Zero Trust in Real Time

Introduction

 Cybersecurity has always been designed with an ‘under a lock-and-key', or moat around the castle mentality. However, in today’s fluid and supply-chain driven risk mitigation realm, the focus on perimeter defenses only ensure that external malicious actors are kept at bay. Unfortunately, these malicious actors are sometimes provided golden keys that land them directly inside the castle without having to fight a single knight or archer. That's where we find ourselves typically in today’s world of interwind supply chain and ecosystem of both custom and OpenSource software distribution, and with the current Apache Log4j vulnerability & Log4Shell Exploitation (as represented in Figure 1 above), providing us a zero-trust in real-time exercise in action at a global scale!

Diagram

Description automatically generated

Figure 1: Log4j She'll Handler Infographic (Source Credit: AdvIntel)

 

Purpose

This Whitepaper takes you through the background of one of the largest and most widespread cases of upstream software supply chain vulnerabilities and attacks.  It takes you through the steps you should consider taking, not just when a zero-day attack is alerted, such as in the case of Log4j, but actions prior to an event, in order to enhance your Cybersecurity footprint and to align your organization to the Zero Trust Architecture (ZTA) models set forth from institutions such as, National Institute of Standards & Technology (NIST), Cybersecurity & Infrastructure Security Agency (CISA), National Cybersecurity Center of Excellence  (NCCoE), Australian Cyber Security Centre (ACSC) or EU Agency for Cybersecurity (ENISA).

Audience

This Whitepaper is intended for IT and Cybersecurity administrators and product evaluators who are familiar with Omnissa Workspace ONE and Omnissa Horizon. Familiarity with networking and security practices, such as identity management and endpoint protection is assumed. Knowledge of other technologies, such as Virtual Private Network (VPN) and specific Omnissa solutions including Workspace ONE Intelligence, Access and is also helpful.

Background

Apache’s Log4j is a widely-used, open-source logging library utility exists in the action of the Java Naming and Directory Interface (JNDI), which takes to resolve variables embedded within numerous cloud and enterprise apps including numerous popular cloud-hosted services of the likes of Minecraft, iCloud, Cloudflare and Twitter, to track software activity. affecting Apache’s Log4j library, versions 2.0-beta9 to 2.14.1 (and subsequently versions 2.15>16 as well).  

"A weakness in the computational logic (e.g., code) found in SW / HW components that, when exploited, results in a negative impact to CIA-triad e.g. confidentiality, integrity, or availability. Mitigation of the vulnerabilities in this context typically involves coding changes but could also include specification changes or even specification deprecations (e.g., removal of affected protocols or functionality in their entirety)."

And, with the deep ubiquity and integration within these hosting services and servers and Apache tool makes the extent of this zero-day’s potential damage likely wide-reaching and is likely to affect hundreds of millions of devices.  Worst, it didn’t take a week to find that not only was there an original vulnerability for which an exploitation could be leveraged for a rogue Command & Control in the distribution of malware or exfiltration of data etc... there was also the risk of a Denial of Service (DoS) attack vector for affected servers/services as well documented in a separate but tangible CVE-2021-45046. 

Later, a ‘third’ CVE which was released as well: CVE-2021-45105 with a base CVSS Score of 7.5.  The Apache Software Foundation's log4j project then disclosed the new vulnerability identified by CVE-2021-45105; and expressed their belief that this flaw seems to be a non-critical DoS-only as was the 2nd vulnerability, which is much tighter in scope for attack vectors than the previous 2 vulnerabilities.

That changed quickly! Although controversial in its true scope and exposure, security researcher ‘1ZRR4H’ as of that following weekend, identified what they called a ‘Log4J worm’. It was supposedly a self-propagating Mirai bot. The aggregated sample was analyzed, and others differed with their conclusion or it’s true worm-like viability; nonetheless, the rapid evolution and exposure would seem to point at its probability in the not-so-distant future?

Cybersecurity Information Sharing Act (CISA) - Apache Log4j Vulnerability Guidance

 

Figure 2: CISA Log4j Guidance Infographic

Reflective of this dialogue and through actualization of the current expanding scope and spiraling escalation of these vulnerabilities, CISA and its partners, through the ‘Joint Cyber Defense Collaborative’ in response, also created a rare, specific webpage (see summary above), to track updates for Apache’s Log4j vulnerability and an updated resource to provide guidance and will actively maintain a community-sourced GitHub repository of publicly available tools, including a scanner and vendor-supplied advisories regarding the Log4j vulnerability. CISA provided continual updates for both of those webpages and the GitHub repository.  They’ve also included an updated government-wide Emergency Directive (ED 22-02) directing federal agencies to mitigate the Apache Log4j vulnerability.

