Sase Sse Ag
Sase Sse Ag
Sase Sse Ag
Cisco Public
February, 2023
Figure 1.
High level DC-Centric Architecture
Because of these changes, the DC-centric model has become costly and inefficient for handling this traffic.
Consider the following:
● Remote work and hybrid work are here to stay as people work from anywhere on a continuous basis.
This makes user mobility is a paramount capability for modern enterprises
● Distributed users and applications are hard to manage and increase security risk due to a larger attack
surface
Figure 2.
High level SASE Architecture
In this new paradigm, IT requires a simple and reliable approach to protect and connect with agility. This is
forcing a convergence of network and security functions closer to users and devices, at the edge—and is best
delivered as a cloud-enabled model called secure access service edge (SASE).
Figure 3.
SASE Capability Overview
Cloud computing services offer convenient, pay-as-you-go models that eliminate costly expenditures and
maintenance. Cloud providers host a choice of infrastructure, platform, and software offerings on-site that you
“rent”, giving your organization the flexibility to turn cloud computing services up and down according to
changing requirements. There are three main cloud computing service options:
● Infrastructure-as-a-Service (IaaS): In this model, a cloud provider hosts infrastructure components that
are traditionally located in on-premises data centers. With IaaS, your organization can choose when and
how you want to administer workloads, without needing to buy, manage, and support the underlying
infrastructure.
● Platform-as-a-Service (PaaS): This model is one layer of abstraction above IaaS. Cloud providers, in
addition to providing infrastructure components, also host and manage operating systems and
middleware that your developers need to create and run applications.
● Software-as-a-Service (SaaS): With SaaS, cloud providers host and manage an entire infrastructure,
as well as end-user applications. When your company chooses a SaaS model, you do not need to install
anything; your users will be able to log in and begin immediately using the cloud provider’s application
running on their infrastructure.
Service edge refers to global point of presence (PoP), IaaS, or colocation facilities where local traffic from
branches and endpoints is secured and forwarded to the appropriate destination without first traveling to data
center focal points.
The Software Defined WAN (SD-WAN) and Security Service Edge (SSE) components of SASE are primarily
delivered as Networking-as-a-Service (NaaS) and Security-as-a-Service (SECaaS) models. This refers to the
ability to offer these services as SaaS. By delivering security and networking services together from the cloud,
organizations will be able to securely connect any user or device to any application without having to install and
maintain the network management and security infrastructure.
In 2021, Gartner coined a new concept for businesses who may be ready to transition to cloud security without
a complete overhaul of their network architectures SASE requires. This concept is known as Security Service
Edge. The SSE architecture is a collection of security functions that can reduce complexity and improve user
experience by consolidating multiple disparate security capabilities and delivering them from the cloud. These
security functions include, but are not limited to, DNS-layer security, secure web gateway, firewall as a service,
cloud access security broker, and zero trust network access.
Figure 4.
Security Service Edge Capability Overview
Whether included in an SASE architecture or deployed standalone, a Security Service Edge architecture should:
DNS-layer Security
DNS resolution is the first step when a user attempts to access a website or other service on the Internet. DNS-
layer Security logs and categorizes DNS activity by type of security threat or web content and the action taken,
whether it was blocked or allowed.
Figure 5.
DNS-layer Security Overview
It is critical that the DNS-layer security is underpinned by excellent threat intelligence sources. Threat
intelligence itself is not a solution but is a crucial security architecture component. A threat intelligence platform
A cloud-based web proxy or SWG provides security functions such as URL and category filtering and real-time
inspection of inbound files for malware and other threats. SSL/TLS decryption is necessary to inspect encrypted
web traffic before other certain SWG security capabilities can enforced. Content filtering by category or specific
uniform resource locators (URLs) is used to block destinations that violate policies or compliance rules. Remote
browser isolation protects users from potential malware and other threats by redirecting browsing to a cloud-
based host. This isolation is achieved by serving the web content to users via a remotely spun up surrogate
browser located in the cloud.
Figure 6.
Secure Web Gateway Overview
Network anti-malware inspects files as they traverse the network, using dynamic threat intelligence to check
the disposition of files before they reach the device. File sandboxing is used to open and inspect untrusted files
which could compromise an endpoint.
