Networking's greatest debates in Security

Classic debates include Immediate flaw alerts vs. Disclosing with patches, IDS vs. IPS and Perimeter security vs. inside security

Perimeter security vs. inside security

When businesses began hooking up to the Internet in earnest in the late 1980s, it was with a sense of trepidation and awe, knowing an unprecedented public interaction was commencing. In the hope of holding dangers at bay, the bastion firewall emerged as the fortress guard, thanks to technology innovators such as Marcus Ranum and Bill Cheswick. Early commercial firewalls, including Digital Equipment Corp.'s SEAL, meant enterprises would no longer have to roll their own.

The perimeter firewall has become a fixture, the point of demarcation where specialists lavish attention on complex security rules to define permitted inbound and outbound traffic. But 20 years later, the role of the Internet firewall and similar perimeter defense has come under sharp question by a growing number of security managers who base their arguments on one simple point: the perimeter has disappeared.

The demands of e-commerce to access internal systems, collaboration with outsourcing partners, the mobile laptops and computer-based handhelds carried by business people to the ends of the earth - these all contribute to the "disruptive change," argues Paul Simmonds, chief information security officer at U.K.-based chemicals and paint manufacturer ICI.

"Your security perimeter is disappearing," notes Simmonds, energetic supporter of the Jericho Forum, the group founded by corporate information security managers in early 2004 to encourage the development of more innovative data-centric approaches to enterprise security that reflect today's malleable business situation. "What we're architecting at the Jericho Forum is not an individual solution, a single fix. We call it a collaboration-oriented architecture."

Jericho Forum now has about 45 members, mostly large European firms but with more U.S.-based ones joining these days.

One of Jericho Forum's favored terms is "de-perimeterization" (the British spell it with an 's' not a 'z') and while the group doesn't specifically advocate doing away with perimeter firewalls, its critique of them as a barrier to e-commerce has at times elicited strong opposing opinions that the group's views are wrong-headed, misguided or naive.

"At best, Jericho will help raise awareness of the usefulness of a defense-in-depth network security strategy," stated Joel Snyder, senior partner at Opus One and a member of Network World's Lab Alliance, writing about the group two years ago. "More likely the Forum will end up on the scrap heap of unrealized ideas and wasted effort." Snyder says his opinion that some of the Forum's thinking is "moronic" is no different today.

Firewall innovator of legend, Cheswick, lead member of technical staff at AT&T Research, acknowledges it's appealing to consider a world where corporate security doesn't rely on perimeter defense. But in his keynote presentation at the Jericho Forum meeting in New York last September, Cheswick said the limitation in foregoing perimeter defense is that "you won't stop a [distributed denial-of-service] attack, so we may still need a walled garden."

Nonetheless, the Jericho Forum soldiers on with its work to convince enterprises and vendors alike to think outside the perimeter box. "De-perimeterization for most corporations is a fact of life," Simmonds points out. "For most corporations, it's happening whether you like it or not." -Ellen Messmer

Read Networking's greatest debates in Software
Read Newtorking's greatest debates in the Data Center
Read Networking's greatest debates in Management
Read Networking's greatest debates in LANs and WANs

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Follow our new CSO Australia LinkedIn
Follow our new social and we'll keep you in the loop for exclusive events and all things security!
CSO WANTED
Have an opinion on security? Want to have your articles published on CSO? Please contact CSO Content Manager for our guidelines.

More about AT&TAT&TBillCisco SecurityeEye Digital SecurityEvolveGartnerGatewayHISIBM AustraliaIDC AustraliaINSInside SecurityInternet Security SystemsIPSISS GroupLegend Performance TechnologyMicrosoftOpus OneSecurity SystemsSharpX-Force

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Brand Page

Stories by Staff Writers

Latest Videos

More videos

Blog Posts