AppGate SDP-Reference Architectures 072020
AppGate SDP-Reference Architectures 072020
– REFERENCE ARCHITECTURES
1. Introduction ............................................................................................................................ 2
2. What is the Software-Defined Perimeter? ............................................................................ 3
3. Today’s Network Model......................................................................................................... 4
4. How Does Appgate SDP Work? ........................................................................................... 6
Step-by-Step ....................................................................................................................... 7
The Components ................................................................................................................ 7
Controllers ........................................................................................................................... 7
Clients ................................................................................................................................. 8
Gateways ............................................................................................................................ 8
Single interface Site ............................................................................................................ 9
Dual interface Site ............................................................................................................... 9
Multi-interface Site .............................................................................................................. 9
Site without NAT ............................................................................................................... 10
Textbook SDP Model ........................................................................................................ 10
Management network ....................................................................................................... 12
5. Journey from Today’s Network to SDP............................................................................... 12
SDP with Users on the Inside ........................................................................................... 13
SDP with Single Tunnel (VPN Alternative) ....................................................................... 15
SDP with Multiple Tunnels ................................................................................................ 18
6. Resources ........................................................................................................................... 20
Security and compliance is now a mainstream requirement within the Enterprise and has both
visibility and support at the highest levels. Previously, security was typically added after the fact
and was often seen as a barrier to business & innovation. With the new Software-Defined
Perimeter [SDP] approach, the conversation has shifted to how fast (and seamlessly) SDP can be
deployed at scale into complex enterprise environments (to achieve Zero Trust).
Often, the main barrier to the adoption of SDP is how to make it work with legacy networks.
Many large organizations are invested in significant legacy network infrastructures, which cannot
simply be taken down and replaced wholesale over a weekend. This means that new and old will
have to live alongside one another for a period of time. During this period, old concepts like
having three (Europe, Asia, Americas) huge redundant points-of-access into the network can
gradually be dismantled and replaced with the fully distributed model which underpins SDP.
Appgate SDP is Appgate’s implementation of the SDP architecture. It implements the core
architecture principles and has filled in the gaps with unique capabilities. The most unique
aspects being that it operates at the network layer, providing direct connectivity from the user
to multiple protected networks/resources while operating in real-time responding to
environmental changes as they happen.
Appgate SDP has some very specific advantages over traditional legacy infrastructures:
• Created for the Hybrid Cloud: Appgate SDP was designed to protect all enterprise &
cloud resources, including transient workloads. Appgate SDP has a flexible, distributed
deployment model to suit any architecture, automatically detects server instance creation,
and leverages user and server attributes to determine access. Appgate SDP also bridges
and integrates all elements of the enterprise hybrid cloud infrastructure, controlling access
to authenticated users to appropriate cloud resources, wherever they may be.
• Seamless Integrations: Appgate SDP can reduce cost, complexity and effort of
configuring third-party access, privileged user access and cloud infrastructure security. It
combines authorization, encryption and access control in one system, replacing many
traditional point products. Appgate SDP also integrates with identity, multi-factor
authentication and SIEM solutions, allowing enterprises to take advantage of existing
security infrastructure. This enforces strong authentication and enables organizations to
better integrate security requirements into their identity management life cycles.
• Security where it’s needed: Appgate SDP works on a distributed model. This allows for
a topology which closely couples the security controls with the hosts/apps themselves.
This ensures traffic is encrypted over any networks being used to access the hosts/apps
and that the actual access controls are very close to the hosts/apps themselves.
More importantly, the SDP security model has been shown to stop network attacks including
DoS, Man-in-the-Middle, Server Query (OWASP10) as well as Advanced Persistent Threats
(APT). SDP was not designed as another DMZ add-on to an existing set of security controls
such Proxies or VPNs.
Rather, this new model provides an alternative to these outdated tools which were
developed in a time before (hybrid) Cloud became all pervasive.
It is important to understand that Appgate SDP has filled in the gaps in the SDP model as
defined by the Cloud Security Alliance — and extended the model with its own very
distinctive flavor. However, the key principles remain:
• The first principle is that users and their devices live outside the new Software-Defined
Perimeter. If you consider for a moment the data center model many businesses operate
today; this forces users to operate outside of the building/network. So, this approach is
not all that novel. Also, modern day working practices have moved on from the idea that
everyone commutes to and works in the office.
While SDP is new, today’s network model is already over twenty years old. It evolved when
Microsoft-powered PCs and ethernet based LANs dominated the business world. At that
time, the Internet was becoming well established, so TCP/IP seemed to be the logical way to
connect up sites and later data centers. But TCP/IP was never designed to address all of
these different use cases to which it has been applied. Maybe the biggest issue being its
inherent lack of any up-front security when establishing new connections.