Firewall As a Service
Firewall as a Service (FWaaS) is the cloud-based delivery of firewall functionality to protect non-web Internet
traffic. In addition to layer 3-4 filtering, FWaaS typically includes features for intrusion prevention and
application-level visibility and control.
Some of the benefits provided by FWaaS when compared to on-premises firewalls include:
● Scalable due to the pool of resources available to cloud-delivered firewalls allowing easy growth or
contraction based on an organization’s need
● Centralized policy management for multiple remote locations
● Easier to deploy and maintain
Remote Access as a Service (RAaaS) provides cloud-delivered VPN services for roaming users covering use
cases for applications or services that ZTNA solutions do not support. Like FWaaS, RAaaS provides a scalable
alternative to on-premises VPN solutions and in addition to private application access, enables roaming users to
receive security capabilities provided by through the FWaaS such as Layer 3-4 traffic filtering and intrusion
prevention. RAaaS should still follow zero trust principles, incorporating multi factor authentication (MFA),
context checks, and least privilege access to private applications.
Cloud access security brokers help control and secure the use of SaaS applications. The value of CASBs stems
from their capability to give insight into cloud application usage across cloud platforms and to identify
unsanctioned use. CASBs use auto discovery to expose shadow IT, detecting and reporting on the cloud
applications that are in use across the network.
A vital ability of CASB is data loss prevention (DLP) - the capability to detect and provide alerts when abnormal
user activity occurs to help stop both internal and external threats.
Although included as part of CASB, inline DLP warrants its own mention and provides data security for user
traffic traversing the Internet or traversing data centers to utilize private applications. A common CASB
deployment is to install out of band and to provide API based DLP functionality. For increased security, DLP
should be implemented as a standalone inline feature of the SASE security stack to catch sensitive information
as it passes through the network. This can then be supplemented with DLP capabilities built into a CASB.
In a DC-centric model roaming users are provided remote access to resources using full tunnel VPN, redirecting
all traffic, internal and internet destined, to the data center. Scalability issues can arise as users shift between
on-premises and remote work and VPN appliances are starved for resources. User experience suffers as
backhauled traffic causes high latency and users must enter credentials numerous times during the workday
creates password exhaustion. In a cloud-enabled model, access can be provided to private or public
applications leveraging a clientless or client based zero trust network access solution.
Zero Trust security takes a “never trust, always verify” approach to security. To do this, it is essential to verify
identity and context. Identity is determining who a user is. Traditional identity checks use passwords, but these
can be stolen, or brute forced making password-only identity checks unreliable forms of identity verification.
Context is the use of supplemental information to improve security decisions at the time they are made
After identity and context are verified, least privilege access is given based on granular policy rules and the user
only has visibility and access to applications they are authorized to. This access is segmented on a per-
application basis at layer 7 in the OSI model, limiting a potential attacker’s lateral movement within the network
and containing breaches. Because only traffic specific to the authorized application traverses the ZTNA solution
rather than all client traffic, the overall remote user experience is improved.
Figure 9.
Zero Trust Network Access Overview
As mentioned earlier, traditional identity checking may only use passwords can be unreliable. ZTNA requires a
strong, cloud-based, multi-factor authentication solution that ensures users are verified before granted access
to specified resources. User experience can be further improved using SAML/SSO or passwordless
authentication capabilities helping mitigate password exhaustion and poor security habits. ZTNA solutions
typically take the form of a reverse proxy for clientless ZTNA access via a browser or a software agent for client
based ZTNA access. While clientless ZTNA solutions can provide seamless access to users with managed and
unmanaged devices, client based ZTNA solutions offer enhanced security using additional device and policy
checks available with software agents.
Configuring multiple routers connected to different circuits (for example, an MPLS link and a broadband Internet
link) to route network traffic efficiently and optimally can be challenging. Beyond simple load balancing,
available bandwidth capacity may go unused during periods of congestion. For example, your broadband
Internet connection may be running slowly during a given period of time, while your costly MPLS link is relatively
uncongested and may actually be able to provide faster Internet connectivity. The inability to aggregate
disparate links means wasted bandwidth capacity and lower employee satisfaction.
