Extending Zero Trust to any Remote Wi-Fi Connection

Zero Trust Network Access (ZTNA) products are built on the premise that access to corporate applications and services should be earned at every request, based on the identity of the user, the device, and the context. This is in contrast to the implicit trust that the traditional perimeter-based security model assumes, automatically granting access to any device connected. 

The ability to segment, isolate, and control the network is essential to ZTNA as there should never be a reason to put the user onto the network where they can explore/route to your application servers and data centers. But for all of the positives, don't think that Zero Trust is a cure-all for Wi-Fi security threats. You can click the banner below to watch our on-demand webinar and learn more - and don't worry, we'll be here waiting when you get back!

New call-to-action

Jump to a section...

Determining Trustworthiness: the User, the Device, and the Context 

Needing More Context for the Local Network Environment

How does Byos complement ZTNA?

Determining Trustworthiness: the User, the Device, and the Context 

The three main aspects of any access decision made by the ZTNA Trust Broker: the user, the device, and the context.

  1. User - To continuously monitor and validate user trustworthiness, ZTNA products use signals from Identity and Access Management (IAM) and Multi-Factor Authentication (MFA).  

  2. Device - To determine device trustworthiness, the device’s security posture is validated during every request with signals collected from various sources: 

    • Unified Endpoint Management (UEM) 

    • Mobile Device Management (MDM)

    • Endpoint Protection (EPP) suites or Endpoint Detection and Response (EDR) tools 

    • User and Entity Behaviour Analytics (UEBA) platforms and/or Security Information and Event Management (SIEM) solutions.

  3. Context - The context is in relation to the network that the endpoint connects from. ZTNA assumes all user network connections as public networks like those in hotels, coffee shops, or home Wi-Fi.

Based off of these three input variables, ZTNA allows for administrators to: 

  • control privileged network access 

  • manage internal and external data flows 

  • prevent lateral movement in the network

  • visibility to make dynamic policy and trust decisions on network and data traffic

However, there is a missing piece to the whole equation: What is happening on the local network the device is connected to? Yes, the device is assumed to be connected to an uncontrolled public Wi-Fi network, but are there malware-laden devices potentially infecting corporate devices? Are there malicious actors waiting for the corporate devices to leak DNS information or SMB requests? 

Back to top

Needing More Context for the Local Network Environment

Despite the user and device input signals, context alone isn’t enough; security teams need assurance that the local network connection is segmented, isolated, and controlled. 

ZTNA solutions don’t protect or isolate devices from the local network, leaving them exposed. Despite using a ZTNA solution, devices remain vulnerable to a number of attacks including: 

  • Scanning, Enumerating, and Fingerprinting

  • Eavesdropping

  • Remote Access Exploits

  • Evil-Twin Wi-Fi

  • Lateral Network Infections

  • DNS hijacking

Read more here: The Half Dozen Risks of Using Dirty Public Wi-Fi Networks

While it’s true that administrators using ZTNA solutions will have full visibility over the devices requesting access, they won’t have full visibility over that remote network that the device is connected from. 

Back to top

How does Byos complement ZTNA?

The Byos Secure Endpoint Edge solves the last mile security problem through endpoint micro-segmentation. The Endpoint Edge adds another layer of security by providing the endpoint with its own protected micro-segment of one within the local network. In addition, the presence of a known Endpoint Edge can act as an authorization signal to the ZTNA trust broker that the local network connection is secure. Enabling granular policy enforcement at the endpoint, the Endpoint Edge also gives the administrator assurance that the endpoint is shielded away from all other local network security threats.

While the perimeter-based model of security may be flawed for the new world of decentralized work, understanding the user, the device’s security posture, and the security of the network is fundamental to achieving a Zero Trust environment. Pairing the Byos Secure Endpoint Edge with a ZTNA solution will enhance control and reduce the risk of devices connecting to dirty networks, extending ZTNA efforts to allow connectivity from any Wi-Fi network.

Back to top

Get started with Byos

How To Better Secure Remote Wi-Fi Connections

How to Secure the Work From Home Initiative