS drive remotely while applying Zero Trust principles such as verification, device compliance, and least privilege access.

20:05

🔓 Enhancing Security with Device Compliance Checks

This paragraph focuses on enhancing security by setting device compliance requirements before allowing connections. It describes how Twingate can be used to ensure that devices meet certain security criteria, such as having a screen lock, antivirus software, and encryption. The paragraph also demonstrates how to adjust settings to allow or restrict access based on these compliance checks, thereby adding an extra layer of protection to the Zero Trust implementation.

📚 Conclusion and Call to Action on Zero Trust

The final paragraph concludes the video script by summarizing the importance of Zero Trust as a security concept that involves implementing various security policies and tools. It encourages viewers to try out Twingate for their own Zero Trust implementation and to engage with the content by liking, commenting, and subscribing. The paragraph also thanks Twingate for sponsoring the video and provides a link for viewers to start their free Twingate account.

Mindmap

Keywords

💡Zero Trust

Zero Trust is a security concept that emphasizes the principle of 'never trust, always verify.' It is not a single product but a framework that requires continuous authentication, authorization, and assessment of every user and device. In the video, Zero Trust is presented as a solution to the challenges posed by modern working environments, such as cloud computing and remote work, which have made traditional perimeter-based security models obsolete.

💡Cyber Crime

Cyber Crime refers to criminal activities that are conducted through the internet, computer systems, or computer networks. The video mentions Zero Trust as a critical measure to protect against cyber crime, highlighting the importance of robust security frameworks in the digital age, especially given the increasing reliance on online services and remote work.

💡Perimeter-based Security

Perimeter-based Security is a traditional network security model that focuses on securing the network's boundaries with firewalls and other access control mechanisms. The script contrasts this with Zero Trust by describing how perimeter-based security assumes trust within the network, which can be exploited through lateral movement if an attacker breaches the perimeter.

💡Lateral Movement

Lateral Movement in cybersecurity refers to the ability of an attacker to move within a network, often from one compromised device to another, after initial access has been gained. The video script explains how one of the problems with perimeter-based security is the risk of lateral movement, which Zero Trust aims to mitigate by not trusting any internal or external access.

💡Cloud Computing

Cloud Computing is the delivery of computing services, including servers, storage, databases, networking, software, analytics, and intelligence, over the internet. The script discusses how the rise of cloud computing, along with web applications, has challenged traditional security models by allowing access from any device and location, necessitating a shift towards Zero Trust principles.

💡Multi-Factor Authentication (MFA)

Multi-Factor Authentication (MFA) is a security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity for a login or other transaction. In the context of the video, MFA is mentioned as part of the verification process within the Zero Trust framework, adding an extra layer of security.

💡Least Privilege

Least Privilege is a security principle that restricts access rights for users to the minimum permissions they need to perform their work. The video script explains that within the Zero Trust model, the principle of least privilege is crucial to ensure that users, applications, or devices are only given the permissions necessary to perform their tasks, reducing the risk of unauthorized access.

💡Breach Assumption

Breach Assumption is the mindset that systems will be breached at some point, and security measures should be designed with this inevitability in mind. The video script discusses this concept as part of the Zero Trust approach, emphasizing the importance of planning defenses and having measures in place to detect and respond to breaches.

💡Twin Gate

Twin Gate is mentioned as a sponsor of the video and is described as a tool that offers easy, highly configurable remote access to networks using advanced user authentication. It is presented as an example of a practical application of Zero Trust principles, particularly in the context of providing secure access to resources like a home NAS drive.

💡Zero Trust Network Access (ZTNA)

Zero Trust Network Access (ZTNA) is a term used to describe a specific application of Zero Trust principles to network access, ensuring that only verified and authorized users can access specific network resources. The script uses Twin Gate as an example of a ZTNA solution, demonstrating how it can be used to secure access to a home network and apply the principles of Zero Trust.

Highlights

Zero trust is not a new technology, protocol, or product, but a security concept or framework.

The goal of zero trust is to continuously authenticate, authorize, and assess every user and device.

Twin Gate is introduced as a sponsor, offering advanced user authentication for remote access.

Traditional network security, known as perimeter-based security, is facing challenges due to cloud computing and web apps.