Today’s network struggles as IP-based devices are no longer tied to users’ desks and
connected via CAT5 cabling to a managed infrastructure with a defined boundary. Securing
today’s networks has become increasingly difficult, especially given the increasingly complex
and disparate range of (network) security systems deployed both within and around the edge
of the network to try to compensate for TCP/IP’s shortcomings.
Within these networks high availability has been provisioned by having multiple redundant
systems with yet more network systems deployed to manage the traffic. These systems
needing to be configured to work for users on the inside as well as ones coming in via VPN
from the outside.
The need for redundancy and user’s different geographies often require these network sites
to be linked to many other sites over some form of WAN. While these sites may appear
somewhat separate from one another, often the rules governing the WAN are fairly open so
lateral movement between sites is relatively easily achieved. In reality they look like one big
network thus making them very easy to exploit once a bad actor has established a foothold.
Before examining the Appgate SDP model, let’s remind ourselves of the four main changes
driving many organizations to realize that the time has at last arrived when we should be
retiring these legacy networks and replacing them with the Software-Defined Perimeter:
Appgate SDP utilizes user context to dynamically create a secure, encrypted network
‘segment of one’ tailored for each user session. The Appgate SDP usage model is the same
wherever it is deployed and can be described in a few simple steps:
1. User authentication: The user authenticates to the Appgate SDP Controller, which is
optionally connected to an enterprise’s IAM system (AD, LDAP, Radius or SAML)
2. Controller applies access policies: The Controller applies policies assigned to the user
based on user attributes, roles, and context, and then issues signed Entitlement tokens
listing the resources the user is allowed access to.
3. User accesses resources: The authenticated user can now access protected resources
behind a Gateway.
4. Gateway evaluates User Entitlements: The Gateway evaluates Entitlements in real-time,
ensuring that all conditions are met. For example: network location, time of day, device
health, or service metadata, such as security groups. Users may be prompted for
additional information, such as a one-time password.
5. Gateway opens connection to resource: If the Gateway determines that required
conditions have been successfully met, it will open a connection to the protected resource
specified by the user.
6. All steps in the process are logged: Throughout the authentication and authorization
process, all the steps pertaining to the user, resources, and decisions made by the
Controller and Gateways are logged. There is an integral LogServer which can be used
for this or logs can be sent to the enterprise SIEM for additional action. The LogServer
outside the scope of this Reference Architecture document.
7. Detects new services: The Gateway constantly monitors for the creation of new
hosts/services, and - based on this metadata and the user’s Entitlements – adjusts user
access as necessary.
The Components
The entire Appgate SDP system is designed to be distributed and to offer high availability.
One key element that underpins this is the use of Single Packet Authorization (SPA) to hide
TCP ports on servers/appliances until a very specific wake-up packet is received from a
connecting device. This allows the appliances to be cloaked from hostile users thus
enhancing availability for authorized users.
Let’s look at how the individual components contribute to the highly available operation of the
overall Collective.
Controllers
For full high availability operation, Clients are designed to handle multiple DNS A records to
obtain the list of all available Controllers they can try. Otherwise a Load balancer can be
used to distribute the traffic based on Performance, Weighting, Geography, etc.
The Controllers utilize multi-master database synchronization for high availability, based on
an eventual consistency concept. The communication between Controllers happens on bi-
directional TCP port 444 (mutual TLS connectivity) for control channel messages and bi-
directional TCP port 5432 for encrypted mutual database synchronization. The database is
mainly used by the Controllers to store the configuration, Policies and Entitlements and the
occasional changes to the user’s IP addresses. Most database operations are therefore read
operations (used to generate the tokens which contain the session information). The use of
eventual consistency synchronization means there is no real-time syncing required for the
Clients
The Client has to use a specific pre-shared SPA key to open the TCP (UDP) connection with
Appgate SDP appliances.
The Client connects on port 443 (TLS) and passes only system control data. At first
connection it will check that the Controllers certificate is valid as it will be used in this and
subsequent communications to verify the authenticity of the Controller.
The Client will ask for authentication credentials and optionally the device needs to go
through an on-boarding procedure which might include the use of use a One Time Password
(using the built-in or an external Radius service configured by the customer). The device will
receive an on-boarding cookie that glues user credentials with device ID, thus marking the
device as friendly. When on-boarding is disabled, a valid user (username and password) will
only be able to use friendly devices.
The Client generates its own private/public key pair and based on this receives a Client
Certificate signed by the CA that will be used for all subsequent mutual (D)TLS connections
between the Client and Gateways. This traffic from Clients to Gateway comprises both
system control data and application data.
Gateways
After successful authentication, the Client receives a number of Site-based Entitlement
tokens signed by one of the Controllers which contains; the list of all available Gateways for
that Site and the list of descriptive network entitlement Actions for that user on that Site. (A
Site is a special term denoting a logical grouping of protected hosts which might span more
than one physical location.)
