Transcript
Cyberwire Host (0:02)
You're listening to the Cyberwire Network, powered by N2K.
Conference Promoter (0:14)
Most security conferences talk about Zero Trust Zero Trust World puts you inside this is a hands on cybersecurity event designed for practitioners who want real skills, not just theory. You'll take part in live Hacking labs where you'll attack real environments, see how modern threats actually work, and learn how to stop them before they turn into incidents. But Zero Trust World is more than labs. You'll also experience expert led sessions, practical case studies, and technical deep dives focused on real world implementation. Whether you're blue team, red team, or responsible for securing an entire organization, the content is built to be immediately useful. You'll earn CPE credits, connect with peers across the industry and leave with strategies you can put into action right away. Join us March 4th through the 6th in Orlando, Florida. Register now at ztw.com and take your zero trust strategy from Theory to execution.
Rick Howard (1:28)
The word is security. Service edge. Spelled security as in protection against threats, service as in a utility to carry out a particular purpose, and edge as in the border of secured access, A security architecture that incorporates the cloud shared responsibility model. A vendor provided security stack and network pairing with one or more of the big content providers and their associate fiber networks. Example sentence the organization's SSE solution allowed the employee to securely access company services remotely. Origin and Context Gartner coined the term SASE Secure Access service edge in 2019 to represent a fundamental shift in security architecture thinking away from the traditional perimeter defense model. SSE is a modification of the SASE model by making it less complex. In other words, it removes one of the SASE components that network defenders realized was not essential. SD WAN since the early Internet days, circa 1995, network defenders typically established a perimeter defense between their internal digital assets and the outside world. Organizations established one or more Internet connections with a service provider and connected remote offices, data centers, and endpoints via internal lease lines. Network defenders deployed their security stack tools like firewalls and intrusion detection systems at the Internet boundary, and network managers ensured that the data flow would always traverse through the security stack. But lease lines are expensive, and the typical number of tools in the security stack in today's environments are can be upwards of 300, depending on how big the organization is. At the same time, local Internet connections have become so inexpensive and reliable that it doesn't make sense to pay for internal lease lines anymore. It's easier just to let the remote offices connect to the Internet themselves, but that means the network defender team has to deploy the security stack in multiple locations. The management complexity of the situation has become exponential and the money we saved by removing the lease lines is consumed again by maintaining multiple sets of the same security stack. SASE changed that model and it has four components. 1. A SASE cloud Provider Instead of each network defender managing and maintaining their own internal security stack, the SASE vendor provides a stack in multiple data locations around the world. The first network hop out of the customer location is through their SASE vendor. The SASE customer sets the global policy for every tool in the stack and the SASE vendor keeps the blinky lights working on all of the equipment. 2. The security stack the SASE vendor offers security services for its customers like Zero Trust Intrusion, Kill Chain Prevention, compliance and risk forecasting. 3. SD Wan the SASE vendor connects a software hardware meta layer to all the customary remote locations for the purpose of making efficient routing decisions with between all customer Internet connections and lastly number four peer connections. The first hop out of the SASE vendor's data center is not to the Internet backbone, but to one or more of the big content provider fiber networks like Google, Amazon and Microsoft. According to Maria and Alex Korlov at Network World, Gartner introduced SSE in its Strategic Roadmap for SASE convergence paper in March 2021. Essentially SASE without the SD WAN component. Nerd reference in 2022, Netscope's chief evangelist Bob Gilbert published a YouTube video explaining what SSE is.
![Security Service Edge (SSE) (noun) [Word Notes] - Hacking Humans cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2Ff6590c42-0ae1-11f1-86e3-3788698b1844%2Fimage%2F441b0ca2db080b93b935568d381ce462.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)