ZTNA Is The Foundation Of Great VDI Deployments

Companies that were already using a hosted desktop solution, be that rack workstations, Virtual Desktop Infrastructure (VDI) or Desktops-as-a-Service (DaaS), probably found it a lot less onerous to shift their team members to remote and hybrid work during the pandemic. Others were eager to implement a solution, resulting in a major uptake in hosted desktop environments to enable a more modern, work-from-anywhere system that ensured employees stayed both safe and productive. 

Ensuring the safety and utility of enterprise data and applications becomes the next priority. Despite our best intentions, ensuring security in hosted desktop architectures can be a challenge.

Even though some parts of these environments are typically managed on-premises, organizations invariably use some combination of cloud/hosted and centralized resources. This is why I always advise applying the principles of Zero-Trust Network Access (ZTNA) in any hosted desktop deployment. 

Gartner came up with the term in a 2019 report on endpoint security, defining ZTNA as “an identity- and context-based, logical-access boundary around an application or set of applications.” It’s important to point out that ZTNA is not a product or technology. Instead, it’s a governing set of principles or goals around identity management, access control, and transparency.

To break that down further: 

ZTNA is “identity-based”:   Establish the user’s identity before they are granted access to corporate resources.

ZTNA is “context-based”:   Build access control rules according to the role, workload, hours of operation, and other contextual criteria. 

ZTNA employs a “logical-access boundary”:   A control plane consisting of secure gateways and a connection broker manages access, regardless of locations and devices from which users log on.

And there you have it! Well, perhaps not yet. Within each of these frameworks are some important processes for zero-trust security in hosted desktop implementations.

Identity

Multifactor authentication (MFA) should be required to verify each user. Fortunately, hosted destkop management platforms generally allow ample flexibility in the types of authentication servers and providers organizations can use, including standardized identity management services. This helps simplify integration. 

A strong MFA and identity management system should give you many choices of factors, because these may differ depending on the kind of organization you run, the tasks your users perform, and your security culture. You may want stricter MFA standards for executives who have access to intellectual property, or sales reps who can view customer financial information. 

It is not unusual for government agencies to require that one factor be a secure token generated only on a government-issued device. For a call center, on the other hand, a more lenient sign-in process would suffice. In settings where outside contractors or project-based workers only need access to a machine while doing that specific job, time-based/one-time passwords are likely to be fine. 

Context

Context is how—and why—specific access policies are applied to those identities. A user’s role in the organization is probably the main factor for determining what resources they are entitled to access, but other common contextual signals are device, device health, geographic location, and time window. 

As you can imagine, policies can become complex, and setting up ZTNA-based access control rules is time-consuming for large user pools, large data sets, and/or hybrid environments with both cloud and on-premise resources. Hosted desktop management platforms go a long way towards simplifying this chore by automating as many configuration tasks as possible. 

I recommend setting up standard policies for different groups of users and roles, so you can onboard a new employee by simply adding their identity to the appropriate group. For example, third-party contractors could have access to the applications they need via public cloud without gaining access to the corporate network. 

Logical-access Boundary

In a zero-trust environment, a logical-access boundary replaces the physical boundary or perimeter security model of the past that sealed off networks to outside access. Instead, a security gateway with a connection management platform can control access and execute policies even for remote workers. The connection/trust broker manages remote access more or less to the letter of ZTNA principles: authenticate first, control access, and audit the trail. 

VDI is typically hosted and managed on an organization’s own infrastructure, but in a hybrid environment with a combination of cloud and on-premises applications and desktops, there may be fewer choices in connection broker platforms. Organizations often use the same access policies for on-premises workers, so a purely cloud-based trust broker may not be appropriate. Some providers offer both cloud-based and on-premises solutions that work in hybrid scenarios. 

ZTNA-based practices are ideal for hosted desktop deployments enabling remote work: you achieve identity- and context-based access, with a logical-access boundary that enforces security. 

Karen Gondoly is CEO of Leostream                                       Image: Arthur_Bowers

You Might Also Read: 

Mapping Out The Journey To Zero Trust:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Cyberwar In Israel & Gaza
Cyber Security In Space Communications »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Centre for Secure Information Technologies (CSIT)

Centre for Secure Information Technologies (CSIT)

CSIT is a UK Innovation and Knowledge Centre (IKC) for secure information technologies. Our vision is to be a global innovation hub for cyber security.

Electus Recruitment Solutions

Electus Recruitment Solutions

Electus is a leading recruitment specialist in the Engineering, Technology & Digital and Cyber & Security sectors.

L J Kushner & Associates

L J Kushner & Associates

L.J. Kushner is a leading Information Security recruiting firm.

Cyber Security & Information Systems Information Analysis Center (CSIAC) - USA

Cyber Security & Information Systems Information Analysis Center (CSIAC) - USA

CSIAC is chartered to leverage best practices and expertise from government, industry, and academia on cyber security and information technology.

Celare

Celare

Celare delivers DPI based network perimeter monitoring solutions with integrated Big Data security analytics and threat detection.

National Information Technology Development Agency (NITDA) - Nigeria

National Information Technology Development Agency (NITDA) - Nigeria

The National Information Technology Development Agency (NITDA) is committed to implementing the Nigerian National Information Technology Policy.

FoxGuard

FoxGuard

FoxGuard develops customized cyber security, compliance and industrial computing solutions for critical infrastructure entities and control system vendors.

Gilbert + Tobin

Gilbert + Tobin

Gilbert + Tobin is an Australian corporate law firm serving clients throughout Australia, and around the world, on a broad range of legal issues including cyber security.

SlowMist

SlowMist

SlowMist is a blockchain ecosystem security company providing cybersecurity audits and protection for leading digital asset exchanges, crypto wallets, public chains, and smart contracts.

StrikeReady

StrikeReady

StrikeReady have developed CARA, an advanced technology solution that offers personalized and proactive assessment and remediation of future and current risk in real-time.

European Center for CyberSecurity in Aviation (ECCSA)

European Center for CyberSecurity in Aviation (ECCSA)

ECCSA is a cooperative partnership within the aviation community to better understand emerging cybersecurity risks in aviation and provide collective support in dealing with cybersecurity incidents.

Gridware

Gridware

Gridware is a specialised cybersecurity consultancy firm and an emerging global player in the cybersecurity intelligence and advisory field.

Data Protection Commission (DPC) - Ireland

Data Protection Commission (DPC) - Ireland

The Data Protection Commission (DPC) is the national independent authority responsible for upholding the fundamental right of individuals in the EU to have their personal data protected.

Aquia

Aquia

Aquia are on a mission to enable innovation and drive transformative change to solve the world’s most pressing and complex cybersecurity challenges.

Velotix

Velotix

Velotix empowers organizations to maximize the value of their data while ensuring security and compliance in a rapidly evolving regulatory landscape.

Gcore

Gcore

Gcore is an international leader in public cloud and edge computing, content delivery, hosting, and security solutions.