Reference Architecture: Reference Architecture - Protect apps and data on bring-your-own devices 编辑

October 6, 2022 Author:  Florin LazurcaSpecial thanks:  Dan Feller, Frank Srp

Reference Architecture: Reference Architecture - Protect apps and data on bring-your-own devices


Overview

CompanyA provides remote access to a small subset of its overall user base. These end users, who are part of a hybrid and distributed workforce, use bring-your-own (BYO) devices to access internal and cloud resources. Resources include client-server apps (virtual apps and desktops), internal web, and SaaS apps that must be protected when accessed from untrusted devices.

CompanyA’s remote access policy has led to greater efficiency for its hybrid and distributed workforce. However, the policy has created a complex delivery model and introduced security concerns. Since the end user devices are unmanaged, CompanyA must mitigate security threats against apps and the data in transit to, in use on, and at rest on the devices.

CompanyA currently uses several unintegrated point products for remote access. It wants to consolidate and expand to a company-wide Zero Trust Network Access (ZTNA) solution while protecting its resources. To that end, CompanyA is engaging in an initiative to update its app delivery architecture. It is implementing the integrated Citrix solution using Citrix Secure Private Access, Citrix Gateway, Citrix Secure Internet Access, and Citrix Web App and API Protection. Together this solution provides end-to-end protection of CompanyA resources accessed from BYO devices.

Overview

This reference architecture explains CompanyA’s plan to protect user access, protect data and devices, and protect apps.


Success Criteria

CompanyA wishes to enable all users to work from home and remote locations. Post pandemic, employees continue benefiting from a BYOD enabled hybrid and distributed workforce. Although some users currently have VPN access to web and SaaS apps, CompanyA has identified several security challenges that prevent a company-wide deployment. Therefore, CompanyA is implementing a VPN-less approach.

Since CompanyA does not manage end user’s devices, it has no way to understand if the devices transfer any malicious content to their application infrastructure. Moreover, CompanyA’s security policy does not require BYO devices to have agents installed to provide access to company resources.

Therefore, CompanyA has begun a threefold initiative to protect corporate resources accessed by BYO devices. To be successful, CompanyA defined a list of success criteria for the initiative. These criteria form the basis for the overarching design.


Protecting User Access

CompanyA must protect BYOD user access to their work environment. It must create a safe mode of access to all apps and data that is seamless for end users. Access must be secure, simple, and flexible to use any device and work from any location.

CompanyA has decided its security strategy is to move away from a traditional “castle and moat” approach to access and security. It is taking a Zero Trust approach instead of using a conventional appliance-based solution like a VPN that assumes users are trusted.

In CompanyA’s focus on protecting user access, it has identified the following criteria for a successful design:

Success CriteriaDescriptionSolution
Adaptive access for web and SaaS appsAdaptive access for web and SaaS apps using Citrix Secure Private Access to determine the correct level of accessCitrix Secure Private Access
Adaptive access for client-server (virtual) appsAdaptive access for client-server (virtual) apps using Citrix Secure Private Access and Citrix DaaS to determine the correct level of accessCitrix Secure Private Access and Citrix DaaS
End-user monitoringContinuous monitoring and continuous assessment to protect against potential threats. Apps are continuously monitored for data exfiltration, and abnormal access times and locations.Citrix Analytics
SaaS App AccessUsers must access sanctioned SaaS applications with strong authentication that does not impact the experienceCitrix Secure Private Access
Web App AccessUsers must be able to access sanctioned internal Web applications with strong authentication that does not impact the experienceCitrix Secure Private Access – Zero Trust Network Access
Personal PrivacyCompanyA must ensure user privacy while still protecting the user and endpoint from potential threats when using unsanctioned websitesCitrix Secure Browser Service with Citrix Secure Internet Access (Using “do not decrypt” policies for sites with personal information)


Protecting Data

CompanyA must protect its data accessed by BYO devices. It has a highly complex infrastructure of layers of applications, systems, and networks in environments consisting of on-premises data centers, public, and private clouds. This sprawl has led to a complicated stack of different tools and technologies for protecting data.

CompanyA is designing a consolidated, cloud-delivered security stack to meet the demands of their modern workplace. By centralizing data security policy across the overall solution – it minimizes redundant tasks, removes overlapping policies, and allows IT to protect data and devices across all locations.

