@cm @jerry @risottobias @rhys more about management, proactive informed outreach, etc.
Many variables beyond the easily quantifiable cvss scoring, count of them, etc.
@jerry @cm @rhys wonder if the correct approach really is to do some sort of tailscale thing and make the outer gate block all incoming.
{inner firewall} <- {hole punching VPN} -> {outer appliance, no ports, no features, no smarts} -> web <- {roaming hole punching VPN} <- user's laptop
not saying full device-to-device networking necessarily, but the hole punching part.
can't hit {inner thing} if you need to have popped an existing employee laptop for it
@risottobias @jerry @cm I do something close to this in a personal capacity outside of my enterprise role — but do we really think this is what large enterprise should do?
I'm not against that but we'd have to be clear this is a huge shift in how the world manages netsec if so.
@rhys @jerry @cm I don't necessarily like direct P2P hole punching SASE / tailscale things. I like having network appliances that can check the work of the endpoint daemons
I like having dumb routers as bulkheads between subnets.
getting past the outer one via hole punching would be nice - I realize that doesn't help if you have a service that needs to listen on a port (mail, webserver, etc)