SD-WAN combines and optimizes traditional WAN technologies, such as MPLS and broadband Internet
connections. This allows organizations to efficiently route network traffic to multiple remote branch locations
while providing enhanced monitoring and management capabilities. SD-WAN monitors network traffic across all
available links in real-time and dynamically selects the best route for each data packet traversing the network.
Additionally, through direct peering relationships to cloud providers middle mile optimization reduces overall
hop counts, which reduces latency and improves the overall user experience when accessing applications.
Figure 10.
SD-WAN Overview
The SD-WAN component of a SASE architecture should have the following qualities:
● Flexible, as a service WAN management for on-premises, cloud, and multitenant environments
Digital experience from a SASE perspective is how end users experience any application, from wherever they’re
sitting whether that is from their home office or an on-premises branch site. Digital Experience Monitoring
(DEM) is a Gartner IT category that emerged in 2019 to address user experience, human or machine, across
every dependency, whether network or service, inside or outside your organization. DEM is used to ensure the
reachability and availability of business-critical SaaS, internally hosted applications, and cloud-based services
over any network, including the Internet and the corporate network.
Figure 11.
Digital Experience Monitoring Overview
● Provide metrics to improve the Digital Experience for users no matter where they are or what application
they are using
● Provide lower Mean Time to Identification (MTTI) of issues
● Eliminate wasteful finger-pointing between teams
● Hold providers accountable and get swift resolutions
Figure 12.
Cisco Secure Framework
Security is not a one-size-fits-all solution. To help understand the architecture, Cisco has broken it down into
three pillars:
● User and Device Security: making sure users and devices can be trusted as they access systems,
regardless of location
● Network and Cloud Security: protect all network resources on-prem and in the cloud, and ensure
secure access for all connecting users
● Application and Data Security: preventing unauthorized access within application environments
irrespective of where they are hosted
This architecture guide primarily focuses on securing these three pillars from a SASE/SSE perspective using
SAFE. For more information on Cisco Zero Trust security, refer to the Cisco Zero Trust Architecture Guide.
Figure 13.
SASE/SSE Business Flows
Insecure Unmanaged Device (BYOD) Devices that do not have certain security features enabled – such
as encryption, firewalls, passwords, etc. – are considered riskier
or potentially out of compliance with data regulation standards
that require encryption, like healthcare industry compliance
standards.
Figure 14.
SASE/SSE Business Flows with threats
Common Capabilities
The following common capabilities are included in Cisco SASE and SSE.
Security Orchestration Automation & SOAR is a set of technologies that enable organizations to
Response (SOAR) collect information monitored by the security operations team.
Digital Experience Monitoring (DEM) addresses user experience, human or machine, across every dependency,
whether network or service, inside or outside your organization. DEM looks at the entire digital journey and how
every part of it drives successful user actions. By focusing on visibility into digital experience as a whole, DEM
helps bridge IT initiatives to business outcomes.
SD-WAN
Provides a replacement for traditional WAN routers and are agnostic to WAN transport technologies. SD-WAN
provides dynamic, policy-based, application path selection across multiple WAN connections and supports
service chaining for additional services such as WAN optimization and firewalls.
An intermediary between cloud providers, cloud-based applications, and cloud consumers to enforce an
organization’s security policies and usage.
Application Visibility & Control (AVC) Visibility and access control to approved web applications.
DNS-layer Security
DNS security enforces security at the DNS layer to block malware, phishing, and command and control
callbacks over any port.
Firewall as a Service
Organizations are embracing direct internet access instead of backhauling traffic to the data center. FWaaS
provides cloud delivered firewall services without the need to deploy, maintain, and upgrade physical or virtual
appliances at a site.
Secure Web Gateway protects your network against unwanted software or malware users may encounter on
the web. It does this by granting your IT or SecOps team granular control over what users on the company
network can do while online.
A full proxy that can log and inspect all your web traffic for
greater transparency, control, and protection. IPsec tunnels, PAC
Web Security files and proxy chaining can be used to forward traffic for full
visibility, URL and application-level controls, and advanced
threat protection.
Zero Trust Network Access allows organizations to provide granular and adaptive access controls to public and
private applications. Lateral movement is prevented through application layer segmentation while user
experience is improved due to traffic not being backhauled through a data center.
