0% found this document useful (0 votes)
8 views

how-to-implement-secure-access-service-edge-sase-in-6-steps

The document outlines a six-step guide for implementing Secure Access Service Edge (SASE) to integrate networking and security capabilities for improved protection and performance. Key steps include defining the edge, determining critical capabilities, conducting a gap analysis, addressing technical debt, planning the transition phases, and gaining stakeholder buy-in. The goal of SASE is to reduce vendor complexity and costs while enhancing security and operational resilience in a cloud-driven environment.

Uploaded by

ali.he1986
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

how-to-implement-secure-access-service-edge-sase-in-6-steps

The document outlines a six-step guide for implementing Secure Access Service Edge (SASE) to integrate networking and security capabilities for improved protection and performance. Key steps include defining the edge, determining critical capabilities, conducting a gap analysis, addressing technical debt, planning the transition phases, and gaining stakeholder buy-in. The goal of SASE is to reduce vendor complexity and costs while enhancing security and operational resilience in a cloud-driven environment.

Uploaded by

ali.he1986
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

GUIDE

How to Implement
Secure Access
Service Edge (SASE)
in 6 Steps
Combine Networking and Security Capabilities for
Better Protection — Without Sacrificing Performance
“I don’t need another security tool.”
This is a common refrain from both IT and security leaders. And it makes sense when you The quantity of security
consider that many large enterprises today have over 130 security tools.1 This reality creates products utilized does not
a challenge, both in managing and optimizing these siloed systems — not to mention trying equate to safety. In fact,
to correlate them into a single risk rating. these tools may be working
According to Gartner and many global CISOs, the answer to this excessive proliferation is to do the opposite. Over
consolidation. Enterprises need tools that can be integrated to work together seamlessly, 70% of CISOs admit they
rather than deploying individual solutions that meet one-off requirements. don’t evaluate security tools
based on how effectively
Gartner’s secure access service edge (SASE) framework outlines the convergence
they reduce cyber risk.
of networking and security capabilities to create an effective and secure edge. The
And 36% report that their
cybersecurity concept emphasizes the need for vendor rationalization to reduce
security team is sidelined
complexity while increasing visibility and ease of management.
by manual efforts.2

The Benefits of SASE


The goal of integrating these networking (performance) and security (protection) Having one vendor
capabilities, ideally in one vendor platform, is to help organizations address changes like
for endpoints, one
the move to cloud applications and a distributed and mobile workforce. Here are some of
the key benefits of transitioning to a SASE architecture: for network/incident
• Enable New Digital Business Scenarios for users, devices, applications, data, and
response, and one
services located outside the corporate enterprise for the edge is a
• Improve Security by delivering security controls as close to the user as possible, great start, providing
making it harder for attackers to discover and exploit corporate resources the most return on
• Improve Global Scale and Operational Resilience with low-latency access to users, investment.
devices, and services

• Reduce Vendor Management Complexity and Costs by consolidating vendors to


Steve Winterfeld
increase visibility and ease of management Sr. Director, Security Technology
and Strategy, Akamai
• Enable Zero Trust using a multitude of threat and contextual signals to establish trust
and ensure secure access to internal resources and the internet

• Increase Effectiveness of Network and Network Security Staff by reducing friction to


secure the network without degrading performance

2
How to Implement SASE in 6 Steps

1. Define your edge


Depending on your architecture, you may still need network infrastructure, but most Instead of the
enterprises are moving to edge compute. Companies may be organized around thin
or heavy branches, others will be cloud native or heavy cloud. Regardless, you need
security perimeter
to define the edge and what you want to move to. Some services may still need to be being entombed in a
delivered locally (SD-WAN), but the trend is to move to mature SASE offerings with box at the data center
services hosted on the edge. How you view your boundaries will determine which
tools you need for your strategy.
edge, the perimeter
is now everywhere an
2. Determine which capabilities are critical
enterprise needs it
to be — a dynamically
It is important to note that SASE doesn’t present one standard set of tools but rather a
framework on how to think about defending the edge. Every organization will need to
created, policy-based
assess which specific capabilities they need for both network as a service (NaaS) and secure access service
network security as a service (NSaaS). Gartner’s SASE framework lists a number of different edge.
capabilities, but that list is not comprehensive. For example, some newer threats require the
addition of tools to protect JavaScript environments that are now facing skimmer attacks by
Gartner
groups like Magecart.
The Future of Network Security
Additionally, if you want to build a unified edge strategy for both employees and customers, Is in the Cloud; 30 August 2019;
a CDN is the natural foundation networking platform. On the next page is a sample of a Lawrence Orans, Joe Skorupa,
tailored set of capabilities from Akamai. Neil MacDonald

3
Akamai Cloud-Delivered SASE

3. Conduct a gap analysis


After you have defined what you are protecting and which tools you want to integrate, it
is time to conduct a gap analysis to determine where you are mature and where you will
need to invest to accomplish your strategy. As part of the gap analysis, look at what features
are critical for your business model. This will depend on how you enable your workforce
and service your customers. This is a good time to review compliance and audit findings to
see where you have mandated requirements. Finally, it is worth considering using external
consultants to get a fresh perspective.

