Deloitte Enterprise Network Security Architecture Evolution
Deloitte Enterprise Network Security Architecture Evolution
A hyperconnected world
Today’s world is about connecting people, systems and sharing data
everywhere at anytime, enabling new digital solutions and products
In an increasingly connected world, the speed at which data flows is rapidly evolving and new digital business
models intensify markets competition. With the digital transformation and developments in technology, more
devices and “things” are getting connected, increasing the enterprises’ network dimensions and complexity
while bringing as many domains as possible to the public internet (cloud centricity). Moreover, COVID-19
has accelerated the digital economy and changed the ways of working, and the ways on which connectivity
resources are consumed.
Global
Footprint Smart
devices
Always
Connected
Work
Everywhere
Worldwide
Connectivity
Digital
Customers Machine
Learning
Cybersecurity (ML)
Wireless Big
Sensors Data
5G
Smart Artificial
Devices Intelligence (AI)
Cloud
Smart Services
Systems Software Defined
Networks (SDN)
3
Enterprise Network Security Architecture Evolution
Today, cyber threats and attacks are recognised as significant global challenges which have serious financial and reputational
consequences and damages. The cyberattack landscape has evolved as cybercriminals changed and adapted their behaviour
and approach, by adopting a business-like mind-set, with streamline processes and tools. Furthermore, with an increased footprint,
attacks are becoming more complex, strategic and sophisticated, impacting enterprises operations, its data confidentiality, integrity
and availability.
Attackers had an urge to prove that They became more public and Attackers have established cybercrime
they could ‘hack’ and that things could targeted victims based on networks that operate and profit like
be ‘broken into’ despite antivirus geography, political ideology and regular businesses. They recruit on a
technology strong financial standing global scale
$6 trillion is the expected cost The average time to identify The worldwide information
of damages from network attacks and contain a data breaches security market is forecast to reach
by 2021 (vs. $3 trillion in 2015) was 280 days in 2020 approximately $170.4 billion in 2022
Source: Cybersecurity Ventures Source: IBM Source: Gartner
Deloitte’s view on network security encompasses five stages of maturity. Pursuing an evolution of the network does not assume
throwing out everything and starting again, as there are critical existing foundations which should be leveraged to accelerate the
transformation. From our experience, most enterprises tend to be around the second stage (Foundations) and third stage (Essentials).
1
Lag behind the competition, with a flat,
• Network perimeters
expensive, complex network that is • Trust assumed within owned networks
frustrating to navigate and cumbersome • Partially automated, disparate monitoring and analytics
to manage
Foundations
2
Early improvements to key tools
and technologies. The organisation
understands where it is going and
Today, enterprises are typically at this stage
how it is going to get there
Essentials
It is easier to get things connected.
New staff and partners are quickly on
boarded. The workplace feels more 3
modern and new tools are becoming
available
Advanced
Working as a truly cloud-based
5
both as an advantage for products and … to Zero Trust principles
services, and as an enabler of seamless • Resources1, not networks
collaboration within the firm and with • No asset is inherently trusted
• Continuous monitoring and analytics
partners. Operating principles aligned
Source: NIST
to Deloitte’s Zero Trust model
1 - Including devices, applications and data
Architectural evolution
Along the journey, enterprises will aim to retire private networks moving towards
public cloud based connectivity, SDPs and micro-segmentation
Today, enterprises face several challenges such as operating on various internal and external networks, managing different
infrastructures and providing services in the cloud. The typical enterprise network increased in complexity but security architecture
did not follow the pace. Solely relying on traditional network security strategies, such as segmentation, is no longer as effective
since once an attacker penetrates a security perimeter, it is extremely difficult to ensure that the network is not compromised.
The evolution of the enterprise architecture security model should thrive towards the ‘never trust, always verify’ principle. Location
is no longer the single critical component since the network perimeters are left behind to focus the security strategy on identity,
cloud based connectivity, SDPs and micro-segmentation.
