Infoblox: Enhancing Zero Trust Architecture

Words from Mohammed Al-Moneer, Regional Director, META at Infoblox

Zero Trust Helps Secure Enterprise Networks and Sensitive Data

The Zero Trust security model can help cybersecurity professionals to secure enterprise networks and sensitive data. By continuously assuming that a breach is inevitable or has already occurred, the model eliminates trust in any single element. Zero Trust is a data-centric model that seeks to limit access while trying to identify anomalous or malicious activity.

The Zero Trust mindset brings substantial benefits. System administrators can better control devices, processes and users that engage with data in any way. When adhered to, the basic principles of Zero Trust can reduce the risks associated with insider threats, malicious activity that targets supply chain, the compromise of user credentials, remote exploitation and many other types of cyberattacks.

There are two things that can be done to enable Zero Trust: migrate to IPv6 and combine it with DNS security.

Zero Trust through IPv6

In the last few years, the momentum of implementing IPv6 has grown significantly as its superior features have become compelling. This momentum has been sustained by reducing cost, decreasing complexity, improving security stack and eliminating barriers to innovation in networked information systems.

One of the important characteristics of IPv6 is the abundance of global IPv6 addresses it offers, and this abundance obsoletes the need for network address translation (NAT) in the quest of solving the problem of the depleting public IPv4 addresses. Without NATs in the middle of client-server communications, the application server receives the unmodified connection from the source IPv6 address of the client.

Due to the constraints of IPv4 addresses, the use of NATs has become ubiquitous; this obfuscates client IPv4 addresses and provides anonymity to attackers. As a result, servers cannot always validate the identity of client connections, so other forms of authenticating end users have to be used. This creates problems with reputation filtering and with the use of client IPv4 addresses for authentication and for detecting and blocking fraudulent transactions.

Among the possibilities provided by an IPv6-based network, is taking much more advantage of secure DNS management, with a view to reinforcing the security of the entire network. In an IPv6 network, DNS can become an absolute “Zero Trust” control point, where every Internet address can be scanned for potentially malicious behavior and identified by built-in threat intelligence.

Building a Resilient Zero Trust Architecture with DNS Security

One strategy that can significantly strengthen the security posture of the network is to integrate the valuable metadata residing in DDI (DNS, DHCP and IPAM) with the security stack. This information makes it possible to identify the connected device responsible for a set of network traffic, which enables IT teams to detect a potential threat and share that information with the security ecosystem. Using DNS security and leveraging DNS-related information within a Zero Trust architecture can reduce risk in all environments from the core of the on-premises network to its farthest cloud-enabled edge.

Visibility and automation capabilities are essential when deploying a Zero Trust architecture. DNS-based security with network device discovery – whether in on-prem virtualized or in hybrid multi-cloud environments – reduces IT silos through shared access to the integrated, authoritative database of protocol, IP address, network infrastructure devices, end hosts, connectivity and port data. These capabilities reduce security and service disruptions through the detection of rogue devices, errors, unmanaged devices, and networks that go unseen in standard IPAM tools.

DNS has a key role to play in a Zero Trust architecture, because it provides more-centralized visibility and control of all computing resources, including users and servers in a micro-segment, all the way to individual IP addresses. Because most traffic, including malicious, goes through DNS resolution first, DNS is an important source of telemetry that provides detailed client information and helps detect anomalous behavior and protect east-west traffic between micro-segments. DNS security can also continuously check for, detect and block C&C connections and attempts to access websites that host malware. For all of these reasons, DNS security is now a core enabler of the Zero Trust strategy.

DNS security provides a single point of control for administering and managing all environments, including cloud, on-premise, WFA and mobile devices. This provides one DNS security administration point for all security stacks, and this point can easily be integrated with SOAR and other critical cybersecurity ecosystem controls. Organizations must always be in control of and have complete visibility into DNS traffic. It is best practice that all DNS traffic be resolved by servers controlled by the organization, not by external resolvers over which the IT team has no control.

To read more news and exclusive features see our latest issue here.

Never miss a story… Follow us on:
LinkedIn Security Buyer
Twitter logo @SecurityBuyer
Facebook @SecbuyerME

Media Contact
Rebecca Morpeth Spayne,
Editor, Security Portfolio
Tel: +44 (0) 1622 823 922
Email: [email protected]

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Infloblox

Olympics Scammers Take Their Marks, Get Set, and Go!

Infoblox Threat Intel explores how bad actors are taking advantages of the public’s interest in the Olympic games from both…
Veeam

New Zero Trust Data Resilience Model

Veeam Software introduced Zero Trust Data Resilience (ZTDR), a model to help organisations reduce the risk of growing data security threats

Most cyber attacks in Middle East involve spyware

Positive Technologies has analysed the attacks carried out on individuals in Middle Eastern countries between 2022…
cyber

2023 Global State of Cybersecurity Report

Infoblox Inc. the company that delivers a simplified, cloud- enabled networking and security platform for improved
istorage

Zero trust, maximum caution

John Michael, CEO, iStorage considers the dangerous new ‘golden age’ of ransomware, ways businesses can neutralise its impact …
istorage

Zero trust, maximum caution

John Michael, CEO, iStorage considers the dangerous new ‘golden age’ of ransomware, ways businesses can neutralise..
Veeam

Breaking the Myths of Zero Trust Model

Breaking the myths of zero trust model and understanding how it can protect your organisation – By Dave Russell, Veeam Software
zero trust

Breaking the Myths of Zero Trust Model

Dave Russell, Vice President of Enterprise Strategy, Veeam Software explores exclusively the breaking the myths of zero trust model

Trellix expands their XDR platform

Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), has announced the expansion of its XDR platform.

Radware unveils new cloud security centre

Radware, a provider of cyber security and application delivery solutions, announced the launch of a new cloud security centre in the United Arab Emirates.
Scroll to Top