One of the most common themes over the last few years in IT security discussions has been the de-perimiterisation of the corporate network. The term was originally coined by the Jericho Forum and refers to the greying of the split between the internal trusted network and the wider world.
This is briefly described here;
Traditionally there has been strict demarcation, maintained by devices such as firewalls, between the untrusted outside world, the semi trusted DMZs (De-Militarised Zones), and the trusted internal network. As more and more business functions require interactions between intenal users and external customers, suppliers, remote users, home workers and other third parties these strict zones of demarcation have become considerably more porous.
This has lead to some people proposing the removal of this network boundary concept and for securing of data and systems to be achieved with encryption, host and network based IPS (Intrusion Prevention Systems), and AV etc. With the view that data and systems can be kept secure while facilitating easier and more efficient business with customers, partners and other third parties. Taken to it’s extreme, this is the paradigm of the ‘perimeterless’ network.
If you are faced with dealing with this ever more porous network perimeter while still maintaining the security of the systems you are responsible for, or you just want to read more about how security and this issues raised by the muddying of internal and external network boundaries, Sophos have produced a simple and easy to read guide in their naked security blog titled;
Practical IT: handling perimeter expansion and disintegration
This can be found here;
Have a read, and let me know what you think. If there is any interest I’ll write a more in depth post on the topic.