The zero trust model removes trust in users, devices, and networks, following the principle 'Never Trust, always verify'.

Verification in zero trust includes checking credentials, device security health, and location of the request.

Zero trust requires dynamic and continuous verification for every request to prevent hackers from exploiting open sessions.

The principle of least privilege ensures that users, applications, or devices have only the permissions necessary to perform tasks.

Just enough access and Just in Time access are examples of implementing least privilege in zero trust.

A breach assumption mindset in zero trust involves planning defenses for potential system breaches.

Network and user role segmentation are strategies to reduce the impact of a potential breach.

Implementing zero trust involves a range of tools and policies, not just a single solution.

Twin Gate's zero trust network access (ZTNA) provides in-depth verification and least privileged policies for secure access.

Twin Gate is free for up to five users, suitable for home networks and small teams.

A step-by-step guide on setting up Twin Gate for zero trust access to a home NAS drive is provided.

Twin Gate allows for detailed access control, such as specifying IP addresses and ports for a resource.

The video demonstrates accessing a NAS drive remotely using Twin Gate while enforcing zero trust principles.

Twin Gate can enforce device security requirements, such as mandatory screen locks and antivirus installations.

The video concludes with an invitation to try Twin Gate for implementing zero trust and securing network connections.

Transcripts

play00:00

what is zero trust well that depends

play00:03

who's asking zero trust is critical to

play00:06

protect us from hackers and cyber crime

play00:08

in the modern world before we talk about

play00:10

what zero trust is let's start by

play00:13

talking about what zero trust is not it

play00:16

is not a piece of new technology it is

play00:19

not a protocol it is not a product that

play00:21

you go out you buy you set up and

play00:24

suddenly you have zero trust now it's

play00:26

better to describe zero trust as a

play00:28

security concept or a framework the goal

play00:32

is to trust nothing instead we must

play00:35

continuously authenticate authorize and

play00:38

assess every user and every device zero

play00:42

trust is achieved using a mixture of

play00:45

security policies and the right security

play00:47

tools and speaking of tools let me say a

play00:50

big thank you to our sponsor of this

play00:52

video twin gate twin gate offers super

play00:55

easy highly configurable remote access

play00:58

to your home or business Network work

play01:00

using Advanced user authentication

play01:02

limiting users to just what's needed and

play01:05

assessing the security Heth of your

play01:07

device makes twin gate a great tool for

play01:10

our zero trust Arsenal we'll talk more

play01:12

about this later and I'll show you how

play01:14

you can get started implementing your

play01:16

own zero trust using twin gate by the

play01:19

way it's not going to cost you anything

play01:22

okay so to fully understand the problem

play01:24

that zero trust solves we need to go

play01:26

back a few years a traditional Network

play01:29

looks something in like this we have our

play01:32

computers our servers and our

play01:34

applications sitting inside our Network

play01:38

these are all protected from the outside

play01:39

world by our routers and our firewalls

play01:42

this is called perimeter based security

play01:46

because all of these devices are owned

play01:48

by the business and connected to the

play01:50

same network we can control them using

play01:52

things like group policy for

play01:54

configuration or active directory for

play01:57

authentication and our firewalls control

play01:59

which traffic traffic is allowed in and

play02:01

out we can even control the physical

play02:04

access to the devices and the

play02:06

infrastructure by controlling who has

play02:08

access to the buildings or the server

play02:10

rooms we use things like ID cards and

play02:13

passcodes we call this The Trusted

play02:15

Network because we have complete control

play02:18

over these devices everything on the

play02:21

outside however which we don't control

play02:24

this is called the untrusted network

play02:28

people often use the analogy of a

play02:30

medieval castle to describe this

play02:32

approach the castle protects everything

play02:35

inside from the outside attackers with

play02:37

high walls and Moes now this setup

play02:40

worked well for a long time however the

play02:44

idea of perimeter security has been

play02:46

facing challenges in recent years some

play02:49

of these challenges that businesses are

play02:51

facing are cloud computing and web apps

play02:54

now most businesses are using a

play02:56

combination of web applications and

play02:58

cloud computing Services these