In CompanyA’s focus on protecting data, it has identified the following criteria for a successful design:

Success CriteriaDescriptionSolution
BYO DevicesUsers access Workspace with a BYO device and must not gain unfettered access to sanctioned resources.Citrix Secure Private Access
SaaS and Web App SecurityThe user’s ability to download, print, or copy data from SaaS apps containing financial, personal, or other sensitive information must be restricted.Citrix Secure Private Access – Security Policies Enhanced Security
Protection from keyloggersCompanyA must protect internal corporate resources when accessed from BYO devices. Devices can be compromised and have keylogging malware installed. Key logging must be blocked while using Citrix Workspace.Citrix Secure Private Access – Security Policies with App Protection
Protection from screen scrapersCompanyA must protect internal corporate resources when accessed from BYO devices. Devices can be compromised and have screen scraping malware installed. Screen scraping must be blocked while using Citrix Workspace.Citrix Secure Private Access – Security Policies with App Protection
Internet SecurityProtect users from potential internet threats hidden within emails, applications, and websites regardless of location.Citrix Secure Browser Service with Citrix Secure Internet Access - Security Policies with Malware Protection
Protect DevicesProtect devices and the underlying infrastructure from malware and Zero-Day threatsCitrix Secure Browser Service with Citrix Secure Internet Access - Security Policies with Malware Protection
Protect DataProtect data stored in sanctioned and unsanctioned appsCitrix Secure Browser Service with Citrix Secure Internet Access – Security Policies with Web Filtering
ComplianceCompliance and protecting users from malicious URLsCitrix Secure Browser Service with Citrix Secure Internet Access – Security Policies with Web Filtering


Protecting Apps

CompanyA must protect its apps accessed by BYO devices. The company’s use of BYO devices has increased the risk of compromised devices accessing corporate apps. Also, its attack surface has increased due to the company moving apps to the cloud and using SaaS apps. Its current on-prem secure web gateway and VPN deployments with rigid security policies cannot effectively protect applications in the cloud.

CompanyA must create a hybrid solution using both on-prem devices and cloud services for application security. On-prem devices block app-layer and DDoS attacks on-premises, while a cloud-based protection service prevent volumetric attacks and app-layer DDoS attacks in the cloud.

In CompanyA’s focus on protecting apps, it has identified the following criteria for a successful design:

Success CriteriaDescriptionSolution
Secure AccessCompanyA must protect internal corporate resources when accessed from untrusted and unsecured locations. Devices are not be allowed direct access to the internal network to help prevent malware intrusion.Secure Private Access - VPN-less access
SaaS credential protectionThe user’s credentials to SaaS applications must include multifactor authentication.Citrix Secure Private Access – Single Sign-On with SAML-only authentication
SaaS DLPCompanyA requires their SaaS apps to use DLP controls inline.Secure Browser Service with Citrix Secure Internet Access
Protect web appsCompanyA must stop volumetric DDoS attacks at the edge before they enter the network. CompanyA must protect both cloud apps and internal apps. CompanyA has apps deployed in multiple locations on cloud-hosted platforms. It must protect these apps from API-level threats like DDoS and Bot attacks, cross-site scripting, and SQL Injection attacks.Citrix Web App Firewall
Compromised User ProtectionIT must be able to quickly identify and mitigate threats posed by a compromised user account. IT must protect the entire threat surface with centralized orchestration capabilities to provide the complete security that the business requires.Citrix Security Analytics


Conceptual Architecture

This architecture meets all the preceding requirements while giving CompanyA the foundation to expand to more use cases in the future.

Conceptual Architecture

At a high level:

User Layer: The user layer describes the end-user environment and endpoint devices used to connect to resources.

  • End user devices are BYOD. The devices are unmanaged, and CompanyA does not require any agent to be installed on the device.

  • End users access resources from the Citrix Workspace web, resulting in an experience that is protected even on BYO devices.

  • End users can install Citrix Workspace App for more capabilities but are not required to.

Access Layer: The access layer describes how users authenticate to their Workspace and secondary resources.

  • Citrix Workspace provides the primary authentication broker for all subsequent resources. CompanyA requires multifactor authentication to improve authentication security.

