dc.contributor.author |
Badenhorst, Danielle P
|
|
dc.contributor.author |
Barbour, Graham D
|
|
dc.contributor.author |
McDonald, André M
|
|
dc.contributor.author |
Gertenbach, Wian P
|
|
dc.contributor.author |
Buckinjohn, Ethan
|
|
dc.date.accessioned |
2024-07-30T09:41:56Z |
|
dc.date.available |
2024-07-30T09:41:56Z |
|
dc.date.issued |
2024-03 |
|
dc.identifier.citation |
Badenhorst, D.P., Barbour, G.D., McDonald, A.M., Gertenbach, W.P. & Buckinjohn, E. 2024. On the zero-trust intranet certification problem. http://hdl.handle.net/10204/13739 . |
en_ZA |
dc.identifier.uri |
DOI: https://doi.org/10.34190/iccws.19.1.2054
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/13739
|
|
dc.description.abstract |
Securing corporate networks and ensuring the trustworthiness of network resources are critical security concerns for organisations in today's interconnected digital landscape. The zero-trust security model is an approach to designing and implementing ICT systems which prescribes that clients and servers cannot be trusted automatically, even when connected to networks traditionally considered trusted. The implementation of the zero-trust model within the corporate intranet requires a secure method to verify the identity of local servers. On the Internet, trust in the identity of public servers is established by well-known public Certificate Authorities (CAs), which issue digital certificates to securely identify servers. However, local intranet servers exist within the internal address space of the network. Consequently, it is impossible to naturally obtain digital certificates for these servers, validly signed by a public CA, without publicly disclosing sensitive information such as intranet server Domain Name System (DNS) records. This leaves organisations with the option of relying on endpoint management systems to install custom CA root certificates on all corporatre browsers or, in some cases, ignoring the problem altogether. In this paper, we draw on practical experience in the deployment of cybersecurity devices in corporate intranets to formally define the intranet certification problem. We specify five requirements that a solution to this problem must satisfy. We then conduct a comprehensive review of existing candidate solutions and academic research relevant to the intranet certification problem. Specifically, existing ICT systems for public key infrastructure and endpoint management are identified and evaluated with respect to their ability to meet the stated requirements for solving the intranet certification problem, as well as their cost. Our study reveals that solutions that meet the technical and security requirements of the intranet certification problem are beyond the reach of smaller private sector companies and public sector organisations in underdeveloped and emerging economies. The high cost and technical expertise required for their implementation and management render these solutions impractical. Consequently, by relying on servers with self-signed certificates, these entities inadvertently leave their servers susceptible to impersonation, information theft, and unauthorised resource access, thus violating the fundamental principles of the zero-trust model. We conclude that a gap exists for a simple, cost-effective, and easily managed solution to the intranet certification problem. |
en_US |
dc.format |
Abstract |
en_US |
dc.language.iso |
en |
en_US |
dc.relation.uri |
https://papers.academic-conferences.org/index.php/iccws/article/view/2054 |
en_US |
dc.relation.uri |
https://www.academic-bookshop.com/ourshop/prod_8162931-Proceedings-of-the-19th-International-Conference-on-Cyber-Warfare-and-Security.html |
en_US |
dc.source |
Proceedings of the 19th International Conference on Cyber Warfare and Security (ICCWS), Johannesburg, South Africa, 26-27 March 2024 |
en_US |
dc.subject |
Zero-trust |
en_US |
dc.subject |
Public-key infrastructure |
en_US |
dc.subject |
Endpoint management |
en_US |
dc.subject |
Man-in-the-middle |
en_US |
dc.subject |
Self-signed certificates |
en_US |
dc.subject |
Intranet |
en_US |
dc.title |
On the zero-trust intranet certification problem |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.description.pages |
9 |
en_US |
dc.description.note |
Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, please consult the publisher's website: DOI: https://doi.org/10.34190/iccws.19.1.2054 |
en_US |
dc.description.cluster |
Defence and Security |
en_US |
dc.description.impactarea |
Inf and Cybersecurity Centre |
en_US |
dc.identifier.apacitation |
Badenhorst, D. P., Barbour, G. D., McDonald, A. M., Gertenbach, W. P., & Buckinjohn, E. (2024). On the zero-trust intranet certification problem. http://hdl.handle.net/10204/13739 |
en_ZA |
dc.identifier.chicagocitation |
Badenhorst, Danielle P, Graham D Barbour, André M McDonald, Wian P Gertenbach, and Ethan Buckinjohn. "On the zero-trust intranet certification problem." <i>Proceedings of the 19th International Conference on Cyber Warfare and Security (ICCWS), Johannesburg, South Africa, 26-27 March 2024</i> (2024): http://hdl.handle.net/10204/13739 |
en_ZA |
dc.identifier.vancouvercitation |
Badenhorst DP, Barbour GD, McDonald AM, Gertenbach WP, Buckinjohn E, On the zero-trust intranet certification problem; 2024. http://hdl.handle.net/10204/13739 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Badenhorst, Danielle P
AU - Barbour, Graham D
AU - McDonald, André M
AU - Gertenbach, Wian P
AU - Buckinjohn, Ethan
AB - Securing corporate networks and ensuring the trustworthiness of network resources are critical security concerns for organisations in today's interconnected digital landscape. The zero-trust security model is an approach to designing and implementing ICT systems which prescribes that clients and servers cannot be trusted automatically, even when connected to networks traditionally considered trusted. The implementation of the zero-trust model within the corporate intranet requires a secure method to verify the identity of local servers. On the Internet, trust in the identity of public servers is established by well-known public Certificate Authorities (CAs), which issue digital certificates to securely identify servers. However, local intranet servers exist within the internal address space of the network. Consequently, it is impossible to naturally obtain digital certificates for these servers, validly signed by a public CA, without publicly disclosing sensitive information such as intranet server Domain Name System (DNS) records. This leaves organisations with the option of relying on endpoint management systems to install custom CA root certificates on all corporatre browsers or, in some cases, ignoring the problem altogether. In this paper, we draw on practical experience in the deployment of cybersecurity devices in corporate intranets to formally define the intranet certification problem. We specify five requirements that a solution to this problem must satisfy. We then conduct a comprehensive review of existing candidate solutions and academic research relevant to the intranet certification problem. Specifically, existing ICT systems for public key infrastructure and endpoint management are identified and evaluated with respect to their ability to meet the stated requirements for solving the intranet certification problem, as well as their cost. Our study reveals that solutions that meet the technical and security requirements of the intranet certification problem are beyond the reach of smaller private sector companies and public sector organisations in underdeveloped and emerging economies. The high cost and technical expertise required for their implementation and management render these solutions impractical. Consequently, by relying on servers with self-signed certificates, these entities inadvertently leave their servers susceptible to impersonation, information theft, and unauthorised resource access, thus violating the fundamental principles of the zero-trust model. We conclude that a gap exists for a simple, cost-effective, and easily managed solution to the intranet certification problem.
DA - 2024-03
DB - ResearchSpace
DP - CSIR
J1 - Proceedings of the 19th International Conference on Cyber Warfare and Security (ICCWS), Johannesburg, South Africa, 26-27 March 2024
KW - Zero-trust
KW - Public-key infrastructure
KW - Endpoint management
KW - Man-in-the-middle
KW - Self-signed certificates
KW - Intranet
LK - https://researchspace.csir.co.za
PY - 2024
T1 - On the zero-trust intranet certification problem
TI - On the zero-trust intranet certification problem
UR - http://hdl.handle.net/10204/13739
ER -
|
en_ZA |
dc.identifier.worklist |
27898 |
en_US |