play03:01

applications and services can be

play03:03

accessed from anywhere on any device

play03:06

remote working users are not always in

play03:09

the physical office Network sometimes

play03:12

they're working from home in a coffee

play03:14

shop or any other public Wi-Fi how do we

play03:17

then provide access to the resources the

play03:19

user needs while still ensuring they're

play03:22

using a safe connection and how can we

play03:24

ensure they actually are in fact who

play03:27

they say they are user owned devices

play03:30

users are not always using company-owned

play03:33

devices users may want to use their own

play03:36

phones or tablets or laptops to connect

play03:38

to the corporate data and services well

play03:41

then how do we ensure that these devices

play03:43

are free from malware and secure enough

play03:46

to access our company resource and one

play03:49

of the biggest problems with

play03:51

perimeter-based security is something

play03:53

called lateral movement if an attacker

play03:56

can find just one weakness in the

play03:58

perimeter and get access access then the

play04:01

explicit trust gives the attacker access

play04:03

to the other resources within the

play04:05

network all of these problems have

play04:07

gradually been increasing in recent

play04:09

years however the pandemic skyrocketed

play04:13

these and it was clear that the

play04:14

traditional perimeter security approach

play04:16

was no longer able to protect this new

play04:19

way of working so a new solution needed

play04:22

to be found and this brings us to zero

play04:25

trust now I've said this already but

play04:27

zero trust is not a single product that

play04:29

can be implemented overnight it's a

play04:32

security architecture that needs to be

play04:34

built over time using different

play04:36

Technologies products and policies many

play04:40

security vendors have their own approach

play04:42

to zero trust and how it can be

play04:44

implemented but I'm going to be talking

play04:46

about some of the core principles that

play04:48

make up zero trust and then we're going

play04:50

to get handson with a real world example

play04:54

at its core zero trust does exactly what

play04:57

it says on the tin it removes all trust

play05:00

in users devices and networks a phrase

play05:04

often used to describe this is Never

play05:07

Trust always verify it doesn't matter if

play05:11

you're sitting in a coffee shop at home

play05:13

or in the office behind company

play05:15

firewalls you are treated exactly the

play05:18

same you are only trusted once you can

play05:21

prove otherwise now I like to call this

play05:24

guilty until proven innocent now the way

play05:28

to prove your innocence is to be

play05:30

verified this is done based on several

play05:32

factors including things like

play05:34

credentials the device being used and

play05:37

the location of the request for example

play05:41

let's say you want to access a company

play05:43

resource before your request is granted

play05:46

your credentials will be checked to

play05:48

ensure you are who you say you are you

play05:51

may then be prompted for an MFA this is

play05:54

all pretty standard stuff but then we

play05:56

can go further by checking things like

play05:59

the the security health of your device

play06:02

this could include checking that the

play06:03

operating system is up to date and that

play06:06

endpoint protection is installed your

play06:08

geolocation could also be looked at

play06:11

maybe only requests from certain

play06:13

countries will be accepted countries

play06:16

where the business only operates in for

play06:18

example several of these checks can be

play06:20

made before you are verified the key

play06:23

Point here though is even if you pass

play06:26

verification once that does not

play06:29

automatically mean you are trusted a key

play06:33

part of zero trust is that every request

play06:36

should be continuously and dynamically

play06:39

verified every single time this stops

play06:42

Hackers from taking advantage of things

play06:44

like open sessions and trusted access

play06:48

okay as the name suggested zero trust is

play06:51

all about removing all trust from every

play06:54

request but there is more to it than

play06:56

that the next principle is that of least

play07:00

privilege now least privilege means only

play07:03

providing the minimum level of privilege

play07:06

needed to do a task seems pretty obvious

play07:10

right well this is often easier said

play07:13

than done implementing this in

play07:15

applications and services not designed

play07:18

for zero trust can sometimes be tricky

play07:21

as humans we also want to be as helpful

play07:24

as possible often giving much more

play07:26

access to users than needed or giving

play07:29

access temporarily and never actually

play07:31

removing it this is a weakness and the

play07:34

attackers do take advantage of this a

