No Result
View All Result
  • Login
Monday, September 15, 2025
FeeOnlyNews.com
  • Home
  • Business
  • Financial Planning
  • Personal Finance
  • Investing
  • Money
  • Economy
  • Markets
  • Stocks
  • Trading
  • Home
  • Business
  • Financial Planning
  • Personal Finance
  • Investing
  • Money
  • Economy
  • Markets
  • Stocks
  • Trading
No Result
View All Result
FeeOnlyNews.com
No Result
View All Result
Home Market Analysis

Is Zero Trust Canceled? Revisiting DEF CON Research

by FeeOnlyNews.com
2 weeks ago
in Market Analysis
Reading Time: 4 mins read
A A
0
Is Zero Trust Canceled? Revisiting DEF CON Research
Share on FacebookShare on TwitterShare on LInkedIn


Cybersecurity presentations are known for having pithy titles (usually, the more provocative, the better). And nobody will lose any points for dunking on a concept or term with as much saturation — and overuse in marketing — as Zero Trust. On that score, AmberWolf’s talk at DEF CON 33, titled “Zero Trust, Total Bust: Breaking Into Thousands Of Cloud-Based VPNs With One Bug,” ticks all the boxes. But what about the substance of the critique? Did the research uncover fundamental flaws in Zero Trust? Although we think the research uncovered some significant issues, calling it a “total bust” is definitely overblown.

AmberWolf Identified Significant Flaws In Multiple Products

Over the course of seven months, AmberWolf researchers examined Zero Trust network access (ZTNA) products from security vendors Check Point, Netskope, and Zscaler, finding multiple security issues — more specifically, identity and access management (IAM) problems: user impersonation, authentication bypass, local privilege escalation, and access to an SFTP server containing client logs and authentication material. In short, they found the same sorts of vulnerabilities that routinely appear in other software.

The issue with security flaws in Zero Trust platforms themselves is that these platforms serve as foundational infrastructure and guardians responsible for access policy (authentication and authorization) enforcement to a wide variety and large number of enterprise resources instead of just one. These issues also highlight lingering implicit trust. We’ve made great strides in verifying users and endpoints, but we still rely on other systems to 1) implement and enforce policies reliably and 2) be trustworthy by virtue of being (mostly) free of critical, exploitable defects. The AmberWolf research demonstrates a breakdown in both.

Zero Trust Isn’t A Product

It bears repeating that Zero Trust isn’t a single thing (and it’s most definitely not a product). Zero Trust is a combination of things such as strong authentication (of users, devices, and apps/workloads), enforcement of least privilege, segmentation, data classification, and more.

Each of the Zero Trust domains is intended to work on its own and in concert with the others to ensure that a failure in one control doesn’t result in a catastrophic breach. The metaphorical purpose of the architecture, in other words, is to prevent fire or — barring that — contain its spread and limit the resulting damage. Depending on any one element to achieve that goal is a textbook example of a single point of failure and antithetical to the philosophy and goals of Zero Trust.

Product Security Problems Don’t Invalidate Architecture

The ZTNA products that AmberWolf examined are unfortunately not the first security products to have security flaws. It’s quite a leap, however, to say that flaws in security products mean that an underlying security architecture principle is flawed.

If building materials like cement and steel are defective, we don’t say that the design principles behind building a skyscraper are junk. Instead, we look at the root cause of the flaws in those materials and figure out how to avoid them in the future. If it’s a pervasive issue, it may mean a new approach to making and testing those materials; if it’s a couple of suppliers cutting corners, it may mean purchasing materials somewhere else next time.

One important way for vendors to ensure the security of their products is using and consistently upgrading robust, well-tested, standards-based packages such as OpenSSL, OpenSSH, OpenAM, and more. An important corollary to “don’t roll your own crypto” should be “don’t roll your own IAM libraries” to avoid precisely the issues identified by AmberWolf’s testing.

Like any software or hardware vendor, security vendors must incorporate product security principles throughout the product lifecycle to protect their customers and their brand. This starts early in the lifecycle, where security must identify strategic risks and potential threats, and continues with activities such as threat modeling, security training, pre-release application security testing, and post-deployment protections.

