Americas

Asia

Oceania

Steven Sim
by Steven Sim

Why the clean source principle is key to a successful zero trust strategy

Opinion
20 Jun 20242 mins
Remote Access SecurityZero Trust

Getting the basics right to ensure a successful zero trust strategy

Male and Female Programmers Talking about Work, Solving Problems Together, Using Laptop Computer. Software Development  Code Writing  Website Design  Database Architecture Concept
Credit: Gorodenkoff / Shutterstock

How do you ensure that your remote access is secure? Do you consider your servers protected as long as you have in place a virtual private network (VPN), virtual desktop infrastructure (VDI), Azure Virtual Desktop, desktop-as-a-service (DaaS), VDI-as-a-service (VDIaaS), or other forms of secure jump hosts?

There is a misconception that having a secured intermediary is adequate to shield your servers from threats. Unfortunately, this alone does not guarantee secure remote access – what’s missing is a clean source.

Remote access Trojans can seize control of your endpoint beyond keylogging and screen scraping. When I was a supporting judge for the 2004 BlackOPS: HackAttack challenge in Singapore, I watched in real time as a team took control of an opponent’s machine.

But more recently, the city state faced the proliferation of a more worrying threat: banking trojans – in the form of Android malware – causing customers to lose their savings, amounting to millions of dollars. This truly highlights a very real risk of not having a clean source.

If an organisation exposes its privileged access to remote users; VPNs, multifactor authentication, secure jump hosts, sudos, network intrusion prevention and detection systems, and web application firewalls are all inadequate without a clean source.

The clean source principle requires all security dependencies to be as trustworthy as the object being secured. This starts with ensuring that the endpoint is secured to specifications including the version of the operating system, security baseline configuration, and other requirements.

In many solutions, this is often referred to as host validation or host checks. If you are using Microsoft, this can be achieved by implementing Conditional Access.

So, the next time someone tells you that DaaS or VDIaaS is adequate for your administrator to protect his access to an important system, communicate the risks and highlight the importance of applying the clean source principle in a zero trust strategy.

Steven Sim
by Steven Sim
Contributor

Steven Sim has more than 25 years’ experience in cybersecurity with large end-user enterprises and critical infrastructure. He has undertaken a global CISO role and driven award-winning security governance and management initiatives. He leads cybersecurity across a multinational firm with operations in 42 countries. He oversees Governance, Technology Management and Incident Response as well as Cyber Security Masterplan Office. He also leads Group Cybersecurity Centre of Expertise, Technology Scanning and Cybersecurity Practice Forum to franchise best practices to business units, driven cyber initiatives, developed standards, managed threats, identified 0day vulnerabilities and promoted awareness. Always keen to give back to community, he helmed the ISACA Singapore Chapter (which won ISACA Global Outstanding Chapter Achievement in 2022) as President (from 2021 to 2022) as well as at OT-ISAC (since 2021), as Chair of the Executive Committee, and held a Masters in Computing, CCISO, CGEIT, CRISC, CISM, CISA, CDPSE, CISSP as well as technical certifications GICSP, GREM, GCIH and GPPA. He is an APMG-accredited trainer for ISACA's core certifications and member of Geneva Dialogue for Responsible Behaviours in Cyberspace Technical Community, Working Group on Technical Reference for Securing the Cyber-Physical Systems for Buildings, SANS CISO Network, SANS Offensive Operations Community, Frost & Sullivan Growth Innovation Leadership Council, Microsoft APAC CISO Council, Cybereason Cyber Defense Council, Fortinet Executive Cyber Exchange (ECE), etc. He is also part of ISACA’s Information Security Advisory Group and the Emerging Trends Working Group. He regularly shares his thoughts on cyber risk and security, lectures on an adjunct basis at National University of Singapore Institute of System (on Enterprise Security Architecture), Nanyang Technological University (on Cybersecurity), and other institutes of higher learning, speaks on panels and keynote sessions of both international and local conferences and published several articles. He has been a topic leader for various forums including ISACA’s Emerging Technology and Governance. He was also part of industry consultation for MCI’s Digital Economy Blueprint and CSA’s Singapore OT Cybersecurity Masterplan 2nd Edition and was involved in the reviews of various ISACA CISA, CRISC and CGEIT manuals. Key areas of expertise and experience lie with Cybersecurity Governance, Risk Optimisation, Compliance, Security Engineering, Security Assessment, Incident Management, Training, Awareness. Planned and oversee deployment of cybersecurity solutions enabling business for large IT enterprises and critical OT infrastructure with focus on Internet of LogisticsTM, CP 4.0TM, Supply Chain 4.0, Cyber-Physical or Phygital Systems as well as Emerging Technology. He was recognised with a few awards including #1 CSO in IDG’s CSO30 ASEAN Awards (2021), CSO50 Program, ISACA Chapter Achievement, ISACA Outstanding Chapter Leader, Tech Talent Builder, Skillsfuture Fellow, Global Cyber Security Thought Leaders (IFSEC), Global Cybersecurity Leader, Top 10 Cyber Security Influencers, Top 10 CISOs of the year, Top 29 Highly Influential CISOs, Top 100 Global CISOs, Professional (Leaders) Finalist in Singapore’s Cybersecurity Awards 2018, etc. Reach out to him for: Advisory board member, adjunct lecturer, speaking opportunities, technical reviews, mentorship, thought leader, author, award judge.

More from this author