play07:37

common example of giving too much

play07:39

privilege is when all users have local

play07:42

admin rights this is great for the user

play07:44

because they can install applications

play07:46

run tasks that require permissions all

play07:49

without interruption however this also

play07:52

means that malware or hackers using this

play07:54

account have much more access to the

play07:57

device this is great for hackers but

play07:59

it's bad news for us with the right

play08:02

tools and policies in place we can

play08:04

ensure that any user application or

play08:07

device only has the permissions required

play08:09

to do what's needed and not a single bit

play08:13

more an example of this is something

play08:16

called just enough access this is where

play08:19

we provide only the necessary access

play08:21

required for a job there's also

play08:23

something called Just in Time access

play08:26

this is where we can provide access to

play08:28

resources such as virtual machines only

play08:31

for a set amount of time once this time

play08:33

is up the access is then removed the

play08:36

last principle of zero trust that we

play08:38

will discuss is a sum breach now this

play08:41

means that we're not just trying to stop

play08:43

cyber attacks but we're going to assume

play08:46

that the systems will be breached at

play08:48

some point if they haven't already by

play08:50

taking this mindset we can start to plan

play08:52

our defenses for if the worst should

play08:55

happen the first thing to do is segment

play08:57

our systems to reduce reduce the blast

play09:00

radius what this means is we reduce the

play09:03

Damage Done if an attacker is able to

play09:06

get access we can reduce the area of a

play09:09

network they can access by using network

play09:12

segmentation and we should also use user

play09:15

Bas segmentation to limit the scope of

play09:17

the credentials as well as reducing the

play09:20

blast radius we must Implement measures

play09:22

to detect and respond to these breaches

play09:26

we must ensure we have the tools to

play09:28

provide visibility

play09:29

and the tools and services to respond to

play09:32

threats in real time okay so we now know

play09:35

the theory behind zero trust and why

play09:37

it's so important but how do we actually

play09:40

start to implement this stuff well as

play09:42

mentioned at the start of this video

play09:44

complete zero trust cannot be achieved

play09:47

with just a single tool or service you

play09:49

need a range of tools and policies to

play09:52

implement zero trust but let me give you

play09:54

a real world example so you can get

play09:56

Hands-On with some zero trust tools

play09:59

the tool we're going to be looking at is

play10:01

called twingate which provides something

play10:03

called zero trust network access also

play10:06

known as

play10:07

ztna zero trust network access provides

play10:11

everything we've already spoken about

play10:13

in-depth verification and least

play10:15

privileged policies for your users who

play10:17

need access to the corporate resources

play10:19

now don't worry because twin gate is

play10:21

completely free for up to five users

play10:24

which is more than enough for your home

play10:26

networks and for small teams so here is

play10:29

my home network in my network I have a

play10:32

Nas or network attached storage this NAS

play10:36

Drives hold all of my video files I want

play10:39

to be able to access this Nash drive

play10:41

from anywhere I could be at home in a

play10:44

coffee shop or on the road I need to be

play10:46

able to access my Nash Drive I also have

play10:49

an editor called Peter and I may want

play10:52

Peter to access my Nash drive as well

play10:55

now of course I could use a simple VPN

play10:57

to do this however I want to implement

play10:59

the zero trust principles of

play11:02

verification device compliance and least

play11:04

privileged twin gate makes this super

play11:07

simple to do so let's get this set up

play11:10

now the first thing we need to do is go

play11:12

over to tate.com and set up a free

play11:16

account just go over to try twin gate

play11:18

for free once we've done that and signed

play11:21

in it's just a simple three-step process

play11:24

we need to set up a network set up a

play11:27

connector and then install the client so

play11:30

first we need to set up a network we'll

play11:33

hit the add remote Network button this

play11:36

is the network we want remote access to

play11:40

so as we can see we have options for the

play11:42

three major Cloud providers AWS aure and

play11:46

Google Cloud but in my case I'm going to

play11:49

select on premise Because by the Nash

play11:51

drives at my house so we select on

play11:54

premise and then we're going to give it

play11:56

a name so I'm going to go with home cuz

play12:00

it's my home network then hit add remote

play12:04