Critically, product security teams must also help product teams build in security and IAM features (like authentication), recommend secure default configurations, and make deployment and configuration guidance available to systems integrators that work with their customers. Through it all, close coordination with the product team is key.

It’s not unreasonable to hold security vendors to a higher standard when it comes to product security. CISA launched the Secure by Design pledge, with hundreds of enterprise software companies signing on and committing to building security into their products. If a vendor that you work with (security or otherwise) hasn’t signed the pledge, ask why not. If they have, ask them to share their progress against the goals.

Is Cloud Delivery Better, Worse, Or Just … Different?

A large and growing number of security capabilities are delivered at least partially via the cloud. That could be seen as a liability in this context. Despite the attention-grabbing claim about breaking into thousands of VPNs using a single bug, AmberWolf did no such thing — although its research clearly shows that an attack on that scale would have been possible. We say “would have been” because, although cloud delivery can sometimes result in new attack vectors, the cloud also offers benefits in terms of vulnerability remediation.

Zscaler responded to and fixed the vulnerability reported by AmberWolf the same day (although there was a brief regression several days later that was also quickly repaired). As with any case of security issues in security products, responsiveness and transparency matter. Contrast this with severe, exploited vulnerabilities in on-premises infrastructure that required federal law enforcement intervention or guidance that involved literally unplugging affected systems to remediate security issues — not to mention coordinated action on the part of hundreds or thousands of organizations, as opposed to just one.

Connect With Us

As always, Forrester clients can connect with Sandy for product security, Andras for identity, and me for Zero Trust by setting up a guidance session or inquiry.

We’ll also be in Austin, Texas, on November 5–7 with a host of our colleagues for the Forrester Security & Risk Summit. This year’s theme is “Master Risk, Conquer Chaos,” and the agenda includes a track focused on Zero Trust as well as a variety of keynotes, breakouts, workshops, roundtables, and special programs to help you master whatever chaos your teams are facing today. We hope to see you there!



Source link

Tags: canceledConDEFResearchRevisitingTrust
ShareTweetShare
Previous Post

America’s richest generation is only getting richer. Their wealth has soared over the past four deca

Next Post

10 Highest Yielding Kevin O’Leary Stocks Now

Related Posts

Reintroducing A Classic: The S&R Executive Spotlight

Reintroducing A Classic: The S&R Executive Spotlight

by FeeOnlyNews.com
September 14, 2025
0

As the world moves forward, some things really should stay behind — like eighties shoulder pads, popcorn ceilings, and fondue...

School Is In Session And Attackers Are Grading Your Software Supply Chain Security

School Is In Session And Attackers Are Grading Your Software Supply Chain Security

by FeeOnlyNews.com
September 12, 2025
0

Software supply chain attacks continue to be a top external attack vector for attackers to breach enterprises, government agencies, and...

The Abyss Of The Salesloft-Salesforce Breach May Reach The Challenger Deep

The Abyss Of The Salesloft-Salesforce Breach May Reach The Challenger Deep

by FeeOnlyNews.com
September 12, 2025
0

News has been trickling out since August 20 about a security issue in Salesloft’s Drift product, a marketing and sales...

Rewind And Fast-Forward TV Advertising

Rewind And Fast-Forward TV Advertising

by FeeOnlyNews.com
September 12, 2025
0

TV’s stakeholders — consumers, advertisers, and publishers — are out of sync. Consumers love streaming TV but say they don’t...

Answer Engines Outpace Antitrust Law

Answer Engines Outpace Antitrust Law

by FeeOnlyNews.com
September 12, 2025
0

To remedy Google’s monopoly in search, Judge Amit Mehta ruled that Google merely has to share limited search data with...

Digital Analytics Solutions, Q3 2025

Digital Analytics Solutions, Q3 2025

by FeeOnlyNews.com
September 12, 2025
0

Digital analytics is no longer just about tracking clicks and page views — it’s about unlocking the full story behind...

