The RSA Conference 2024 will kick off on May 6. Known as the “Oscars of Cybersecurity,” the RSAC Innovation Sandbox has become a benchmark for innovation in the cybersecurity industry.
Today let’s get to know the company Amebit.
Aembit was established in 2021 and is headquartered in Washington, USA. The company is dedicated to cloud workload Identity and Access Management (IAM), with the aim of automating and securely controlling access between cloud workloads and cloud services to reduce the cost of manual management. Currently, the Aembit team consists of 10-50 people, with the two co-founders being David Goldschlag (CEO) and Kevin Sapp (CTO).
David Goldschlag previously worked at the National Security Agency in the United States, where he invented onion routing technology. This encryption channel technology was initially used as a tool for U.S. intelligence and has since evolved into an online anonymous browser widely used by the general public to protect personal privacy.
David Goldschlag and Kevin Sapp both worked together at New Edge Labs, where they pioneered Zero Trust Network Access (ZTNA) and gained considerable recognition. Subsequently, New Edge Labs was acquired by Netskope, where Kevin Sapp served as Senior Director of Product Management, and David Goldschlag as VP. In 2021, they shifted their focus to the field of cloud workload IAM security and co-founded Aembit together.
It is worth noting that the establishment of Aembit originated from a conversation between David Goldschlag and Kevin Sapp with a customer. During the conversation, they discussed that traditional communication between workloads is often achieved through key connections, which can become extremely complex to manage as the number of workloads increases. Moreover, as businesses migrate to the cloud, scenarios where users’ cloud workloads communicate across on-premises, public, and hybrid clouds will become common, further driving the industry’s demand for IAM-focused cloud workloads.
In terms of financing, as of last November, Aembit has completed four rounds of financing, with the most recent round being a seed round on October 31, 2023. A total of $18 million has been raised, with Aembit’s main investors including CrowdStrike Falcon Fund, Ten Eleven Ventures, Ballistic Ventures, and Okta Ventures.
Traditional communication between cloud services is usually implemented by embedding public and private key pairs or passwords within the cloud service. However, as the variety of cloud services increases, such as CI/CD systems, Kafka middleware, SaaS applications, and cloud-native services, the risk of control increases if users deploy a large number of service types. Typical issues include:
For example, Service A and Service B are deployed on AWS and use AWS’s IAM for authentication and authorization. However, if they need to communicate with Service C deployed on Azure, users must resolve the discontinuity issues caused by different IAM mechanisms themselves.
Facing the control risks brought by traditional methods, the industry urgently needs a unified solution to manage access control between cloud services and maintain consistent policies.
If we consider each cloud workload as an identity accessing another identity’s workload, we can abstract the underlying complex authentication and authorization mechanisms into a consistent IAM layer for management, thereby significantly reducing manual input costs. In fact, Aembit does just that. Aembit supports the configuration to connect a large number of cloud services (whether self-built or public cloud services). When cloud workloads communicate, the request is first proxied to Aembit, which realizes secure communication between services based on predefined policies, such as key generation methods and identity authentication. According to research, Aembit has the following advantages:
Aembit’s architecture is inspired by the concept of SDN (Software-Defined Networking) and is simply divided into two core components: Edge (data plane) and Cloud (control plane). Edge is responsible for accessing the user’s cloud workloads, generating workload identities (Service Account), and proxying cloud service requests to the Cloud side for processing. Edge provides two access methods: Sidecar and SDK. There may be multiple Edge nodes in the data plane. Cloud is the control plane, mainly responsible for access policy configuration, access credential generation (short-lived certificates to avoid the security and management issues of long-lived certificates), client identity verification, event logging, and other functions. In addition, Cloud also receives a type of request from Edge, including workload status, access event logs, etc., and manages Edge nodes. To better understand its architecture, you can refer to the official workflow diagram provided, as shown below:
Scenario for Workload A accessing Service B:
Aembit’s product, Workload Identity & Access Management, can be briefly divided into three main parts: access policy configuration, access log auditing, and Edge component integration. On the product’s web interface, users can easily perform operations and management in these three areas, as shown in Figure 7:
>> Access Policy Configuration
One of Aembit’s core functions is access policy configuration. As shown in Figure 8, configuring a policy involves five parts: Client Workloads, Trust Providers, Access Conditions, Credential Providers, and Server Workloads. With the introduction of the product’s process in the previous section, you may have a certain understanding of these parts. Here, we focus on the importance of Access Conditions.