Network and just like that we have our

play12:07

first network but it's currently empty

play12:09

but don't worry we are going to fix that

play12:11

and this is where we Implement our first

play12:14

bit of zero trust instead of giving

play12:17

access to the entire network here I'm

play12:19

going to specify exactly what can be

play12:22

accessed and we do that using a resource

play12:25

so I'm going to click create resource

play12:27

then I'll give it a name this is going

play12:29

to be my Nas and then I'm going to give

play12:32

it the IP address the IP address for my

play12:35

NAS drive is

play12:38

192.168.1 187 not only am I going to

play12:41

restrict the IP address but I'm also

play12:43

going to restrict the ports that can be

play12:45

used to access my NAS drive so I'll do

play12:48

that by clicking ports and for TCP I'm

play12:52

going to allow Port 5000 which is the

play12:56

port for the web admin and I'm going to

play12:58

allow the port number

play12:59

445 this is for SMB which will allow me

play13:02

to access the files

play13:04

remotely then I'll just disable UDP and

play13:08

I'll disable icmp as well so here's my

play13:11

IP address here are the only ports that

play13:13

you can access it on and then I'll click

play13:16

create

play13:17

resource you're then asked to select

play13:19

which users will have access by default

play13:21

you have an everyone's group and it's

play13:23

just me so I'll select that and hit the

play13:26

add button okay so now we have our

play13:28

Network and our resource defined we now

play13:31

need to deploy a connector this

play13:33

connector sits somewhere in the network

play13:35

and is what makes the connection

play13:36

possible so to deploy the connector I

play13:39

just have to click on one of these

play13:41

interestingly named connectors on the

play13:43

left hand side so I'll go with Classy

play13:45

bobcat and then we're taken to the

play13:47

deployment page as we can see we have

play13:50

tons of different options to deploy the

play13:52

connector all are pretty straightforward

play13:54

but to be honest the easiest one is

play13:56

going to be Docker so that's the one

play13:58

I'll select s I'll click Docker and then

play14:01

all we need to do is generate some

play14:02

tokens so I'll scroll down hit the

play14:05

generate tokens button of course we have

play14:07

to authenticate remember verify

play14:11

everything so we'll relog in and once

play14:14

generated the tokens will be added to

play14:16

the command at the bottom now all we

play14:19

need to do is run this command on some

play14:21

type of machine now this could be a

play14:23

computer you have lying around the house

play14:25

windows or Linux it doesn't matter it

play14:27

could be a raspberry Pi or it could even

play14:30

be the NAS drive itself assuming it

play14:32

supports Docker in my case I'm going to

play14:34

use a virtual Ubuntu machine so I'll

play14:38

pull up that machine

play14:40

here log in and all I have to do is open

play14:43

up a

play14:46

terminal the first command to run is

play14:48

pseudo

play14:50

a update and this will go through

play14:53

looking to update all of your

play14:57

packages then the next next command is

play15:00

pseudo

play15:02

a

play15:04

install docker.io

play15:06

now this command will install Docker on

play15:10

the virtual machine again this will only

play15:12

take a minute to go

play15:15

through once done we just need to take

play15:18

that command from Twin gate and paste it

play15:20

into here but do not forget to type

play15:24

pseudo before you copy it all it will

play15:27

probably fail so go back to Twin gate

play15:31

click the copy command button go back to

play15:33

our virtual

play15:35

machine and paste that in hit the enter

play15:39

button and it will start to work its way

play15:43

through so now that's completed we can

play15:46

go back to Twin gate and check to see if

play15:48

the connector is now online so it

play15:51

currently says not connected but if I

play15:53

hit the refresh button with a bit of

play15:55

luck as we can see the status has now

play15:58

changed to Connected meaning our

play16:00

connector is now live and working we do

play16:03

have the option to add multiple

play16:05

connectors for rgency but I'm just going

play16:07

to leave it as the one for now so now we

play16:10

have our resources defined our connector

play16:13

deployed now the only thing left is to

play16:15

download the client and test it out okay

play16:18

so I have my iPad here and I'm going to

play16:19

pretend that I'm on the road now it's

play16:21

Ted to my mobile so it's a completely

play16:24

separate Network to my local network

play16:26

here to download the client we need to

play16:29

go to Twin

play16:30

gate.com slown and as you can see we

play16:34

have a download option for pretty much

play16:36

every device now of course I'm on iPad

play16:38