 

Situation

Setup

Below is the situational setup of the Log4j vulnerability:

Scope

Below is the situational scope of the Log4j vulnerability:

  • Apache’s service was and still is very broadly used in a variety of consumer and enterprise services, websites, and applications including numerous popular cloud-hosted services of the likes of Apple’s iCloud, Minecraft, Cloudflare and Twitter—as well as, in operational technology (OT) products—to log security and performance information:
    • An unauthenticated remote actor could exploit this vulnerability to take control of an affected system and provide them a C2 e.g. malware / phishing campaigns or simply exfiltration e.g. $ or info
    • The 2nd flaw has been found in the same logging utility, one that could crash websites & serve as a DoS

Actions

 Below is the situational actions required from the Log4j vulnerability:

  • Scale to find what apps have vulnerable versions of Log4j
  • Discover which apps have the vulnerability
  • Halt attacks against it today, don’t wait for a patch or WAF signature updates, and lastly…
  • Future-proof your code and protect against the zero-day vuls as they come to pass

Text

Description automatically generated

 Figure 3: Source Credit: Black Hat USA Infographic

Solution: Zero Trust the next Battlefield

So how does the community respond to an event this widely deployed into the fabric of the technology community and thus, enterprises and agencies worldwide?  This brings us to the new battlefield. 

Text

Description automatically generated

Figure 3: Source Credit: Black Hat USA Infographic

Setup: Battlefield

  • Breadth & Depth; unknown, undocumented and unseen? This had been in making for years…
  • How long must you play on a given battlefield?! This issue will be around for some time, as are other vulnerabilities and their malicious variants and actors developing against them ex. Mirai / SolarWinds / Spectre-Meltdown

Scope: Land & Expand

  • Where’s the beachhead?  How do you stop an attack that is already inside your walls, within your fabric of operations and doesn’t need sophisticated threat actor involvement?
  • How quickly is the next Cyber / supply chain or infrastructure attack going to take this time? 

Action: Campaign

  • In the initial hours, CISA and others tracking this had not identified any ‘active campaigns
  • Within days, several campaigns have already been detected in the wild ex. several were putting ransomware and remote-access-Trojans on Windows machines with Java installed.
  • Malicious actors will continue to sequence the vulnerability as detailed via MITRE’s cyber threat actor’s tactics and techniques as represented below.

Diagram

Description automatically generated with medium confidence

Figure 4: MITRE’s cyber threat actor T&Ts Infographic

Solution: Zero Trust Resilience

How does the protection and mitigation work in taking aim at futureproofing against the incarnation of the next versions of a Log4j vulnerability and attack? By deploying a sound set of Zero Trust Architecture foundations that can start with levels of existing controls and expanding to include more advanced features as defined in the Zero Trust Maturity Model (ZTMM) that can help organizations reference as they transition towards a ZTA. The maturity model aims to assist all orgs in the development of zero trust strategies and implement plans to present ways malicious actors can attack them.

Zero Trust Tenets/Pillars (deployed at every level):

  •           Because Zero Trust assumes that the exploiter is already inside the perimeter, a supply chain exploit can go after this vulnerability from the inside, gaining Remote Code Execution (RCE) in the logging asset, with its privilege; thus, data isolation and segmentation is crucial along with new dynamic security controls.

Granular Isolation (e.g. microservice, container, app), data):

  •           Limit the compromised behavior to only intended, tested aspects with least privilege & least capability actions available to the least amount of data.

Continuous Enforcement (on ‘every transaction’):

  •           Exploit will need to mirror the allowed actions of the component only, without any access to the policy, guessing right at every move, for every hop; thus, dynamic conditional access policies are needed at all phases.

Inline & Realtime Verification:

  •           Any anomalous action outside of those intentions would be blocked that would be blocked by continuous enforcement and verification, at a point outside of the component failure domain.

Universal Coverage & End-to-End Coverage:

  •           All subjects and objects are identified and access restricted, so many malicious behaviors will be disallowed.