  • Many of the authorized resources within the environment utilize a different set of credentials than those credentials used for the primary Workspace identity. CompanyA will use the single sign-on capabilities of each service to protect these secondary identities better.

  • The applications only allow SAML-based authentication for SaaS apps. This prevents users from accessing the SaaS apps directly and bypassing the security policies.

Resource Layer: The resource layer authorizes specific client-server (virtual), web, and SaaS resources for defined users and groups while defining the security policies associated with the resource.

  • CompanyA requires policies that disable the ability to print, download, copy and paste content from the managed resource to and from the BYO device.

  • Due to the unknown nature of the endpoint security status, CompanyA requires VPN-less access to resources using isolated browsers or virtualized sessions.

  • Highly sensitive SaaS apps can be given additional protection provided by the Citrix Workspace app. If the BYO Device does not have app protection available, adaptive access policies prevent the user from launching the app.

  • Since CompanyA allows access to internal web apps from BYO devices, Citrix Web App Firewall must protect the resource from attacks coming from potentially compromised endpoints.

Control Layer: The control layer defines how the underlying solution adjusts based on the underlying activities of the user.

  • Even within a protected Workspace resource, users can interact with untrusted Internet resources. CompanyA uses Secure Internet Access to protect users from external threats when using SaaS apps, web apps, and virtual apps and desktops.

  • If users must access personal web sites such as health and finance on their BYO devices through CompanyA resource, appropriate policies protect users’ privacy.

  • CompanyA requires a Security Analytics service to identify compromised users and automatically maintain a secure environment.

The subsequent sections provide greater detail into specific design decisions for CompanyA’s BYOD protection reference architecture.


Access Layer


Authentication

CompanyA has determined that providing access to resources with a user name and password does not provide adequate security. Multifactor authentication is required for all users. CompanyA uses Active Directory + Token for its multifactor method and the Citrix Gateway service to handle all authentication requests.

Citrix Workspace incorporates a cloud-delivered Time-based One-Time Password (TOTP) providing multifactor authentication. Users register with the TOTP service and create a pre-shared secret key within the authenticator app on a mobile device.

Once the user successfully registers with the TOTP micro-service, the user must use the token, along with their Active Directory credentials, to successfully authenticate to Citrix Workspace.

Authentication

Refer to the Citrix Workspace Active Directory with TOTP Tech Brief
to gain adequate knowledge on Active Directory with TOTP concepts and terminology.


Zero Trust Network Access

CompanyA uses the Citrix Secure Private Access service and Citrix DaaS to provide access to SaaS and internal web apps, virtual apps, and virtual desktops. These services are a Zero Trust Network Access solution, which is a more secure alternative to a traditional VPN.

The Secure Private Access service and Citrix DaaS use the cloud connectors’ outbound control channel connections. Those connections allow the user to access internal resources remotely. However, those connections are:

  • Limited in scope so that only the defined resource is accessible
  • Based on the user’s primary, secured identity
  • Only for specific protocols, which disallow network traversal

ZTNA


Resource Layer


Resource Security Policies

CompanyA wants to limit the risk of data loss and data remanence on BYO devices. Within the different application types, CompanyA incorporates numerous restrictions to prevent users from copying, downloading, or printing data.

CompanyA has developed prescriptive access models to meet its security requirements:

  • BYO devices without the Workspace app use Secure Private Access to launch a SaaS or web app through an isolated browser using the Citrix Secure Browser service. Secure Private Access provides SSO and enforces adaptive access policies such as download, print, copy, and paste restrictions to web and SaaS apps.
  • BYO devices with the Workspace app use Secure Private Access to launch a Saas or web app using the Citrix Enterprise Browser (formerly Citrix Workspace Browser)- a local, containerized browser. The browser creates a connection to the SaaS app or a Zero Trust Network Access connection to the internal web app. Secure Private Access provides SSO and enforces adaptive access policies (download, print, copy, and paste restrictions).
  • App Protection policies protect web and SaaS apps using screen scraping and key-logger restrictions. If the BYO Device does not have app protection available, adaptive access policies prevent the user from launching the app.
  • When users access virtual apps and desktops, Citrix DaaS provides SSO and enforces lockdown policies. The service restricts downloading, printing, and unidirectional and bidirectional copy & paste actions.

