ZTNA Is The Foundation Of Great VDI Deployments

Companies that were already using a hosted desktop solution, be that rack workstations, Virtual Desktop Infrastructure (VDI) or Desktops-as-a-Service (DaaS), probably found it a lot less onerous to shift their team members to remote and hybrid work during the pandemic. Others were eager to implement a solution, resulting in a major uptake in hosted desktop environments to enable a more modern, work-from-anywhere system that ensured employees stayed both safe and productive. 

Ensuring the safety and utility of enterprise data and applications becomes the next priority. Despite our best intentions, ensuring security in hosted desktop architectures can be a challenge.

Even though some parts of these environments are typically managed on-premises, organizations invariably use some combination of cloud/hosted and centralized resources. This is why I always advise applying the principles of Zero-Trust Network Access (ZTNA) in any hosted desktop deployment. 

Gartner came up with the term in a 2019 report on endpoint security, defining ZTNA as “an identity- and context-based, logical-access boundary around an application or set of applications.” It’s important to point out that ZTNA is not a product or technology. Instead, it’s a governing set of principles or goals around identity management, access control, and transparency.

To break that down further: 

ZTNA is “identity-based”:   Establish the user’s identity before they are granted access to corporate resources.

ZTNA is “context-based”:   Build access control rules according to the role, workload, hours of operation, and other contextual criteria. 

ZTNA employs a “logical-access boundary”:   A control plane consisting of secure gateways and a connection broker manages access, regardless of locations and devices from which users log on.

And there you have it! Well, perhaps not yet. Within each of these frameworks are some important processes for zero-trust security in hosted desktop implementations.

Identity

Multifactor authentication (MFA) should be required to verify each user. Fortunately, hosted destkop management platforms generally allow ample flexibility in the types of authentication servers and providers organizations can use, including standardized identity management services. This helps simplify integration. 

A strong MFA and identity management system should give you many choices of factors, because these may differ depending on the kind of organization you run, the tasks your users perform, and your security culture. You may want stricter MFA standards for executives who have access to intellectual property, or sales reps who can view customer financial information. 

It is not unusual for government agencies to require that one factor be a secure token generated only on a government-issued device. For a call center, on the other hand, a more lenient sign-in process would suffice. In settings where outside contractors or project-based workers only need access to a machine while doing that specific job, time-based/one-time passwords are likely to be fine. 

Context

Context is how—and why—specific access policies are applied to those identities. A user’s role in the organization is probably the main factor for determining what resources they are entitled to access, but other common contextual signals are device, device health, geographic location, and time window. 

As you can imagine, policies can become complex, and setting up ZTNA-based access control rules is time-consuming for large user pools, large data sets, and/or hybrid environments with both cloud and on-premise resources. Hosted desktop management platforms go a long way towards simplifying this chore by automating as many configuration tasks as possible. 

I recommend setting up standard policies for different groups of users and roles, so you can onboard a new employee by simply adding their identity to the appropriate group. For example, third-party contractors could have access to the applications they need via public cloud without gaining access to the corporate network. 

Logical-access Boundary

In a zero-trust environment, a logical-access boundary replaces the physical boundary or perimeter security model of the past that sealed off networks to outside access. Instead, a security gateway with a connection management platform can control access and execute policies even for remote workers. The connection/trust broker manages remote access more or less to the letter of ZTNA principles: authenticate first, control access, and audit the trail. 

VDI is typically hosted and managed on an organization’s own infrastructure, but in a hybrid environment with a combination of cloud and on-premises applications and desktops, there may be fewer choices in connection broker platforms. Organizations often use the same access policies for on-premises workers, so a purely cloud-based trust broker may not be appropriate. Some providers offer both cloud-based and on-premises solutions that work in hybrid scenarios. 

ZTNA-based practices are ideal for hosted desktop deployments enabling remote work: you achieve identity- and context-based access, with a logical-access boundary that enforces security. 

Karen Gondoly is CEO of Leostream                                       Image: Arthur_Bowers

You Might Also Read: 

Mapping Out The Journey To Zero Trust:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Cyberwar In Israel & Gaza
Cyber Security In Space Communications »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alert Logic

Alert Logic

Alert Logic delivers unrivaled security for any environment, delivering industry-leading managed detection and response (MDR) and web application firewall (WAF) solutions.

Tiro Security

Tiro Security

Tiro Security is a boutique company specializing in information security and IT audit recruitment and solutions.

Glasswall Solutions

Glasswall Solutions

Glasswall Solutions has developed a disruptive, innovative security technology which provides unique protection against document based cyber threats.

PSC

PSC

PSC is a leading PCI and PA DSS assessor and Approved Scanning Vendor.

Proficio

Proficio

Proficio is a world-class Managed Security Service Provider providing managed detection and response solutions, 24×7 security monitoring and advanced data breach prevention services worldwide.

Spanish Network of Excellence on Cybersecurity Research (RENIC)

Spanish Network of Excellence on Cybersecurity Research (RENIC)

RENIC is a membership based sectoral association that includes research centers and other agents of the research cybersecurity ecosystem in Spain.

Data Protection People

Data Protection People

Data Protection People are specialists in Data Privacy, Governance, and Information Security.

OutThink

OutThink

OutThink is a web-based platform (SaaS) that has been developed specifically to identify and reduce risky workforce behaviours and build a risk aware culture.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

SmartContractAudits.com

SmartContractAudits.com

SmartContractAudits.com is the leading platform for finding companies providing smart contract auditing services.

Siemens

Siemens

Siemens Industrial Security Services provide solutions for cybersecurity in automation environments based on the recommendations of the international standard IEC 62443.

TRU Staffing Partners

TRU Staffing Partners

TRU Staffing Partners is an award-winning contract staffing and executive search firm for cybersecurity, eDiscovery and privacy companies and professionals.

TestArmy

TestArmy

TestArmy CyberForces provide you with a broad spectrum of cybersecurity services to test every aspect of your IT infrastructure security and software development process.

KirkpatrickPrice

KirkpatrickPrice

KirkpatrickPrice is dedicated to providing you with innovative security guidance and efficient audit services.

Swish Data Corp.

Swish Data Corp.

Swish delivers when the problems are complex, requirements are difficult, and the mission is absolutely critical.

Tanzania Industrial Research and Development Organization (TIRDO)

Tanzania Industrial Research and Development Organization (TIRDO)

TIRDO is a multi-disciplinary research and development organization.