The need to reduce network attack surface while providing personnel with permissible access to the outside world
Cybersecurity is mission-critical for the U.S. Government and has become an integral part of the nation’s defense. For a military unit based in Virginia charged with securing segments of the Department of Defense Information Network (DoDIN), thoroughly investigating cyber threats requires access to the internet beyond top-level .mil and .gov domains.
For the unit members, access to personal email, social media, and commercial websites to conduct personal business was restricted for security reasons. However, internet access for all unit personnel was considered critical to ensuring personnel readiness, morale, and quality of life. To that end, the unit researched several solutions to reduce their network attack surface, minimize risk, and provide all personnel with permissible access to the outside world.
At the same time, the unit is responsible for mitigating network intrusions across the entire military branch. The unit’s objective was to reduce the number of cyber incidents and enable a shift in internet access policies to scale across the enterprise network and benefit other military branches more broadly.
The Communications Department Head of the military unit led the efforts to find the optimal solution. After considering internet access kiosks scattered throughout the building, as well as various commercial technology solutions, the team decided to evaluate Authentic8’s Secure Browsing.
Prior to deployment, personnel were not permitted to access sites that were not related to the mission, which included external webmail and social media websites. Personal electronic devices were prohibited in the workplace due to facility security restrictions. This policy required individuals to leave the secured area when checking personal email, accessing non-whitelisted sites, and visiting websites not directly associated with mission execution.
The unit was also concerned about the rapid adoption of encrypted web data, and the associated difficulty in inspecting the traffic effectively enough. Once the internet usage policy was defined, the unit concerned itself with how best to implement a new technology without incurring an increase in malicious code transiting the network.
The unit was committed to giving personnel the internet access they needed by “transferring the most risk-laden network communications off of the operational platform by leveraging a secure, sandboxed web browsing experience,” as the unit’s Communications Department Head framed it. The overall objective was to find a solution that would “allow end-users to interact with websites in a familiar way while keeping potentially malicious and un-inspectable traffic from infecting the network.” The unit considered Authentic8’s Silo remote isolation browser to be the optimal solution for their needs.
“Our objective was to find a solution that would allow end-users to interact with websites in a familiar way while keeping potentially malicious and un-inspectable traffic from infecting the network.”
- Unit’s Communications Department Head“Operation SHIELDS UP”
The unit intended to migrate all external web browsing traffic off the unclassified production network and onto the Silo isolation platform. In what the group affectionately referred to as “Operation SHIELDS UP”, the unit rolled out the solution in approximately thirty days. Phase I commenced with the network’s web proxy blocking all websites — with a few whitelisted exceptions — that did not have the .gov or .mil top-level domain. All websites requiring Common Access Card (CAC) authorization remained available on the production network. After an initial training session and clear communication of the plan, licenses were deployed, and user accounts established.
The unit’s systems administrator stated, “The Silo Web Isolation Platform allows us to grant access to a more diverse array of websites — only blocking those that violate Department of Defense (DoD) acceptable use policy — while ensuring the confidentiality, integrity, and availability of our unclassified production network.” The Silo deployment ensured that mission-focused research and analysis did not unintentionally open the network to attack, should analysts venture to the darker places on the internet. Additionally, it enabled the commander to responsibly provide access to external webmail and “quality of life” web services that modern service members deserve.
“The Silo Web Isolation Platform allows us to grant access to a more diverse array of websites — only blocking those that violate Department of Defense (DoD) acceptable use policy — while ensuring the confidentiality, integrity, and availability of our unclassified production network.”
- Unit’s Systems AdministratorZero incidents since Silo deployment
Several years later, the unit continues to keep their “shields up,” providing every team member with access to a Silo web browser as the primary means of accessing the internet. Since deployment, there have been zero incidents on the network to mitigate. The unit has since expanded the use of the platform to include Silo for Research for more in-depth cyber-threat intelligence research, in addition to exploring new user access to Silo, initially focused on remote workers and unit reservists.