Access conditions allow users to impose certain restrictions on the access behavior of cloud workloads. For example, we can pass the information contained in an access record to a third-party application for processing and set certain conditions. In the case of Aembit’s integration with Wiz, the access policy can be seen in Figure 9.
As shown in Figure 10, there are two key elements in the access conditions:
(1) Cluster Restriction: Only when the container cluster is connected to Wiz can the client workload continue to access.
(2) TIME Restriction: The most recent access time is set to 1 hour (since an access event log is generated every time the access policy is met. If we set the access time too long, it will cause an increase in the number of access event logs, so it can be dynamically adjusted according to user needs).
We believe that “Access Conditions” not only ensure the security and traceability of access but also take into account system performance and user experience.
>> Access Log Auditing
Aembit provides a detailed access log auditing function. From its user interface, it includes two parts: Workload Events and Audit Logs. Workload Events can display information such as the client, server, and event access type, such as specific cloud service requests or responses, as shown in Figure 11. Audit Logs record the access behavior between cloud workloads based on access policies, as shown in Figure 12.
>> Edge Component Integration
Aembit Edge has already integrated more than 100 types of cloud applications. It provides two deployment methods: Sidecar and SDK. Aembit claims that Edge can be installed via Helm without invading the application code, as shown in the following figures:
Aembit claims that their Edge integration uses a “No-code auth technology (proxy design),” and based on the official video introduction, we believe that Aembit is likely to have drawn on the implementation of the Envoy proxy. Envoy supports mainstream L3/L4 layer protocols as well as proprietary protocols, has strong scalability, and is relatively developer-friendly. Considering that the communication protocols between cloud workloads may vary in different scenarios, this reference is reasonable.
From a technical perspective, I believe that “invasiveness” exists to varying degrees, and “non-invasive” is non-existent. Even when using a Sidecar to intercept request traffic, it is necessary to configure certain permissions in the Pod YAML. Therefore, regardless of the degree of invasiveness, it will affect the system’s configuration and deployment to some extent.
The Top 10 Finalists for the RSAC 2024 Innovation Sandbox Contest includes another company engaged in IAM security, named P0 Security. They provide a cloud access governance platform, mainly to ensure the cloud access security of all identities within the organization (including humans and machines) without affecting the workflow of developers. In addition, P0 Security can also manage the inventory of all IAM identities, assess their risk status, and manage their access lifecycle.
Compared with Aembit, P0 Security has a different focus in the field of IAM security. P0 Security is more like a cloud service IAM access adapter, using the best practices of public cloud manufacturers to configure IAM to meet compliance requirements. Aembit’s IAM security is more extensive, covering not only public cloud application scenarios but also a combination of hybrid cloud, local cloud, and other scenarios. From an innovative perspective, Aembit’s “access policy” can meet user needs well. In contrast, P0 Security seems only to use existing IAM policies for risk compliance, while Aembit appears to be more scalable.
This year’s RSAC Sandbox competition is particularly fierce in the field of cloud security, with four companies participating. Among them, Aembit and P0 Security focus on IAM solutions; RAD Security is involved in the field of cloud-native security; and Mitiga continues to focus on SaaS security.
This article mainly introduces Aembit’s architecture, functions, and technology. Overall, among the two companies offering IAM security, Aembit stands out more in terms of innovation than P0 Security. We look forward to Aembit achieving good results in the final competition.
More RSAC 2024 Innovation Sandbox Finalist Introduction:
The post RSAC 2024 Innovation Sandbox | Aembit: An IAM Platform for Cloud Workloads appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..
*** This is a Security Bloggers Network syndicated blog from NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. authored by NSFOCUS. Read the original post at: https://nsfocusglobal.com/rsac-2024-innovation-sandbox-aembit-an-iam-platform-for-cloud-workloads/