The Client connects to one of the Gateways in the Site based on a pre-set weighting. No
load balancers are required in front of the Gateways. The Gateway will verify the token’s
signature before using any defined Actions to create a micro private firewall for this specific
user session.
Gateways will receive mutual (D)TLS traffic on port 443 from the Clients and will send and
receive mutual TLS traffic on port 444 with Controllers and LogServer. There is no
communication between Gateways whatsoever.
Gateways can be deployed in a number of different ways. Before we go on to look at the
different network architectures that can be used it is worth just focusing on the Gateways
themselves to understand their immediate deployment options.
Multi-interface Site
This deployment scenario is useful where the Gateway may need to access different subnets
which are isolated from one another. Maybe one requires a higher security level such as PCI
related services.
Management network
Not shown in above is any reference to management networks which are common place in
today’s data centers. However all Appgate SDP appliances come with the ability to support
multiple NICs. It is therefore very easy to link all the appliances to any management network
while maintaining full separation from the user traffic. The (delegated) administration policies
can also be tailored so that only Clients connecting from the IP range of the management
network would be granted admin UI access.
Benefits Issues
• Encrypted connections (no VPN • Backwards compatibility with today’s
required) topology
• Network resource cloaking (SPA)
• Device On-boarding
• User based rules (no NAC required) Mitigation
• Multi-Gateway access (no load • Use the intermediate topologies
balancing) suggested below
• Users live outside the protected
network
Most organizations have existing (typically complex and messy) networks, hosting numerous
users and production applications. SDP can still be deployed in these transitional
environments to very good effect; so let’s look at 3 different models each using Appgate SDP
as its basis, that might form part of any implementation journey.
One of the key benefits of Appgate SDP model is the 'segment of one' based on user context.
By using attributes, such as group memberships, it is quite easy to implement some simple
departmental Policies inside Appgate SDP, which might for instance allow a group of existing
users access to a whole subnet.
Because these policy objects behave quite independently, each can be fine-tuned when the
time is right until the ultimate 'segment of one' is achieved for all user groups.
NAC wraps a mixed-use legacy network with (somewhat limited) access policies which
selectively allow only friendly actors to join the mix. SDP’s primary goal is to utilize powerful
access policies to selectively allow friendly actors to connect to defined resources (or
networks) and block all else. The similarity is that both manage the process that allows users
to be granted access to protected hosts. In using SDP to solve a problem where a traditional
NAC solution might be considered, the fundamental prerequisite is that users MUST first be
segmented away from the protected hosts. This may be as simple as splitting the WIFI from
the wired network or creating a couple of subnets and then positioning an Appgate SDP
Gateway such that it can securely connect them back together again. Once the split is done
then SDP does not care if the user network is at the same location (e.g. the WIFI network) or
if users are working remotely (VPN style); the same controls can be used for both (although
the Policies might be different). And if the split is done effectively—any lingering NAC
requirement should vanish.
The user network would allow access to the Appgate SDP system (but not the protected
hosts) and the Client would establish a secure connection to the Gateway. Policy would
allow the users access to the protected hosts – possibly using a subnet wide access rule if
the specific access rules were not known at the time. Best practice suggests setting the
internal DNS to resolve to the external Gateway IP address to avoid any issues when users
move from the user network to VPN (outside); and after all this is only a transitional state on
the journey to full SDP.
The local Gateway (to the user) could still resolve hosts on other sites according to the
existing networks DNS servers and the traffic forwarded over the WAN to any such hosts.
In this scenario the external capabilities of the Appgate SDP system need not necessarily be
used. So all the traffic (TLS) could be routed over internal networks and the WAN. The
Gateway prevents direct access to the protected hosts and any network routing is updated to
reflect this. The Clients would build routing tables based on the configured Entitlements.
Benefits Issues
• Encrypted connections on user 1. Need to keep users away from hosts
network 2. When used outside the enterprise
• Device On-boarding network, internal/external DNS can be
• Protected hosts are not visible o the challenging
LAN/WAN
Mitigation
• User based rules (no NAC required)
1. Need to do some network
• Users live outside the protected segmentation
network 2. Follow the DNS guide lines in the
manual
Benefits Issues
1. Must have duplicate Entitlements on all Sites
2. No real-time failover between regions
• Encrypted connections
• Device On-boarding Mitigations
• External services are ‘cloaked’ 1. Use Deployment Site option
• Geographic based access for 2. Give users the choice of regional IdPs to use
users
Benefits Issues
1. tunIP appears in multiple parts of the
network
• Encrypted connections 2. Can be some routing issues to resolve
• Device On-boarding
• External services are ‘cloaked’ Mitigations
1. Use Mapped IPs per site
2. Ensure Entitlements are set per Site
6 . RESOURCES