Architecture evolution
Traditional Foundations Essentials Advanced Optimal
All traffic is encrypted
Encrypted Encrypted Encrypted Encrypted
connection connection connection connection
DMZ
Legend: Intranet Connection Internet connection Perimeter Remote Users External Entities NW Security Control Server Database User device BCAs – Business Critical Assets
• Limited North-South protection and no East-West defence: Open and flat LAN network
1 or with some DMZs in place as a defence zone between intranet/internet
Traditional • VPNs used only for critical applications and lack of encryption on most connections
• Static coarse-grained controls based on IP addresses with static firewall rules and inconsistent ruleset management
3 • Enable remote access without VPN, replacing it for a cloud based secure security gateway service (Secure Web Gateway, SWG)
• Encrypted user to app traffic
Essentials
• E2E segmentation, based on assets and app locations within the network
• Network security controls enhanced with IDS/IPS, NGFWs and Anti-bots
4 • Public cloud and private cloud remote access treated similarly supported by Cloud Access Security Broker (CASB)
• Decouple application access from the network
Advanced
• Reduced number of defence perimeters, based on software defined perimeters (SDPs)
• Use of SSL inspection on all encrypted traffic
5
• Focused micro-segmentation for legacy assets
• Fully automated and orchestrated NW management
Optimal
• All traffic is encrypted including M2M
• Identity and behaviour as the base for remote access permissions
• IP addresses are never exposed to the internet
6
Enterprise Network Security Architecture Evolution
The transition to a network security optimal stage involves much more than an architecture transformation or the implementation
of an off-the-shelf solution. There are required capabilities to be developed, focused on various areas of the network. None of the
capabilities or solutions should be addressed in isolation. It is critical to analyse and specify the dependencies and integrations to
achieve the desired outcomes.
The benefits unlocked in this evolution are visible throughout the journey, covering several areas such as enabling the modern
workplace, reducing and managing risk, optimizing costs and streamlined collaboration.
MPLS based WAN Hybrid WAN (MPLS + Internet) Internet based WAN
WAN / LAN Intranet based architecture Secure Access Services Edge Architecture (SASE)
Connectivity
WiFi + Mobile (2G/3G/4G/5G) WiFi 6 + 5G based WLAN
WiFi based WLAN
+ IoT Protocols based WLAN
Open and flat network Critical areas segmentation Defence in depth approach Focused segmentation for enterprise assets
Segmentation DMZ based approach (e.g. DCs) (E2E segmentation) (micro-segmentation and SDP based)
Main Benefits
• Intranet as the main defense perimeter, covering most of the users and assets
1 Traditional
• Segmentation between internal and external communications
Deloitte’s approach
We work closely with our clients to help them craft and shape their network
security evolution journey and support their transformation efforts
Architecture &
Governance Network
Assess
as-is capability maturity
Policy & Culture
Integration & Organisation
To truly unlock the benefits, Deloitte’s
End-to-End
a range of capabilities Capabilities
across Cyber, IT and the wider Data Assessment Identity
Framework
organisation must be analysed
Devices Operations
Applications
Define
tailored target state & roadmap
Implement
Rising operational Legacy End to end
effectively & overcome challenges
complexity Integration visibility
It is critical to ensure
operations readiness through
an effective implementation
and sustainable transition Securing Talent Organisation Designing
to BAU & Skills collaboration to adaptability
Why Deloitte?
Deloitte’s unique engineering and cybersecurity capabilities present the right set
of skills needed to support our clients on network security transformations
Unique fingerprint
Engineering background and
multidisciplinary teams bridging technical
expertise with strategic consulting skills
Network
Network Security Experience Engineering
Worldwide proven track record of our network protection
offering portfolio covering all the lifecycle of enterprise
networks, aiming to increase security across the entire
organisation
We have experience, resources and tools to help organisations craft an effective network security strategy, as we specialise in
running integrated transformation programs and understand the complexity of change. Deloitte designs integrated solutions
that are fit-for-purpose according to the needs and business outcomes defined by our clients.
Enhanced network
visibility and technical
assessments
9
Contacts
Sponsor
Pedro Tavares
Telecom Engineering Centre
of Excellence (TEE) Leader
[email protected]
Experts
Acknowledgements
Special thanks to whom contributed to this publication in terms of researching, providing expertise, and coordinating:
Sara Soares | Carolina Rodrigues | Ricardo Duarte | Rita Ferreira | Benedita Sobral
Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited (“DTTL”), its
global network of member firms, and their related entities. DTTL (also referred
to as “Deloitte Global”) and each of its member firms are legally separate and
independent entities. DTTL does not provide services to clients. Please see www.
deloitte.com/about to learn more.