Secure SD-WAN: Security by design

Written by BT on 8 October 2019 in Sponsored Article
Sponsored Article

BT looks at how to secure your SD-WAN services, starting with security by design 

The flexibility, scalability and cost savings of SD-WAN make it highly attractive to global organisations, but it can come with higher risks.

Security by design

While moving to SD-WAN brings significant benefits, you are also potentially exposing your business to additional security risks around your network, application availability and performance. Your SD-WAN routers and management platform are directly connected to the internet. Using the internet for traffic flow means you lose control of the data path, your data is flowing in zones of zero trust. And the physical security of your SD-WAN elements becomes more critical.

Purely relying on the inbuilt security of an SD-WAN in many cases will not be sufficient - it is left to the customer to assess their own requirements and what security controls they need, or face the risks of hacks of SD-WAN routers, lateral movement once past them, DDoS attacks or insider threats.

SD-WAN – the wedge between the CIO and CISO?

But in around 80 per cent of the bids we see, customers aren’t actively considering or aware of the risks. SD-WAN is highlighting the tension between CIOs, focussed on supporting the business with technology enabled solutions, and CISOs, concerned with managing information security risks. Both CIO and CISO recognise savings and agility SD-WAN can offer, but it’s solely the CISO’s job to ensure the business remains secure whilst benefits are realised.

In fact, cybercriminals are fully aware of these challenges as well and have an interest in ensuring that IT and security teams remain disconnected. Any digital transformation that is not tightly coordinated between these functions is likely to lead to an increasing amount of vulnerabilities or delays as security considerations are retrospectively implemented, potentially at significant cost compared to having designed the required security in at the start.

Design principles for security

Implementing an SD-WAN proof of concept or solution needs the networking team and security teams to work together. By analysing what you want to achieve, understanding your network and applications and where your crown jewels are, you can work out what you want to protect and how.

Regardless of technology, we need to move away from thinking about data security and network security to thinking about policy, visibility and control of the network underlay, the SD-WAN overlay and the Cloud Security Architecture.

We recommend seven design principles:

  1. Apply security at all layers
     
  2. Control access through identity
     
  3. Protect data at rest and in motion
     
  4. Automate security
     
  5. Monitor continuously and hunt for threats
     
  6. Adhere to compliance regulations and laws
     
  7. Prepare for disaster

SD-WAN security controls

By classifying sites as mission critical, business critical or other business sites, you can design the right security controls for each type of site. For some of our customers, the answer may be to take a hybrid approach, leaving mission critical sites on secure MPLS but migrating other business sites to SD-WAN, or by adding in additional security controls.

General security considerations should also include things like continuous security monitoring for discovery of unusual traffic, vulnerability management/patch management and identity and access management to the SD-WAN controllers and devices.

We embed security controls such as firewalls, identity and access management, intrusion detection and prevention and URL filtering directly into the network, allowing us to provide different security postures across applications and sites depending on what the organisation is trying to protect and where they need protection. 

Network and security can no longer be considered separately. Our in-depth understanding of both means our consultants can help you understand your potential risks around SD-WAN, ensuring you don’t inadvertently expose your organisation, critical assets and data to unknown threats while transforming your network.

Find out more about how to make security integral to your business.

Click here to download BT's white paper on network transformations with SD-WAN. 

Share this page

Tags

Related Articles

Home Office seeks £3m partner to support digital response to ‘unprecedented number of challenges’
17 October 2019

Department issues contract notice for organisation that can provide an array of commercial and project-management capabilities

Interview: NHS CCIO on why transformation needs to be driven locally
16 October 2019

Simon Eccles talks to Gill Hitchcock about AI, apps, open APIs and uniting innovative SMEs with clinicians to transform the health service

Related Sponsored Articles

Protecting what matters most: Security for growth
15 October 2019

Security can help you grow whilst protecting the very core of your organisation, writes BT 

Cloud security – it’s not black and white
1 October 2019

Nigel Hawthorn looks at how to review cloud use, report on risks and apply policies to reduce likely data loss incidents in this latest insight from BT

The CISOs and CIOs guide to securing networks in a digital age
24 September 2019

New network technology creates new risk, but the same technology is driving a step-change in how we think about security, writes BT

The age of virtualisation
17 September 2019

After more than 20 years of stability, networks are going through a period of dramatic transformation. BT looks beyond the hype at the real benefits of virtualisation.