so I'm going to choose

play16:42

iOS and hit the download

play16:46

button okay so I have the client but

play16:49

before I connect I want to show you that

play16:51

it will fail if I tried to access my NAS

play16:54

drive from here so I'm going to open up

play16:57

the browser going to go to a new tab and

play17:00

remember that IP address that local IP

play17:03

so it's HTTP colon

play17:07

for1

play17:11

192.168.1 187 and the port number for

play17:14

the web admin page is

play17:17

5,000 so I'll press the enter button and

play17:20

yep as expected it looks like is going

play17:22

to fail so now what I'm going to do is

play17:25

connect to that

play17:26

client so we will log

play17:32

in and I'll will ask for a couple of

play17:39

prompts and now I'm connected to the

play17:42

client so with a bit of luck if I go

play17:45

back to my

play17:46

browser hit the refresh button I now

play17:50

have access to my Nas web admin remember

play17:53

I'm teed off my phone on the mobile

play17:55

network which is completely separate to

play17:57

my local Network here an important note

play18:00

here is I'm actually using the local IP

play18:03

address for my NAS drive as if I was sat

play18:06

in the local network I don't need to

play18:08

mess around with port forwarding or DNS

play18:10

names super simple to set up so I should

play18:15

even be able to create a network share

play18:17

from here so if I open up the files

play18:20

app press these dots at the top and

play18:23

connect to server I should be able to

play18:25

type in that local I

play18:29

address hit the enter button use a

play18:32

registered user user for my NAS drive it

play18:35

requires

play18:37

authentication and yes now I've

play18:39

connected to the nas Drive via a shared

play18:42

Drive I click onto my

play18:44

videos and then go to Sur Bros videos

play18:48

archives and now I have access to all of

play18:50

the files I need securely from anywhere

play18:53

in the world remember we're applying the

play18:56

principles of zero trust so let me just

play18:58

show you what happens if I try to get

play19:01

access to my home router so we already

play19:03

know I have access to the NAS drive but

play19:07

if I were to go to my home router which

play19:10

is

play19:14

192.168.1.254 and press

play19:17

enter again it fails because I'm only

play19:20

given access to my NAS drive and those

play19:23

port numbers we specified everything

play19:26

else is out of bounds no access

play19:30

whatsoever this is the principle of

play19:32

least privilege only given enough access

play19:35

to do the job now we can go even further

play19:39

and to do that we need to go back over

play19:40

to Twin gate we can even assess the

play19:43

devices that are allowed to connect if

play19:45

we go over to devices and then

play19:49

security here we can set the minimum

play19:52

device requirements before they're

play19:54

allowed to connect things like screen

play19:56

locks must be enabled and antivirus must

play19:59

be installed and encryption is required

play20:02

this all adds yet further verifications

play20:05

to our connections meaning just because

play20:07

someone has the right credentials

play20:09

doesn't mean they'll be allowed to

play20:11

connect so for example if I want to

play20:13

allow iOS devices to connect to my NAS

play20:16

drive I probably don't want devices

play20:18

without a screen lock to be able to

play20:19

connect because anyone could just pick

play20:21

it up off the desk and then access my

play20:24

files so I can come over to here click

play20:27

screen lock not required and change that

play20:29

to required and confirm the changes now

play20:34

any iOS device that doesn't have a

play20:36

screen lock will not be allowed to

play20:38

connect to my NAS drive again adding

play20:40

further protection to my data so if you

play20:43

want to get handson with some zero trust

play20:45

and secure your network connections use

play20:48

the link below for your free twin gate

play20:50

account okay so there we have it zero

play20:53

trust is not a single tool or technology

play20:56

instead it's a concept achieved by

play20:58

implementing security policies and tools

play21:01

that align with the core principles of

play21:03

never trust always verify if you like

play21:07

this video and you got some value from

play21:09

it don't forget to give it a thumbs up

play21:11

leave a comment and subscribe the

play21:13

support from you guys really helps this

play21:15

channel grow a big thank you to Twin

play21:17

gate for sponsoring this video you can

play21:19

find the link below and remember it's

play21:21

completely free thank you for

play21:27

watching

play21:32

[Applause]

play21:33

[Music]

play21:44

he

Rate This

5.0 / 5 (0 votes)

関連タグ
Zero TrustCybersecurityNetwork SecurityRemote AccessCloud ComputingWeb AppsPerimeter SecurityData ProtectionSecurity FrameworkTwin Gate
英語で要約が必要ですか?