Endpoint security solutions protect endpoints such as mobile devices, desktops, laptops, and even medical and
IoT devices. Endpoints are a popular attack vector, and the goal of an attacker is to not only compromise the
endpoint but also to gain access to the network and the valuable assets within.
Security practices such as turning on disk encryption, disabling automatic login, and installing anti-virus help
ensure an endpoint is “healthy” when joining the network or accessing an application.
The Web security connector redirects all web traffic to a full web
Web Security Connector
proxy that provides secure web gateway security services.
Zero Trust Network Segmentation is a security solution that enforces network segmentation policies on user
and device traffic that access the network after verifying their identity and context.
WAN/Internet Edge
The following WAN and Internet edge capabilities are included within the Cisco SASE/SSE Architecture.
Data center security is the practice of applying security controls to the data center with the goal of protecting it
from threats that could compromise the confidentiality, integrity, or availability of business information assets or
intellectual property. Data center security follows the workload across physical data centers and multi-cloud
Because the focus of this guide is on SASE/SSE, details regarding securing the data center are limited in scope.
More detail information about securing the data center can be found in the Secure Data Center Design Guide.
Application Visibility & Control (AVC) Visibility and access control to approved web applications.
Application Workload Security includes measures at the application level that aim to prevent data or code within
the application from being stolen or hijacked. It encompasses the security considerations that happen during
application development and design, but it also involves systems and approaches to protect applications after
they get deployed.
All application servers should be hardened and follow security practices such as disabling root access, using
SNMPv3 instead of SNMPv2, enabling certificate-based authentication for web clients, etc.
The Cisco SASE/SSE Architecture below includes the architectural components needed location-by-location to
deliver the security capabilities for each pillar and is structured as follows:
◦ Internet Website
Security in this pillar involves making sure users and devices can be trusted as they access applications,
workloads, and data, regardless of location. With a hybrid workforce, users may be located on-premises at a
branch, at home, or a coffee shop. Regardless of their location, it is imperative that they are identified and have
the appropriate context before accessing company resources.
Figure 18.
SASE/SSE User & Device Security Business Flows with SAFE Capabilities
With managed devices, there is option to install endpoint security software to lower the risk of compromise to
devices connecting to trusted and untrusted networks. This software adds anti-malware security capabilities to
prevent and remove threats, connectors needed to forward traffic to the SASE or SSE cloud for inspection and
policy enforcement, and more. For visibility into the user’s digital experience, an agent is installed onto the
managed device to monitor application performance from the user’s perspective, providing additional
assistance to IT teams troubleshooting connectivity issues that user may experience. A cloud-based mobile
When using an unmanaged device, such as a personal smartphone or PC, the user can verify their identity using
MFA and simpler context checks can be done, however, there is no insight into what services are running on
the device. Network controls must be put in place to limit network access and to detect suspicious traffic
patterns.
Users are not the only endpoints connected to the network. IOT Endpoints such as lighting, heating and air
conditioning have changed the way security must be enforced on the network. These devices are not only
absent a user, but many do not have the capability to leverage an 802.1X supplicant or a Certificate. In this
case, context checks such as posture and device profiling assessments can be used to control devices as they
connect to the network. Typically, the device MAC address is used to uniquely identity the device, and a profile
is built using information such as:
All of which allows us to build control policies and assign identifying tags to the devices traffic as it
communicates across the network.
After successful identity and context verification, user or device traffic must be routed to a public SaaS
application, private application within a datacenter or IaaS environment, or public Internet website. The Network
and Cloud security pillar handles providing secure transport for user, device, and application traffic as it is
routed over insecure underlay networks while enforcing the organization’s security policy to prevent
unauthorized access to protected applications and sensitive data. Traffic destined to public SaaS applications
or internet websites is routed through the SASE/SSE cloud where cloud security services are performed. Traffic
destined to private applications is routed through on-premises access where traditional on-premises security
services are applied.
For roaming users accessing public or private applications, least privileged access is provided by a ZTNA
solution after identity and context verification. As an initial step to accessing the application, the DNS request
for the application is verified using DNS security protecting the user from phishing attempts using similar
looking URLs. Traffic is proxied through the SASE/SSE cloud to provide security and enforce company policies
for web-based traffic (SWG), non-web traffic (FWaaS), and provide data loss prevention (CASB). ZTNA does
per application segmentation, preventing lateral movement by the user. For private applications in the data
center or IaaS environment, traffic is appropriately tagged and monitored as it passes through the network.
