castle and moat cybrary

Castle-And-Moat refers to a network security model in which no one outside the network is able to access data on the inside, but everyone inside the network can. Imagine an organization’s network as a castle and the network firewall as a moat. Once the drawbridge is lowered and someone crosses it, they have free rein inside the castle grounds. Similarly, once a user connects to a network in this model, they are able to access all the applications and data within that network.

Organizations that use this model dedicate a lot of resources to defending their network perimeter, just as a castle might place the most guards near the drawbridge. They deploy firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), and other security tools that stop many external threats. However, if the castle can be breached via the sewers (or a network flaw in an Internet-enabled service similar to the March 2021 Exchange Server breaches) then the Castle and Moat approach is ineffective at stopping cyber attacks.

Then there is the issue of insider threats. If someone becomes curious who is already inside the castle walls, should they be allowed to view and access anything they wish?

Castle-and-Moat is no longer an appropriate cybersecurity strategy. The term is used to contrast traditional network architecture with the zero trust model.

What does this mean for an SMB?

With the Castle-and-Moat security methodology becoming outdated, it’s recommended to start using the Zero-Trust approach. The Zero Trust model of information security gets rid of the old strategy that had organizations focused on defending their perimeters while assuming everything already inside doesn’t pose a threat. Experts argue that the castle-and-moat approach doesn’t work. Game of Thrones proved this to be true time and again; anyone who could get past the castle walls could and would kill you. In our world, the most damaging data breaches occurred when hackers gained access inside corporate firewalls and are then able to move through internal systems without much resistance.

IT Managed Service Providers (MSPs) can help you with Zero Trust. They can deploy Two-Factor Authentication, Identity Access Management (IAM), ‘least privilege‘ on file server folders, removal of administrative rights to local workstations, and even network segmentation.

Zero Trust is a difficult but necessary model for SMBs to adopt: networks must be segmented, two-factor authentication enabled and combined with strong Identity and access management protections, and you must follow the principles of Least Privilege for access to critical and sensitive data.

ADDITIONAL RECOMMENDATIONS

In addition to these protections, CyberHoot also recommends SMBs take the following steps to secure their business. These measures provide a great deal of value for the cost and time investment they require (especially when delivered via CyberHoot).

  1. Govern employees with policies and procedures. You need a password policy, an acceptable use policy, an information handling policy, and a written information security program (WISP) at a minimum.
  2. Train employees on how to spot and avoid phishing attacks. Adopt a Learning Management system like CyberHoot to teach employees the skills they need to be more confident, productive, and secure.
  3. Test employees with Phishing attacks to practice. CyberHoot’s Phish testing allows businesses to test employees with believable phishing attacks and put those that fail into remedial phish training.
  4. Deploy critical cybersecurity technology including two-factor authentication on all critical accounts. Enable email SPAM filtering, validate backups, deploy DNS protection, antivirus, and anti-malware on all your endpoints.
  5. In the modern Work-from-Home era, make sure you’re managing personal devices connecting to your network by validating their security (patching, antivirus, DNS protections, etc) or prohibiting their use entirely.
  6. If you haven’t had a risk assessment by a 3rd party in the last 2 years, you should have one now. Establishing a risk management framework in your organization is critical to addressing your most egregious risks with your finite time and money.
  7. Buy Cyber-Insurance to protect you in a catastrophic failure situation. Cyber-Insurance is no different than Car, Fire, Flood, or Life insurance. It’s there when you need it most.

Sources:

CloudFlare


Stay Connected

Join over 100,000 of your peers and receive our weekly newsletter which features the top trends, news and expert analysis to help keep you ahead of the curve.