1 minute read time.
The perimeter platforms of the 90's that secured and kept stable most TCP/IP networks might now provide clarity on how networks designed at TCP/IP layer 2 and 3 can help with securing cloud infrastructures i.e. modern networks. Cloud based platforms offer high level of functionality at layer 7, though through standardisation, there are some satisfactory mitigative controls designed. For the agile modern network, compensatory controls through policies and procedures might not provide the granularity of oversight that customers might require. So inherently having those compensatory controls at the lower layers ensures the modern cloud platform has an end to end security posture that is better fir for purpose.


The requirement will continue to fuel next gen layer 2 devices and perhaps we might just go back to the future once more, where the standard two factor authentication model either augments its profile approach to extend out RBAC duties to layer 2 segments automatically. So instead of two factor authentication , we have x-factor mechanisms based on end to end components that a profile transacts with. Most cloud based systems have this approach using one core profile ID, though the overlap into layer 2 is not so well developed. The extension of user profiles into OS partitioning that complements layer 2 network functions will likely make the development of x-factor authentication a progressive area for technology innovation.