Firewalls enforce the security policy set by the identity & access control policy manager. For public SaaS
applications, access is monitored for any abnormal behavior by the CASB. Public Internet websites accessed by
the user, such as YouTube, don’t require identity checks controlled by the organization, however for managed
devices DNS security and SWG can be used to restrict access to insecure or inappropriate websites. Inline DLP
can prevent data loss and FWaaS can filter non-web traffic and provide intrusion prevention for inbound traffic.
Alternatively, roaming users can connect to private applications using RAaaS services within SSE. This could be
for accessing legacy apps, or ones difficult to re-architect for SSO or Zero Trust model compatibility. Managed
devices (or unmanaged devices with an installed VPN client) may access the network over an encrypted tunnel
as if they were sitting on the corporate network. While some applications suit a ZTNA implementation, more
sensitive applications may require the extra layer of protection an IPsec tunnel would provide. Access could,
through the security policy, be limited to managed devices, where endpoint security software can be installed
to protect sensitive data from compromised devices. Like ZTNA, identity and context should still be verified and
least privilege access should be implemented through mechanisms like split tunneling and tagging. Split
tunneling will route only IP traffic associated with the specified application over the tunnel while enforcing
tagging will limit lateral movement.
For on-prem users and IOT devices, least privileged access is enforced by network devices in the branch and
data center (SD-WAN routers, switches, and firewalls) after identity and context verification. Traffic from these
users and devices is tagged and segmentation is applied based on the identity access policy distributed by the
identity and access policy manager. For private applications in the data center or IaaS environment, SD-WAN
routers securely route traffic to remote locations over underlay networks using IPsec tunnels while maintaining
tags and segmentation. Firewalls within the data center environment enforce the security policy, blocking
unauthorized access and checking for malware or intrusion attempts. For internet bound traffic (SaaS or public
website), like roaming users, DNS requests initiated by on-prem employees is verified by DNS security as an
initial step. After DNS security verifies the domain is safe, a DNS reply is sent, and the Internet bound traffic is
Figure 20.
SASE/SSE Network & Cloud Security (Private Application) Business Flows with SAFE Capabilities
Finally, a digital monitoring experience agent is installed at the branch, data center, and IaaS environment to
monitor ISP and SD-WAN performance close to the users and close to the hosted private applications used by
employees.
While organizations can benefit from the scale and agility offered by hosting applications within hybrid and
multi-cloud environments, difficulties arise with managing the security of these distributed applications. For
example, with applications running across multiple infrastructures comes an increased attack surface. The
Application and Data Security pillar focuses on the security capabilities needed to prevent unauthorized access
whether those applications or workloads are hosted in the data center or in the cloud. Along with user-to-
application traffic, Application and Data Security must also be enforced for application-to-application traffic
where there may be API calls and other communications between microservices or containers.
Traffic to these applications initially passes a web application firewall which monitors and filters web-based
traffic for exploits and malicious connection attempts. DDoS protection blocks attempts to overwhelm the
application server and disrupt service availability. Successful DDoS attacks can cause productivity loss as well
Figure 21.
SASE/SSE Application & Data Security Business Flows with SAFE Capabilities
On the application server, an anti-malware software agent is deployed to provide defense in depth, preventing
and removing malicious threats not detected by endpoint security software, SASE/SSE, or network firewalls. For
comprehensive security, workload protection software should be deployed to on the server including features
such as:
● Micro-segmentation to reduce the attack surface for application traffic and only allowing known and
required communications
● Visibility into application behaviors, dependencies, and vulnerabilities as this is important for baselining
normal behavior to quickly identify abnormal or suspicious behavior
● Continuous vulnerability scanning to allow for quick detection and quarantining of workloads affected by
risky vulnerabilities
Through these features, the attack surface of distributed applications is reduced, lateral movement is minimized
in the event of a security incident, and the identification of anomalies and suspicious behavior is accelerated.
