Trustv6 in the Network

05/12/2023

Trustv6 in the Network

By Jeffry Handal, Principal SE at Cisco Systems

Introduction

What do IPv6, Zero Trust Architecture (ZTA), and QUIC have in common? They are all making a strong showing in the industry to solve problems in 2023! IPv6 has been the doom and gloom Internet protocol that has finally made its mark in the last few years making up more than 50% of the global traffic in some parts of the world [1]. Zero Trust has been abuzz in the market prompting us to think about security to the point that it is something everyone is concerned about. And QUIC has been that mysterious traffic we have seen on and off spiking in our networks but is now coming to save the day with practical implementations.

This article will take us a bit down memory lane. Then, we will briefly cover the philosophy of zero trust and force you to think about it in a new light founded on the principals of abundance and certainty with observances from a very practical viewpoint.

Memory Lane

Early in my career, the focus of IT was to ensure basic connectivity. Technology, standards, and available services were not as robust as they are today. Security was an optional investment of time, and frankly, many solutions in the market did not offer them. As technology matured, so did the standards. We have moved to a world where connectivity is more reliable to the point, we now have the luxury of moving to protocols like QUIC that are UDP-based. This has freed us to invest more time in other ways to optimize our networks like security. However, it is no accident security has quickly risen to the top of the list. More on this later.

In school, we are taught to solve a problem using a series of constraints and assumptions. The world as we perceive it seems to mimic this behavior in the sense that constraints do exist, and they are not always limited by the technology but more with what we like to call “layer 8” – the human element. The point of this thought experiment is to think the opposite way. Why should we always start with limitations and inhibitors? What if we designed with abundance in our set of assumptions rather than constraints. That would unleash human creativity, uncover new ways to solve problems, and free us to think differently. This is precisely the promise IPv6 offers. It is a resource rooted in abundance. As such, the problem of zero trust should take a different path.

Enough about the past. Let’s start to explore how IPv6 and security go together to help us create productive environments for the people we serve.

Zero Trust Decoder Ring

We have all heard security is like an onion in that it has layers. Have you ever stopped to ponder what does that mean in practical terms? If you have not, consider this: it’s about reducing risk and knowing at each layer what the consequences are. For example, contemplate the perimeter SD-WAN firewall as the outer layer of the onion. It helps you mitigate risk from the outside world – the broader Internet. An inner layer may be the host firewall of your operating system; it helps you limit access from the broader Internet and your internal network domain.

(Free access, no subscription required)

Zero trust is not a new concept; it is defined by many in various ways. However, one thing should remain clear: it is not a product! Simply put, it is a mindset. A mindset that means we all have a responsibility (including users) to ensure an efficient, secure use of company resources to boost productivity.

Another security reference plan I like to reference is Cisco’s Secure Architecture for Everyone (SAFE) [2]. It breaks down layers of security into elements we can relate to easily and adapt to our own environments. The point of the model is to understand our operation, involve all the stakeholders, and figure out the capabilities we have to reduce that risk. In the context of zero trust, it provides a powerful blueprint that identifies gaps and creates targets we can set our eyes on. The goal is to develop an attainable journey toward a zero trust modus operandi.

Trustv6

The Internet was founded on the principle of end-to-end connectivity. As mentioned earlier, first, we focused on connectivity. Then, technology matured and became stable; it set the expectation of reliability. This is in turn has allowed the Internet community to shift focus and develop new protocols and principles like the subject of this article. Zero trust promises the ability to work securely from anywhere and at any time. However, if your zero trust mindset is predicated on the prevalence of IPv4, you just put a wrinkle in the promise stated earlier. What happens to users on IPv6-only networks? Do they not get access?

The views expressed by the authors of this blog are their own and do not necessarily reflect the views of LACNIC.

Subscribe
Notify of

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments