Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Innovation and Technology to Advance Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Innovation and Technology to Advance Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Civilian

The Power of Programmable Fabrics: Part Three of Multidomain Architectures, the IT Manhattan Project, and Delivering the “Real” Zero Trust

by Jeff Fossett
March 28, 2022
in Civilian, Cybersecurity, Digital Transformation
Reading Time: 6 mins read
A A
The Power of Programmable Fabrics: Part Three of Multidomain Architectures, the IT Manhattan Project, and Delivering the “Real” Zero Trust
Share on FacebookShare on Twitter

This article is the second installment in a multi-part series. You can find part 1 here and part 2 here.

In the previous two articles, we defined the need, and we’ve examined the intelligence provided by the policy plane from both a security and operational perspective. We know that as we pursue the foundational tenants of federal IT modernization memos and overall guidance, that we not only need to establish trust, enforce trust-based access, and continuously validate compliance, but we need to deliver the modernized infrastructure rapidly.  A surefire way to prohibit any attempts at rapid modernization is to do things the way we’ve always done them. To unbox every piece of infrastructure one at a time, throw them up on our workbench, and proceed to program them by hand. We have to avoid that at all costs – lest we assure our inevitable failure.  Our orchestration and policy planes have no power at all if they cannot be distributed and continuously enforced throughout the entire infrastructure. So let’s jump right into it!

The horsepower enabling Zero Trust policy propagation across all major domains of the enterprise is found in the programable fabrics that weave them all together.

In a Zero Trust architecture, we ensure that all connections to the network are subjected to dynamic authentication and authorization in accordance with the auth chains that our cyber security organizations put in place. In our new normal, federal IT assets are more mobile than ever, thus requiring our modernized networks to have the ability to dynamically adapt to continuously transforming IT environments without compromising security or performance.  This is where overlay networking comes in.

While underlay networks are simply responsible for providing a robust, predictable, and stable IP transport mechanism, overlay networks provide differentiated, virtualized networks that support mobility and segmentation at scale. They abstract themselves over the top of underlay infrastructure by way of encapsulation. The operations of the overlay take place via highly flexible encapsulated protocols like VXLAN, Geneve, and LISP. When discussing Zero Trust, there are two forms of segmentation:

Macro-segmentation: Historically, enterprises securely segment networks with different security levels by way of VRFs. VRFs logically segment large portions of the network from other large portions. Leaking traffic between VRFs is normally subjected to security appliances.  When discussing programmable fabrics, a VRF = VN Virtual Network.

Example: “We have shared network resources on campus, containing multiple programs. We need to ensure that traffic from Program A is completely segmented (virtually) from Program B.”

Micro-segmentation: Micro-segmentation deals with how endpoints/applications/users intercommunicate within a VN. This provides lateral access control that Zero Trust policy requires. Thus requiring authentication and authorization of every transaction that occurs, even within the same VN.

Example: “Within the Program A VN, we have HR Users and engineering users connecting to the same VLAN within Building 100. We need to ensure that HR Users on VLAN 10 within Building 100 can only talk to Engineering Users on VLAN 10 within Building 100 if they are authorized.

Programmable fabrics allow for dynamic segmentation both at the macro and the micro-levels. The policy engine injects intent into the programmable fabrics, thus deciphering how traffic should be segmented. These programmable encapsulation types provide special fields for injecting programmable information including VRF/VN fields (macro-segmentation) and built-in security group data (micro-segmentation). The resulting policy for the flow is no longer simply tied to the source, destination, and port of the flow to control access between network boundaries. Rather, intent-based security policy from the policy engine is attached to the flow and enables us to attach user/machine-authentication attributes to round out the full security intent of the network flow.

Programmable Fabrics

To gain a better understanding of how the network onboarding process takes place, see this simplified description of operations below:

  1. When the host connects to the switch fabric, it is authenticated and authorized by way of 802.1x policy from the Policy Engine
  2. The fabric updates its mapping database to show that the host is connected to the network device/port. It assigns the host an “Endpoint ID” based on the IP and MAC-Address attributes of the host, and assigns an RLOC to the network device. Therefore, anything on the network attempting to reach Host A (IP/MAC Address) is pointed to SWITCH-01
  3. Once each EID/RLOC is identified, the VTEP is identified for both the source and desired destination.
  4. A VXLAN-encapsulated tunnel is established over the programmable fabrics, between Host A and Host B – thus abstracting that traffic from the rest of the network

Programmable Fabrics

The end-to-end encapsulation across the fabric is extremely powerful both in terms of Zero Trust segmentation as well as operational advantages.  Virtual Networks can be extended between different domains to maintain the virtual overlay macro-segmentation strategy between those two domains. It can be accomplished between two different domains that are comprised of infrastructure from two different manufacturers. How? Because the Software-Defined Controllers for each environment absorb segmentation policy directly from the same centralized Policy Engine.  This unleashes limitless possibilities when it comes to Zero Trust micro-segmentation development across the enterprise. It is the ability to maintain and propagate consistent, end-to-end policy across common domain boundaries, that makes the multidomain architectural approach the “real” Zero Trust.

 

Programmable Fabrics

Tags: CTG FederalcybersecurityIT Manhattan ProjectMultidomain ArchitectureProgrammable FabricsZero Trust

RELATED POSTS

Identifying the Building Blocks for a Successful Zero Trust Journey
Civilian

Identifying the Building Blocks for a Successful Zero Trust Journey

January 24, 2023
Paving the Way to a More Secure Future: How Legislation Helps
Cybersecurity

Paving the Way to a More Secure Future: How Legislation Helps

January 12, 2023
Federal IT Priorities for FY23: Security, Defense, and Digital Government Experience Top the List
Cybersecurity

Federal IT Priorities for FY23: Security, Defense, and Digital Government Experience Top the List

January 10, 2023

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    8340 shares
    Share 3336 Tweet 2085
  • For CBP and DHS, AI Reveals Meaningful Connections from Disparate Data

    17 shares
    Share 7 Tweet 4
  • The Five Pillars of Zero Trust Architecture

    340 shares
    Share 136 Tweet 85
  • Identifying the Building Blocks for a Successful Zero Trust Journey

    22 shares
    Share 9 Tweet 6

CONNECT WITH US

Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisment Banner Ad Advertisment Banner Ad Advertisment Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2023 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us