4. Define your technical debt


While you may have the networking and security systems you need for your strategy, it is
important to analyze the maturity and effectiveness of those systems. Some tools might
have been purchased to solve a specific issue, but haven’t been optimized to fully make
use of capabilities or integrated with other systems. Other tools may be customized and
locked into out-of-date versions or simply behind in updates. Issues like this can contribute
to “security debt”— buildup of application and infrastructure vulnerabilities in a company’s
IT environment that can increase the odds of a breach. One of the primary causes for this One in three system
security debt is limited resources, like one engineer being responsible for maintaining breaches is caused by
multiple, disparate systems. unpatched systems.3

4
5. Plan out the phases for your transition to SASE
For most companies, the transition to SASE will be a multiphase journey. It may include By 2024, at least
moving away from individual point solutions as they age out. It is important to review your
40% of enterprises
gap analysis and consider which risks need to be prioritized first. For example, if your DNS
infrastructure or JavaScript environment is not protected, that is the right place to start. If will have explicit
you have an established program and are looking to mature it, there are some natural areas strategies to adopt
to focus on first.
SASE, up from less
• Gartner recommends that Zero Trust Network Access (ZTNA) should be the starting
than 1% at year-end
place for SASE implementation, as it allows for application-level access versus full 2018.
network access. In the long term, it is a better approach for a distributed workforce and
is the next-generation framework to focus on reducing lateral movement, security risk, Gartner
and known vulnerabilities. ZTNA solutions can provide security where it is needed to Hype Cycle for Enterprise
meet the needs of modern business — at the edge. A CDN delivery model for ZTNA Networking, 2020; 8 July 2020;
further extends protection across the core, to the cloud, and to the edge. Andrew Lerner, Danellie Young

• The next recommended phase for most companies is a secure web gateway (SWG)
and cloud access security broker (CASB). This brings up a natural challenge, as there
are no SASE providers that offer all of the solutions mentioned, so it is important to
look at vendors with a broad set of capabilities and integrated partners to meet your
strategic goals. A SWG that is cloud based and integrated into the edge provides
a better option than trying to adapt a legacy system. Look for SWGs that include
capabilities like data loss prevention (DLP) and sandboxing.

• Finally, these solutions should be built on foundational capabilities like web application
and API protection as a service (WAAPaaS), DNS security, and DDoS protections.
While many organizations have these capabilities today, they are likely not on a single
platform, which introduces complexity. Finding a platform that can support these
capabilities along with ZTNA and SWG helps reduce complexity and cost.

6. Get buy-in from key stakeholders


When building out a business case for the budget, focus on the fact that consolidating
vendors with SASE reduces both complexity and cost. Additionally, having an industry-
analyst-supported model like SASE provides validation, proven resources, and specialists to
consult with — all of which should give the board more confidence in your security strategy.

Take these six steps to develop an integrated performance and security strategy. Then
partner with Akamai — one of a small number of vendors named by Gartner as offering
a SASE platform — to discuss and initiate implementation. Extend protection across your
core, to the cloud, and out to the edge, minimizing risk while enabling future evolutions
in business strategies that leverage the cloud with SASE.

Learn more about how to get started at akamai.com/SASE.

5
Sources:
1. https://biztechmagazine.com/article/2019/03/rsa-2019-most-organizations-use-too-many-cybersecurity-tools
2. https://panaseer.com/reports-papers/report/visibility-in-cybersecurity/
3. https://www.zdnet.com/google-amp/article/cybersecurity-one-in-three-breaches-are-caused-by-unpatched-vulnerabilities/

Akamai secures and delivers digital experiences for the world’s largest companies. Akamai’s intelligent edge platform surrounds everything,
from the enterprise to the cloud, so customers and their businesses can be fast, smart, and secure. Top brands globally rely on Akamai to
help them realize competitive advantage through agile solutions that extend the power of their multi-cloud architectures. Akamai keeps
decisions, apps, and experiences closer to users than anyone — and attacks and threats far away. Akamai’s portfolio of edge security, web
and mobile performance, enterprise access, and video delivery solutions is supported by unmatched customer service, analytics, and
24/7/365 monitoring. To learn why the world’s top brands trust Akamai, visit www.akamai.com, blogs.akamai.com, or @Akamai on Twitter.
You can find our global contact information at www.akamai.com/locations. Published 04/21.

You might also like