{"id":850,"date":"2022-03-01T09:34:46","date_gmt":"2022-03-01T09:34:46","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/?p=850"},"modified":"2022-02-23T09:36:32","modified_gmt":"2022-02-23T09:36:32","slug":"6-east-west-security-myths-busted","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blog\/6-east-west-security-myths-busted\/","title":{"rendered":"6 East-West security myths busted"},"content":{"rendered":"<p>With the world at our fingertips\u202fvia\u202fa simple\u202fGoogle search, it can\u202fsometimes\u202fbe tough to figure out\u202fwhat\u2019s fact\u202fand what\u2019s\u202ffiction.\u202fWhether you\u2019re an expert, novice, or beginner in the tech world, time should be spent putting\u202fcapabilities\u202fand terms\u202f<em>into<\/em>\u202faction \u2013 rather than trying to piece them together and understand them like a\u202fSudoku\u202fpuzzle. That\u2019s why we\u2019re going to debunk\u202fsix\u202fmajor\u202fEast-West security myths for you \u2013 so you can get back to the good stuff.<\/p>\n<p>1.<strong>\u202f<\/strong>East-West security\u202fis the monitoring and inspection of traffic moving medially within the network perimeter, working to identify and block threats and\u202fenable\u202faccess rights.<br \/>\n<strong>Busted<\/strong>.\u202fEast-West security\u202fdoes\u202fall of\u202fthe fancy stuff mentioned,\u202fwith one\u202f<em>very\u202f<\/em>important difference: it moves laterally through the network perimeter. This is a key understanding, since East-West security operates on the premise that threat factors will eventually find a way through\u202f<a href=\"https:\/\/www.vmware.com\/topics\/glossary\/content\/next-generation-firewall\" target=\"_blank\" rel=\"noreferrer noopener\" data-feathr-click-track=\"true\">next-generation firewalls<\/a>\u202f\u2013 which means all internal network traffic is vulnerable.<br \/>\n<strong>2.<\/strong>\u00a0A traditional firewall that manages North-South traffic can\u202fhandle\u202fa modern network breach by\u202fitself.<strong>\u202f<\/strong><\/p>\n<p><strong>Busted.<\/strong>\u202fWhile it\u2019s important to have North-South security in place (filtering\u202fthe traffic that is exiting and entering the network), it\u202fcannot protect\u202fthe network\u202fon its own,\u202fas it may have done in the 90s.\u202fPerimeter firewalls cannot see east-west traffic\u202feasily\u202f\u2013\u202fwhich means that,\u202fwithout the proper safeguards in place,\u202f<a href=\"https:\/\/blogs.vmware.com\/networkvirtualization\/2020\/09\/what-is-lateral-movement.html\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-feathr-click-track=\"true\">attackers can move laterally within the network once they\u2019ve slipped past\u202fthe perimeter.<\/a><\/p>\n<p><strong>3.<\/strong>\u00a0Indicators of compromise (IoCs) in East-West traffic are always the same as those found in North-South traffic.<strong>\u202f\u202f<\/strong><\/p>\n<p><strong>Busted.<\/strong>\u202fIoCs\u202ffound in\u202f<a href=\"https:\/\/blogs.vmware.com\/networkvirtualization\/2020\/08\/eliminate-traffic-hairpinning.html\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-feathr-click-track=\"true\">East-West traffic<\/a>\u202foften\u202fvary from those found in North-South traffic, which causes many security professionals to search for a way to streamline their analytics approach. Perimeter security mostly relies on signatures and threat intelligence feeds,\u202fand,\u202ffor East-West traffic,\u202fthe assumption has been that analysts need to create a whole new set of policies and signatures from scratch. The answer is no, and better yet \u2013 there\u2019s a\u202fsimple\u202fsolution.<\/p>\n<p><strong>4.<\/strong>\u00a0Implementing East-West security is costly, time-consuming, and has high operational risk.<\/p>\n<p><strong>Busted.\u202f<\/strong>As networks continue to adopt a more modern structure,\u202fattackers will\u202flearn\u202fto adapt to a modern environment. Enabling East-West security does not have to\u202fcomplicated, but it is necessary.\u202f<a href=\"https:\/\/www.vmware.com\/products\/nsx.html\" target=\"_blank\" rel=\"noreferrer noopener\" data-feathr-click-track=\"true\">VMware\u2019s NSX Distributed Firewall<\/a>\u202fcapabilities allow organizations to gain greater control and visibility\u202facross\u202ftheir networks \u2013 which speeds up your protection process, saves you money, and\u202fhardens your security posture.<\/p>\n<p><strong>5.<\/strong>\u00a0The initial breach matters more than lateral movement inside of the network.\u202f<strong>\u202f<\/strong><\/p>\n<p><strong>Busted.\u202f<\/strong>Allow us to elaborate.\u202fOf course, we don\u2019t want any breaches. We can all agree that is something we want to be proactive\u202fabout\u202fand prevent. However, breaches are inevitable as attackers and software get more sophisticated. The initial breach is going to happen \u2013\u202fand\u202fthe\u202fensuing\u202flateral movement is where attackers can\u202fdwell and\u202fdismantle your organization. It\u2019s imperative that you\u202f<a href=\"https:\/\/blogs.vmware.com\/networkvirtualization\/2020\/12\/operationalizing-east-west-security-at-scale-in-the-datacenter.html\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-feathr-click-track=\"true\">operationalize East-West security<\/a>\u202fso\u202fyou\u2019re ready\u202ffor breaches\u202f<em>and<\/em>\u202fprepared to defend\u202fagainst lateral intrusions.<\/p>\n<p>Source: SC Media<\/p>\n<p><a href=\"https:\/\/www.scmagazine.com\/native\/network-security\/6-east-west-security-myths-busted\">Read the Full Story Here<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the world at our fingertips\u202fvia\u202fa simple\u202fGoogle search, it can\u202fsometimes\u202fbe tough to figure out\u202fwhat\u2019s fact\u202fand what\u2019s\u202ffiction.