Exploitation of App Workloads/Services Limitation:

  •           Similarly, unlike the many exploits with specific mitigations that are being discussed right now in the industry, it is important to remember that remediation, and the speed of that remediation in the forms of detection and response will be paramount under the concept that it isn't if, but when a breech will occur. 

Graphical user interface

Description automatically generated with medium confidence

Figure 5: The seven ZT Tenets from NIST SP 800-207 ZTA

Implementation: Zero Trust

Key implementation features for Zero Trust regarding endpoint protection and the data resources they access can leverage Omnissa’s approach, which ensures that only authorized personnel can access sensitive information, reducing the risk of data breaches. It is important to deliver a seamless, secure mobile management experience across multiple platforms and devices including but not limited to:

  1. Unified Management: 
  • Streamline device management, ensuring uniform policies across all platforms from traditional windows systems to iOS, Android or ChromeOS based. 
  • Manage a broad range of operating systems, from iOS, Android, ChromeOS to Mac OS, Windows, WinServer, and Linux-based systems, through a single, intuitive admin console. 

For more information see: Omnissa Workspace ONE on TechZone

  1. Access Controls: 
  • Provide conditional access policies to apply policies restricting access based on a large host of environmental data, while ensuring control of your data only from trusted users, in trusted locations, on trusted devices.
  • Leverage role-based access controls (RBAC) to tailor permissions based on geographic function, role, and location. 

For more information see:

Zero Trust Secure Access to Traditional Apps thru Omnissa <and>

  1. Identity Management:
  • Assist Identity Management (IdM) with Identity Providers (IdPs) by integrating Omnissa’s identity broker solution - Workspace ONE Access for both traditional and mobile platforms.
  • Leverage Workspace ONE Access to provide authentication and authorization policies to enforce conditional access, as well as provide a layer of passwordless and phishing-resistance.

For more information see:  Omnissa Access on Tech Zone

  1. Advanced Security Measures: 
  • Utilize FIPS 140-2 validated modules for enhanced device security, including AES 256-bit Data-at-Rest (DaR) and TLS 1.3 for Data-in-Transit (DiT). 
  • Employ an automated compliance engine to enforce security settings tailored to specific functions. 

For more information see: Omnissa Security & Compliance on Tech Zone

  1. Scalable Architecture: 
  • Support a multi-tenant architecture capable of scaling with your organization's needs. 
  • Ensure seamless management and distribution of both internal and public apps for official use. 

For more information see: Omnissa Workspace ONE & Horizon Architecture on Tech Zone

  1. Comprehensive Data Protection: 
  • Maximize data loss prevention (DLP) and secure content collaboration. 
  • Encrypt and containerize email communications, providing a secure alternative to native email clients. 

For more information see: Workspace ONE UEM Mgmt Modes on Tech Zone

  1. Intelligence 
  • Dashboards
  • Reporting
  • AI learning of baselines. 

For more information see: Workspace ONE Intelligence on Tech Zone

Summary and Additional Resources

  

Summary

  The value of built-in resilience is as a ‘complement’ to the rest of security! The aim and goal should be preserving security resiliency during times of zero-day notification, through exploitation activities and the advancements or updated versions of attacks from the vector by deploying these Zero Trust framework based on NIST’s 7 tenets, strategies, and tools of Zero Trust that extend through the CISA pillars and the Zero Trust Maturity Model (ZTMM). At Omnissa, we have a three-pronged approach to mitigate endpoint security challenges by:

  • Enabling Risk-based Secure Access by mitigating endpoint risk with a proactive remediation within conditional access implementation
  • Building a smart and extensible platform capable of enhancing endpoint compliance and device remediation scope and speed
  • Accelerating information sharing with integrated partner’s solutions to reduce exposure

Additional Resources

And for further Zero-Trust assets on Tech Zone, see:

 

Changelog

The following updates were made to this guide: 

Date 

Description of Changes 

2024/11/22

  • Updated for Omnissa docs, KB, and Tech Zone links.

2022/09/08

  • Guide was published.

 

About the Author and Contributor 

The following people contributed their knowledge and assistance with this document: 

Feedback 

Your feedback is valuable. 

To comment on this paper, contact Omnissa at tech_content_feedback@omnissa.com.

Filter Tags

Document WhitePaper Intermediate Public Sector Zero Trust