ResearchSpace

On the zero-trust intranet certification problem

Show simple item record

dc.contributor.author Badenhorst, Danielle P
dc.contributor.author Barbour, Graham D
dc.contributor.author McDonald, André M
dc.contributor.author Gertenbach, Wian P
dc.contributor.author Buckinjohn, Ethan
dc.date.accessioned 2024-07-30T09:41:56Z
dc.date.available 2024-07-30T09:41:56Z
dc.date.issued 2024-03
dc.identifier.citation Badenhorst, D.P., Barbour, G.D., McDonald, A.M., Gertenbach, W.P. & Buckinjohn, E. 2024. On the zero-trust intranet certification problem. http://hdl.handle.net/10204/13739 . en_ZA
dc.identifier.uri DOI: https://doi.org/10.34190/iccws.19.1.2054
dc.identifier.uri http://hdl.handle.net/10204/13739
dc.description.abstract Securing corporate networks and ensuring the trustworthiness of network resources are critical security concerns for organisations in today's interconnected digital landscape. The zero-trust security model is an approach to designing and implementing ICT systems which prescribes that clients and servers cannot be trusted automatically, even when connected to networks traditionally considered trusted. The implementation of the zero-trust model within the corporate intranet requires a secure method to verify the identity of local servers. On the Internet, trust in the identity of public servers is established by well-known public Certificate Authorities (CAs), which issue digital certificates to securely identify servers. However, local intranet servers exist within the internal address space of the network. Consequently, it is impossible to naturally obtain digital certificates for these servers, validly signed by a public CA, without publicly disclosing sensitive information such as intranet server Domain Name System (DNS) records. This leaves organisations with the option of relying on endpoint management systems to install custom CA root certificates on all corporatre browsers or, in some cases, ignoring the problem altogether. In this paper, we draw on practical experience in the deployment of cybersecurity devices in corporate intranets to formally define the intranet certification problem. We specify five requirements that a solution to this problem must satisfy. We then conduct a comprehensive review of existing candidate solutions and academic research relevant to the intranet certification problem. Specifically, existing ICT systems for public key infrastructure and endpoint management are identified and evaluated with respect to their ability to meet the stated requirements for solving the intranet certification problem, as well as their cost. Our study reveals that solutions that meet the technical and security requirements of the intranet certification problem are beyond the reach of smaller private sector companies and public sector organisations in underdeveloped and emerging economies. The high cost and technical expertise required for their implementation and management render these solutions impractical. Consequently, by relying on servers with self-signed certificates, these entities inadvertently leave their servers susceptible to impersonation, information theft, and unauthorised resource access, thus violating the fundamental principles of the zero-trust model. We conclude that a gap exists for a simple, cost-effective, and easily managed solution to the intranet certification problem. en_US
dc.format Abstract en_US
dc.language.iso en en_US
dc.relation.uri https://papers.academic-conferences.org/index.php/iccws/article/view/2054 en_US
dc.relation.uri https://www.academic-bookshop.com/ourshop/prod_8162931-Proceedings-of-the-19th-International-Conference-on-Cyber-Warfare-and-Security.html en_US
dc.source Proceedings of the 19th International Conference on Cyber Warfare and Security (ICCWS), Johannesburg, South Africa, 26-27 March 2024 en_US
dc.subject Zero-trust en_US
dc.subject Public-key infrastructure en_US
dc.subject Endpoint management en_US
dc.subject Man-in-the-middle en_US
dc.subject Self-signed certificates en_US
dc.subject Intranet en_US
dc.title On the zero-trust intranet certification problem en_US
dc.type Conference Presentation en_US
dc.description.pages 9 en_US
dc.description.note Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, please consult the publisher's website: DOI: https://doi.org/10.34190/iccws.19.1.2054 en_US
dc.description.cluster Defence and Security en_US
dc.description.impactarea Inf and Cybersecurity Centre en_US
dc.identifier.apacitation Badenhorst, D. P., Barbour, G. D., McDonald, A. M., Gertenbach, W. P., & Buckinjohn, E. (2024). On the zero-trust intranet certification problem. http://hdl.handle.net/10204/13739 en_ZA
dc.identifier.chicagocitation Badenhorst, Danielle P, Graham D Barbour, André M McDonald, Wian P Gertenbach, and Ethan Buckinjohn. "On the zero-trust intranet certification problem." <i>Proceedings of the 19th International Conference on Cyber Warfare and Security (ICCWS), Johannesburg, South Africa, 26-27 March 2024</i> (2024): http://hdl.handle.net/10204/13739 en_ZA
dc.identifier.vancouvercitation Badenhorst DP, Barbour GD, McDonald AM, Gertenbach WP, Buckinjohn E, On the zero-trust intranet certification problem; 2024. http://hdl.handle.net/10204/13739 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Badenhorst, Danielle P AU - Barbour, Graham D AU - McDonald, André M AU - Gertenbach, Wian P AU - Buckinjohn, Ethan AB - Securing corporate networks and ensuring the trustworthiness of network resources are critical security concerns for organisations in today's interconnected digital landscape. The zero-trust security model is an approach to designing and implementing ICT systems which prescribes that clients and servers cannot be trusted automatically, even when connected to networks traditionally considered trusted. The implementation of the zero-trust model within the corporate intranet requires a secure method to verify the identity of local servers. On the Internet, trust in the identity of public servers is established by well-known public Certificate Authorities (CAs), which issue digital certificates to securely identify servers. However, local intranet servers exist within the internal address space of the network. Consequently, it is impossible to naturally obtain digital certificates for these servers, validly signed by a public CA, without publicly disclosing sensitive information such as intranet server Domain Name System (DNS) records. This leaves organisations with the option of relying on endpoint management systems to install custom CA root certificates on all corporatre browsers or, in some cases, ignoring the problem altogether. In this paper, we draw on practical experience in the deployment of cybersecurity devices in corporate intranets to formally define the intranet certification problem. We specify five requirements that a solution to this problem must satisfy. We then conduct a comprehensive review of existing candidate solutions and academic research relevant to the intranet certification problem. Specifically, existing ICT systems for public key infrastructure and endpoint management are identified and evaluated with respect to their ability to meet the stated requirements for solving the intranet certification problem, as well as their cost. Our study reveals that solutions that meet the technical and security requirements of the intranet certification problem are beyond the reach of smaller private sector companies and public sector organisations in underdeveloped and emerging economies. The high cost and technical expertise required for their implementation and management render these solutions impractical. Consequently, by relying on servers with self-signed certificates, these entities inadvertently leave their servers susceptible to impersonation, information theft, and unauthorised resource access, thus violating the fundamental principles of the zero-trust model. We conclude that a gap exists for a simple, cost-effective, and easily managed solution to the intranet certification problem. DA - 2024-03 DB - ResearchSpace DP - CSIR J1 - Proceedings of the 19th International Conference on Cyber Warfare and Security (ICCWS), Johannesburg, South Africa, 26-27 March 2024 KW - Zero-trust KW - Public-key infrastructure KW - Endpoint management KW - Man-in-the-middle KW - Self-signed certificates KW - Intranet LK - https://researchspace.csir.co.za PY - 2024 T1 - On the zero-trust intranet certification problem TI - On the zero-trust intranet certification problem UR - http://hdl.handle.net/10204/13739 ER - en_ZA
dc.identifier.worklist 27898 en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record