Next Post
10 Highest Yielding Kevin O’Leary Stocks Now

10 Highest Yielding Kevin O'Leary Stocks Now

Updated for 2025: The ultimate couch potato portfolio guide

Updated for 2025: The ultimate couch potato portfolio guide

  • Trending
  • Comments
  • Latest
1 Stock to Buy, 1 Stock to Sell This Week: Walmart, Target

1 Stock to Buy, 1 Stock to Sell This Week: Walmart, Target

August 17, 2025
Of Property Rights, Civil Society, and Shampoo

Of Property Rights, Civil Society, and Shampoo

September 1, 2025
Engine Capital takes a stake in Avantor. Activist sees several ways to create value

Engine Capital takes a stake in Avantor. Activist sees several ways to create value

August 16, 2025
James Galbraith: Crash in Top Economist Hiring Contradicts Elite-Favoring “Skill Biased Technical Change” Theory

James Galbraith: Crash in Top Economist Hiring Contradicts Elite-Favoring “Skill Biased Technical Change” Theory

September 2, 2025
Vanguard reaches .5M SEC settlement

Vanguard reaches $19.5M SEC settlement

August 29, 2025
RBC wealth revenue rises despite recruiting costs

RBC wealth revenue rises despite recruiting costs

August 27, 2025
Trump says he doesn’t want to ‘frighten off’ investors as ICE Hyundai raid sparks Korean outrage

Trump says he doesn’t want to ‘frighten off’ investors as ICE Hyundai raid sparks Korean outrage

0
5 fintechs that could IPO after Klarna

5 fintechs that could IPO after Klarna

0
Leerink Partners Remains Bullish on Merck & Co. (MRK)

Leerink Partners Remains Bullish on Merck & Co. (MRK)

0
Stock market risk-reward now in favour, time to deploy cash: Kotak MF’s Atul Bhole

Stock market risk-reward now in favour, time to deploy cash: Kotak MF’s Atul Bhole

0
Hoisted from Comments: “Nuclear Waste Is a Myth the US Promoted….”

Hoisted from Comments: “Nuclear Waste Is a Myth the US Promoted….”

0
UK Trade Groups Push for Blockchain Inclusion in Tech Deal With U.S.

UK Trade Groups Push for Blockchain Inclusion in Tech Deal With U.S.

0
5 fintechs that could IPO after Klarna

5 fintechs that could IPO after Klarna

September 15, 2025
Australia’s financial regulator slaps a 0 million fine on ANZ, its largest ever on a single entity

Australia’s financial regulator slaps a $160 million fine on ANZ, its largest ever on a single entity

September 15, 2025
Trump says he doesn’t want to ‘frighten off’ investors as ICE Hyundai raid sparks Korean outrage

Trump says he doesn’t want to ‘frighten off’ investors as ICE Hyundai raid sparks Korean outrage

September 15, 2025
Hoisted from Comments: “Nuclear Waste Is a Myth the US Promoted….”

Hoisted from Comments: “Nuclear Waste Is a Myth the US Promoted….”

September 15, 2025
Construction begins on Israel’s tallest residential tower

Construction begins on Israel’s tallest residential tower

September 15, 2025
Stock market risk-reward now in favour, time to deploy cash: Kotak MF’s Atul Bhole

Stock market risk-reward now in favour, time to deploy cash: Kotak MF’s Atul Bhole

September 14, 2025
FeeOnlyNews.com

Get the latest news and follow the coverage of Business & Financial News, Stock Market Updates, Analysis, and more from the trusted sources.

CATEGORIES

  • Business
  • Cryptocurrency
  • Economy
  • Financial Planning
  • Investing
  • Market Analysis
  • Markets
  • Money
  • Personal Finance
  • Startups
  • Stock Market
  • Trading

LATEST UPDATES

  • 5 fintechs that could IPO after Klarna
  • Australia’s financial regulator slaps a $160 million fine on ANZ, its largest ever on a single entity
  • Trump says he doesn’t want to ‘frighten off’ investors as ICE Hyundai raid sparks Korean outrage
  • Our Great Privacy Policy
  • Terms of Use, Legal Notices & Disclaimers
  • About Us
  • Contact Us

Copyright © 2022-2024 All Rights Reserved
See articles for original source and related links to external sites.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Business
  • Financial Planning
  • Personal Finance
  • Investing
  • Money
  • Economy
  • Markets
  • Stocks
  • Trading

Copyright © 2022-2024 All Rights Reserved
See articles for original source and related links to external sites.