\u202fWhether you\u2019re an expert, novice, or beginner in the tech world, time should be spent putting\u202fcapabilities\u202fand terms\u202finto\u202faction \u2013 rather than trying to piece them together and understand them like a\u202fSudoku\u202fpuzzle. That\u2019s why we\u2019re going to debunk\u202fsix\u202fmajor\u202fEast-West security myths for you [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":499,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-850","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>6 East-West security myths busted - Community<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blog\/6-east-west-security-myths-busted\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"6 East-West security myths busted - Community\" \/>\n<meta property=\"og:description\" content=\"With the world at our fingertips\u202fvia\u202fa simple\u202fGoogle search, it can\u202fsometimes\u202fbe tough to figure out\u202fwhat\u2019s fact\u202fand what\u2019s\u202ffiction.\u202fWhether you\u2019re an expert, novice, or beginner in the tech world, time should be spent putting\u202fcapabilities\u202fand terms\u202finto\u202faction \u2013 rather than trying to piece them together and understand them like a\u202fSudoku\u202fpuzzle. That\u2019s why we\u2019re going to debunk\u202fsix\u202fmajor\u202fEast-West security myths for you [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blog\/6-east-west-security-myths-busted\/\" \/>\n<meta property=\"og:site_name\" content=\"Community\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-01T09:34:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-akwice-3094799.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"1599\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/6-east-west-security-myths-busted\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/6-east-west-security-myths-busted\/\",\"name\":\"6 East-West security myths busted - Community\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/6-east-west-security-myths-busted\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/6-east-west-security-myths-busted\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-akwice-3094799.jpg\",\"datePublished\":\"2022-03-01T09:34:46+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/6-east-west-security-myths-busted\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blog\/6-east-west-security-myths-busted\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/6-east-west-security-myths-busted\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-akwice-3094799.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-akwice-3094799.jpg\",\"width\":1280,\"height\":1599},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/6-east-west-security-myths-busted\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"6 East-West security myths busted\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/\",\"name\":\"Community\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"6 East-West security myths busted - Community","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blog\/6-east-west-security-myths-busted\/","og_locale":"en_US","og_type":"article","og_title":"6 East-West security myths busted - Community","og_description":"With the world at our fingertips\u202fvia\u202fa simple\u202fGoogle search, it can\u202fsometimes\u202fbe tough to figure out\u202fwhat\u2019s fact\u202fand what\u2019s\u202ffiction.\u202fWhether you\u2019re an expert, novice, or beginner in the tech world, time should be spent putting\u202fcapabilities\u202fand terms\u202finto\u202faction \u2013 rather than trying to piece them together and understand them like a\u202fSudoku\u202fpuzzle. That\u2019s why we\u2019re going to debunk\u202fsix\u202fmajor\u202fEast-West security myths for you [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blog\/6-east-west-security-myths-busted\/","og_site_name":"Community","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2022-03-01T09:34:46+00:00","og_image":[{"width":1280,"height":1599,"url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-akwice-3094799.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/6-east-west-security-myths-busted\/","url":"https:\/\/www.tsfactory.com\/forums\/blog\/6-east-west-security-myths-busted\/","name":"6 East-West security myths busted - Community","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/6-east-west-security-myths-busted\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/6-east-west-security-myths-busted\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-akwice-3094799.jpg","datePublished":"2022-03-01T09:34:46+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/6-east-west-security-myths-busted\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blog\/6-east-west-security-myths-busted\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/6-east-west-security-myths-busted\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-akwice-3094799.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-akwice-3094799.jpg","width":1280,"height":1599},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/6-east-west-security-myths-busted\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/"},{"@type":"ListItem","position":2,"name":"6 East-West security myths busted"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/#website","url":"https:\/\/www.tsfactory.com\/forums\/","name":"Community","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/850","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/comments?post=850"}],"version-history":[{"count":1,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/850\/revisions"}],"predecessor-version":[{"id":851,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/850\/revisions\/851"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media\/499"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media?parent=850"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/categories?post=850"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/tags?post=850"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}