When an attacker gains a foothold in a system they then need to move laterally through the network searching for a weak point to attack in order to elevate privileges or access secured data. What the zero trust approach aims to achieve in my mind is to slow down lateral movement throughout the network in order to give any breach more time to be detected and less time to commit actual data exfiltration or other nefarious activity. The zero trust approach will not protect you from being hacked – in fact, your entire mindset should be from a standpoint of “we will be breached, sooner or later”.
But even though this sounds like a ban-hammer situation, it is important to keep your eye on what this is trying to achieve.
#Onedrive sync client in windows verification
A lot of environments these days are implementing what they call a “zero trust” approach – essentially trusting nothing, be it external or internal, and insisting on verification before connection. One of the biggest issues we found was trying to balance security with usability, and that is the crux of the presentation subject that we wrote. Given that we are collaborating on the presentation hopefully this article should complement those rather than just rehashing some of the same points 🙂 He also has a piece about lateral movement which I am going to touch on as well.
#Onedrive sync client in windows free
I worked briefly with him on the deployment of a secure desktop where we came across many of the problems that I am going to discuss here, and we also did a presentation based on our experiences at the UK Citrix User Group last November (which we will be doing again for M圜UGC on June 4th, so feel free to tune in!) Dave wrote up a good number of the points I am going to touch on here, mostly in his article on local drive access and the one on PowerShell too. I must mention fellow CTP Dave Brett at this point. This article runs through that, as well as discussing a number of ways you can improve the security of your solution against common tricks that both attackers and pentesters will leverage. The case of the OneDrive Sync Client in an estate that enforces C: drive restrictions is an interesting demonstration of this conundrum. It is very important to secure your Citrix environment from attackers, but it’s also important to ensure you don’t interrupt your users’ productivity. Let’s go have a quick delve into the age-old battle of user experience against security!