Lockdown

CompanyA has both sensitive and regular SaaS and Web apps and will apply adaptive access policies based on their security requirements. As a baseline, CompanyA has defined the following policies (with the ability to relax policies as needed based on user and application).

CategorySaaS AppsSensitive SaaS AppsWeb AppsSensitive Web AppsVirtual Apps and Desktops
Clipboard accessAllowedDeniedAllowedDeniedDenied
PrintingAllowedDeniedAllowedDeniedDenied
NavigationDeniedDeniedDeniedDeniedNot Applicable
DownloadsAllowedDeniedAllowedDeniedDenied
WatermarkDisabledEnabledDisabledEnabledEnabled
Keylogging Prevention*DisabledEnabledDisabledEnabledEnabled
Screenshot Prevention*DisabledEnabledDisabledEnabledEnabled


Control Layer


Web App and API Protection

When users authenticate to Citrix Workspace, they access private web apps on BYO devices. To better protect the on-prem private web apps, CompanyA uses the Citrix Application Delivery Controller Bot Management and Web App Firewall components.

The bot management component of the Application Delivery Controller detects a bot request and prevents it from inundating the system. The Web App Firewall protects public-facing apps from attacks. These types of attacks would typically be buffer overflow, SQL injection, and cross-site scripting. Web App Firewall detects and denies these attacks from impacting the data and the app.

CompanyA also uses the Citrix Web App and API protection service to prevent volumetric attacks and app-layer DDoS attacks against webs apps which are not on-prem.

Citrix Web App and API Protection


Secure Internet Access

As users interact with SaaS, web, and virtual apps they often access non-CompanyA sanctioned internet sites. To help protect the users and organization, CompanyA incorporates the Citrix Secure Browser service with Citrix Secure Internet Access and Security Analytics into the design.

Citrix Secure Internet Access

Any CompanyA related internet traffic to/from the library of apps, desktops, and devices within the organization routes through the Secure Internet Access service. The service scans any URL to verify it is safe. Functionalities within specific public sites are denied or modified. Downloads are automatically scanned and verified.

  • When users access virtual apps and desktops, the Citrix DaaS infrastructure has the Citrix Secure Internet Access agent installed to proxy traffic.
  • When users access web and SaaS resources with the Citrix Secure Browser service, Citrix Secure Internet Access is used as it’s Secure Web Gateway.

As many websites are now encrypted, part of this security process is decrypting the traffic and inspecting. The service does not decrypt specific categories of websites, such as financial and health-related sites, to ensure employee privacy.

In designing the internet security policy, CompanyA wanted to start with a baseline policy. As CompanyA continues to assess risks within the organization, it will relax/strengthen the policies as appropriate.

By default, all categories are decrypted and allowed. CompanyA has the following policies applied globally:

CategoryChangeReason
Financial and InvestmentDo not decryptEmployee privacy concerns
HealthDo not decryptEmployee privacy concerns
Adult ContentBlockCompany Policy
DrugsBlockCompany Policy
File SharingBlockCompany Policy
GamblingBlockCompany Policy
Illegal ActivityBlockCompany Policy
Malicious SourcesBlockCompany Policy
Malware ContentBlockCompany Policy
Porn/NudityBlockCompany Policy
Virus & MalwareBlockCompany Policy
Violence/HateBlockCompany Policy

Refer to the Citrix Secure Internet Access Tech Brief
to gain additional information regarding the web filtering and protection features.


Summary

Based on the preceding requirements, CompanyA created the high-level conceptual architecture. The general flow and requirements are that end users require:

  • Protected access to SaaS apps and VPN-less access to internal web apps via Citrix Secure Private Access
  • Adaptive authentication before being granted access to external or internal resources via Citrix Secure Private Access
  • Zero Trust access to specific resources via Citrix Secure Private Access
  • Protected access to internet traffic from the web apps, or virtual apps and desktops via using Citrix Secure Browser Service with Citrix Secure Internet Access
  • Protected access to web apps accessed from BYO devices with Citrix Web Application Firewall

CompanyA is using Citrix to build a modern app delivery environment that enforces Zero Trust Network Access and provides end-to-end protection of its resources.

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。
列表为空,暂无数据

词条统计

浏览:12 次

字数:28092

最后编辑:6年前

编辑次数:0 次

    我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
    原文