Application Dependency
Cisco Secure Workload
Mapping
Cisco Umbrella
Cisco Secure Firewall
Cisco Secure Workload
Cisco AppDynamics
Application Visibility &
Cisco Secure Application
Control (AVC)
Cisco Secure Web Appliance
Cisco Cloudlock
Cisco Meraki
Cisco+ Secure Connect
Cisco Umbrella
Cloud Access Security
Cisco Cloudlock
Broker (CASB)
Cisco+ Secure Connect
Continuous Vulnerability
Cisco Secure Workload
Scanning
Cisco Cloudlock
Data Loss Prevention (DLP) Cisco Umbrella
Cisco+ Secure Connect
Distributed Denial of
Radware DDoS
Service (DDoS) Mitigation
Digital Experience
ThousandEyes
Monitoring (DEM)
Cisco Umbrella
DNS Security
Cisco+ Secure Connect
Mobile Device
Cisco Meraki Systems Manager
Management (MDM)
Multi-Factor Authentication
Cisco Secure Access by Duo
(MFA)
Process Anomaly
Cisco Secure Workload
Detection & Forensics
Runtime Application
Cisco Secure Application
Security Protection
Cisco Meraki
SD-WAN
Cisco Viptela
Security Orchestration
Automation & Response Cisco SecureX
(SOAR)
Cisco Kenna
Vulnerability Management
Cisco Secure Workload
Cisco Umbrella
Web Reputation Filtering Cisco Secure Web Appliance
Cisco+ Secure Connect
Cisco Umbrella
Web Security Cisco Secure Web Appliance
Cisco+ Secure Connect
Figure 22.
Cisco SAFE Security Reference Design
The Cisco Unified SASE Design below identifies the products that deliver the security capabilities required
location-by-location in the Cisco SASE/SSE Reference Architecture. A unified SASE solution is more than just a
SaaS service provided by a single vendor that provides all SASE network (SD-WAN) and security (DNS-layer
security, SWG, FWaaS, CASB, ZTNA) capabilities within a single product. A unified SASE design must also be
highly integrated and provide ease of management. Some of the benefits of a unified SASE design are:
● Unified management allowing for efficient creation and deployment of network and security policies
● Improved user experience through consistent security policy enforcement regardless of the user’s
location
● Improved visibility with integrated SASE components due to unified data
This unified SASE design uses Cisco+ Secure Connect for the primary SASE security capabilities and is
complemented by Cisco Secure Access by Duo for MFA and Cisco ThousandEyes for DEM. The hardware
model numbers for SD-WAN routers are only mentioned for reference. Further analysis is required to determine
the correct hardware model for your sites.
The Cisco SASE/SSE with Self-Hosted ZTNA & Remote Access Design below also identifies products that
deliver the security capabilities required location-by-location in the Cisco SASE/SSE Reference Architecture.
● Consistent and easier security policy enforcement as all user traffic will get routed through the same SSE
cloud for SWG, FWaaS, and CASB functions
● Unified security policy management through a single pane of glass
● Single agent deployment on managed devices, simplifying security software deployment and
maintenance
At this time, Cisco’s solution for unified SSE uses Umbrella for DNS-layer security, SWG, FWaaS, and CASB
security functions but ZTNA and/or Remote Access VPN solutions must be self-hosted. Hardware model
numbers for SD-WAN routers are only mentioned for reference. Further analysis is required to determine the
correct hardware model for your sites.
Remote Employee with Trusted Device: Clientless ZTNA - Accessing Private Application (web/ssh/rdp)
(DC/IaaS)
Remote Employee with Trusted Device: Remote Access - Accessing Private Application (any tcp/udp)
(DC/IaaS)
AD Active Directory
DC Data Center
MX Meraki Security
OS Operating System
Appendix E - References
● Cisco SAFE
● Cisco SASE
● Cisco SD-WAN powered by Meraki
● Cisco SD-WAN powered by Viptela
● Cisco Security Refence Architecture
● Cisco ThousandEyes
● Cisco Umbrella
● Cisco Secure Data Center Architecture Guide
● Cisco Zero Trust Architecture Guide
● Cisco+ Secure Connect
● SASE for Dummies
Appendix F - Feedback
If you have feedback on this design guide or any of the Cisco Security design guides, please send an email to
ask-security-cvd@cisco.com.