ZTNA Is The Foundation Of Great VDI Deployments

Companies that were already using a hosted desktop solution, be that rack workstations, Virtual Desktop Infrastructure (VDI) or Desktops-as-a-Service (DaaS), probably found it a lot less onerous to shift their team members to remote and hybrid work during the pandemic. Others were eager to implement a solution, resulting in a major uptake in hosted desktop environments to enable a more modern, work-from-anywhere system that ensured employees stayed both safe and productive. 

Ensuring the safety and utility of enterprise data and applications becomes the next priority. Despite our best intentions, ensuring security in hosted desktop architectures can be a challenge.

Even though some parts of these environments are typically managed on-premises, organizations invariably use some combination of cloud/hosted and centralized resources. This is why I always advise applying the principles of Zero-Trust Network Access (ZTNA) in any hosted desktop deployment. 

Gartner came up with the term in a 2019 report on endpoint security, defining ZTNA as “an identity- and context-based, logical-access boundary around an application or set of applications.” It’s important to point out that ZTNA is not a product or technology. Instead, it’s a governing set of principles or goals around identity management, access control, and transparency.

To break that down further: 

ZTNA is “identity-based”:   Establish the user’s identity before they are granted access to corporate resources.

ZTNA is “context-based”:   Build access control rules according to the role, workload, hours of operation, and other contextual criteria. 

ZTNA employs a “logical-access boundary”:   A control plane consisting of secure gateways and a connection broker manages access, regardless of locations and devices from which users log on.

And there you have it! Well, perhaps not yet. Within each of these frameworks are some important processes for zero-trust security in hosted desktop implementations.

Identity

Multifactor authentication (MFA) should be required to verify each user. Fortunately, hosted destkop management platforms generally allow ample flexibility in the types of authentication servers and providers organizations can use, including standardized identity management services. This helps simplify integration. 

A strong MFA and identity management system should give you many choices of factors, because these may differ depending on the kind of organization you run, the tasks your users perform, and your security culture. You may want stricter MFA standards for executives who have access to intellectual property, or sales reps who can view customer financial information. 

It is not unusual for government agencies to require that one factor be a secure token generated only on a government-issued device. For a call center, on the other hand, a more lenient sign-in process would suffice. In settings where outside contractors or project-based workers only need access to a machine while doing that specific job, time-based/one-time passwords are likely to be fine. 

Context

Context is how—and why—specific access policies are applied to those identities. A user’s role in the organization is probably the main factor for determining what resources they are entitled to access, but other common contextual signals are device, device health, geographic location, and time window. 

As you can imagine, policies can become complex, and setting up ZTNA-based access control rules is time-consuming for large user pools, large data sets, and/or hybrid environments with both cloud and on-premise resources. Hosted desktop management platforms go a long way towards simplifying this chore by automating as many configuration tasks as possible. 

I recommend setting up standard policies for different groups of users and roles, so you can onboard a new employee by simply adding their identity to the appropriate group. For example, third-party contractors could have access to the applications they need via public cloud without gaining access to the corporate network. 

Logical-access Boundary

In a zero-trust environment, a logical-access boundary replaces the physical boundary or perimeter security model of the past that sealed off networks to outside access. Instead, a security gateway with a connection management platform can control access and execute policies even for remote workers. The connection/trust broker manages remote access more or less to the letter of ZTNA principles: authenticate first, control access, and audit the trail. 

VDI is typically hosted and managed on an organization’s own infrastructure, but in a hybrid environment with a combination of cloud and on-premises applications and desktops, there may be fewer choices in connection broker platforms. Organizations often use the same access policies for on-premises workers, so a purely cloud-based trust broker may not be appropriate. Some providers offer both cloud-based and on-premises solutions that work in hybrid scenarios. 

ZTNA-based practices are ideal for hosted desktop deployments enabling remote work: you achieve identity- and context-based access, with a logical-access boundary that enforces security. 

Karen Gondoly is CEO of Leostream                                       Image: Arthur_Bowers

You Might Also Read: 

Mapping Out The Journey To Zero Trust:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Cyberwar In Israel & Gaza
Cyber Security In Space Communications »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Prosperon Networks

Prosperon Networks

Prosperon Networks support SMB to Enterprise networks through the provisioning of network monitoring software, customisation, consultancy and installation.

Paramount Computer Systems

Paramount Computer Systems

Paramount is a regional leader in the Middle East for cybersecurity solutions and consulting services.

IntaForensics

IntaForensics

IntaForensics offer a full range of digital investigation services and are able to adapt to the individual needs of solicitors, private clients, Law Enforcement Agencies and commercial businesses.

Cisco Talos

Cisco Talos

Talos is an industry-leading threat intelligence solution that protects your organization’s people, data and infrastructure from active adversaries.

CyberProof

CyberProof

CyberProof aims to give clarity and confidence to businesses worldwide using a new risk-based approach to cyber security services.

NinjaJobs

NinjaJobs

NinjaJobs is a community-run job platform developed by information security professionals. We focusing strictly on cybersecurity positions.

Brimondo

Brimondo

At Brimondo we help you to maximize and protect your brand value by being a proactive and strategic partner within brand protection with experts within intellectual property and digital assets.

Syber Technology

Syber Technology

Syber Technology is an IT project implementer empowering IT systems of Small to Medium Enterprises in the Middle East.

Cymptom

Cymptom

At Cymptom our purpose is to enable security managers to see at a glance all urgently risky gaps  in their organizations’ security posture at any given moment.

Appurity

Appurity

Appurity specialises in mobile and application security, delivering comprehensive solutions across all verticals.

Coviant Software

Coviant Software

Coviant Software delivers secure managed file transfer (MFT) software that integrates smoothly and easily with business processes.

Space Hellas

Space Hellas

Space Hellas is a dynamic, established System Integrator and Value Added Solutions Provider, holding a leading position in the high technology arena.

WillCo Tech

WillCo Tech

WillCo Tech works to enhance national security and force readiness for military and commercial enterprises with a suite of software capabilities surrounding the human element of cybersecurity.

Keeran Networks

Keeran Networks

Established in Edmonton in 1999, Keeran specializes in delivering comprehensive IT support and solutions aimed at optimizing technology investments for businesses.

National Cybersecurity Competence Center (NC3) - Luxembourg

National Cybersecurity Competence Center (NC3) - Luxembourg

The purpose of the is to strengthen the Country's ecosystem facing cyber Luxembourg National Cybersecurity Competence Centerthreats and risks.

A&O Shearman

A&O Shearman

A&O Shearman is a law firm at the forefront of the forces changing the current of global business: energy transition, life sciences, technology, private capital, finance and beyond.