Discussion about this post

User's avatar
Bill Phelps's avatar

Ross - huge fan of your writing! I was actually working on a deck to use for an intro to security where I started with a picture I called "core IT infrastructure" which is actually your layer zero. I then built on it to show how each major architectural component - like the network - inevitably spawned third party security products. I was trying to paint a picture of how we ended up with 4,000+ security companies, but eventually dropped the approach because I was told my audience found it confusing. You did a much better job. I do have a couple of observations that may be obvious, or not...

1) A new "Layer Zero" always creates an explosion of new security companies. Sometimes this happens quickly as with cloud, sometimes slowly as a Layer Zero "emerges" as with the browser or identity as perimeter.

2) There is at least a philosophical argument that if Layer Zeros were better architected, we would not need so much add on security. Go back to the very beginning (Cuckoo's Egg timeframe) and much layer zero did not even have access control. Software is still a layer zero, and much of it is still not built well and needs security add ons.

3) The evolution of security add-ons to layer zero follows a predictable pattern. First comes posture management. Though the term has changed, I would call early vulnerability scanners posture management for the network. After posture management comes threat detection (so after we had scanners for the network we had intrusion detection). We see this playing out in cloud with the evolution from posture management to runtime threat detection.

I would add the posture management is usually what is dictated by compliance frameworks and and so the pattern is:

a) build a complex thing to perform some business function

b) figure out that if the thing is not configured correctly it is vulnerable

c) build a tool to monitor configuration

d) mandate a specific configuration and tools to report on the configuration

4) I would think about the SOC a little different than you do. All security SW fits in one of three(?) categories (gross simplification). It either a) makes layer zero much more secure (Z-Scaler), b) monitors and detects misconfigurations or threats in layer zero and produces alerts or c) provides tools to manage the vulnerabilities and threats generated by the category b tools (SIEM, TIPs SOAR, etc)

5) Maybe this is obvious, but Layer 0 is where the business process/data lives and it is what adversaries are attacking. So it is also the ultimate target for pen testing/red teaming. Pen testing and malicious attacks starts with a "naked" Layer 0 then all the layers on top of Layer Zero are build to protect it from attack.

6) I would argue that major SaaS platforms are a separate class of Layer 0

Thanks again for such thought provoking writing.

Expand full comment
Karim Fanous's avatar

Great piece as usual Ross - am a huge fan of your work. We should connect - you need to add StrongDM to this piece :)

Expand full comment
8 more comments...

No posts