Top of Page
Implementation of access control for management communication with zero trust
Block unauthorized access targeting vulnerabilities
Yohei Mizutani, Toray Industries, Inc.
We have been integrating the group's information systems into a common service, and network integration has continued to progress since 2018. In Japan, the system has been integrated into one group network, and international group companies and bases can access the domestic core system through the group network.
Mr. Yohei Mizutani
Senior Staff
Information Systems Platform Department
Toray Industries, Inc.
Mr. Yasushi Oka,Toray Systems Center, Inc.
The disparity in each company's degree of security measures was an issue with international group companies. During this period, an incident occurred in which a server in Japan was actually infiltrated from the remote access environment of an international group company via the group network. Fortunately, there was no actual damage, but we still needed to reassess the access method for the group network. The server can also be accessed for maintenance purposes using management protocols such as SSH and RDP. Since the server can be controlled freely if accessed via SSH or RDP, a mechanism was needed to prevent these operations from being executed via the group network.
Mr. koji Oka
Senior Staff
Secirty Service Group ICT Infrastructure Service Dept.
Toray Industries, Inc.
Mr. Mizutani
I work in the Information Systems Platform Department, which serves as the group's headquarters to oversee security for domestic and international affiliate companies. The group network serves as the basis for services and communication, but we felt it was necessary to improve the security level by providing infrastructure services, including security functions, to affiliated companies. We decided to use the Toray Systems Center to provide unified security measures rather than having each organization handle remote access control separately.
Mr. Oka
How can we defend the server against SSH and RDP accesses that result in rewriting? That's when we thought of implementing a privileged ID management system with privileged accounts that grant each server access via SSH and RDP. However, a large number of servers needed to be made secure both domestically and internationally. When we considered implementing a privileged ID management solution to numerous servers, concerns arose about the cost and installation time.
Therefore, we also considered a gateway system that physically controls communication over the network. With this approach, a single jump server is installed, and multi-factor authentication is applied when the jump server is accessed. However, we had not considered running access control on-premise software due to the operational load.
Mr. Mizutani
We were searching for a service and thought that if there was no suitable service, we would need to have a vendor create and provide a service configuration with authentication and management requirements.
Mr. Oka
We were soliciting bids from multiple vendors for gateway-based access control solutions with privileged ID management systems when IIJ proposed a cloud service that worked well with the gateway system. IIJ Safous ZTA is a service that enables remote access control. I had no idea that such a solution existed, so I found it quite intriguing. IIJ explained that IIJ Safous ZTA could coexist with existing environments, such as multi-factor authentication during remote access and Zero Trust Network Access (ZTNA), both of which were listed as requirements. After confirming that it was functionally compatible with our company's vision, we comprehensively considered the cost and implementation period and concluded that Safous ZTA was our only option. That's how well the service met our needs.
Mr. Atsushi Kataoka, Sysco, Inc.
I was in charge of setting up the system at Sysco, a subsidiary of Toray Systems Center. Initially, we envisioned a method of setting up a physical server, but since Safous ZTA is a cloud service, it can be tested immediately after purchasing the license. We decided to try it first.
Mr. Atsushi Kataoka
Engineer
Network Service Department NS1 Group
Sysco, Inc.
Mr. Oka
We started interviewing various vendors around May 2022, and around that summer we received information about Safous ZTA from IIJ. Actual operation as a test environment began in November, and because everything was going smoothly, we completed the environment preparation by the end of March 2023. In 2023, we moved SSH and RDP access to Safous ZTA.
Mr. Oka
Access is controlled via Safous ZTA for SSH and RDP communications necessary for managing IaaS infrastructure, physical servers, and cloud services. The system administrator is the user. Starting in fiscal 2023, we blocked SSH and RDP communications to the group network with a firewall and allowed access only through Safous ZTA. We have a system in place to block access from an attacker, even if they attempt to do so over SSH or RDP communication.
Mr. Kataoka
There were no examples of linking between Microsoft Entra ID (formerly Azure Active Directory) and Safous ZTA, so there were some problems before we could actually link them. With the help of IIJ engineers, who thought about our problem and made suggestions, we were able to resolve the issues. I think it was because of IIJ that we were able to successfully implement Safous ZTA.
Mr. Oka
Although it is difficult to measure the impact of security solutions, we think that Safous ZTA's success is demonstrated by the fact that, in the more than a year that we have been using it, we have not experienced a single unauthorized attack against servers using administrative communication. Although overseas group companies have logged incidents of cyberattacks or unauthorized accesses, the fact that our servers have not been accessed by unwanted parties is evidence that Safous ZTA is operating as intended.
Mr. Mizutani
At the moment, we have just finished successfully setting up Safous ZTA's access control for system administrator communication. As the use of digital data and cloud services increases, we are considering using Safous ZTA for access control, including Operational Technology (OT) . We are confident that we can successfully develop these initiatives by taking advantage of the ease of deployment that we have experienced using Safous ZTA.
User Profile
Toray Industries, Inc.
Head office: Nihonbashi Mitsui Tower, 2-1-1 Nihonbashi-Muromachi, Chuo-ku, Tokyo
Founded: January 1926
Capital: JPY 147,873,030,771
Number of employees: 6,995 (as of March 31, 2024)
Toray Industries, Inc. is one of Japan's leading basic materials manufacturers. Originally established as a rayon fiber production company, it now also produces resins, chemicals, films, carbon fiber composite materials, electronic information materials, pharmaceuticals and medical devices , water treatment, and environmental issues. With its corporate slogan, "Innovation by Chemistry", the company is developing many advanced materials and high value-added products around the world.
* This article is based on an interview given in August 2024. The data, organization names, titles, etc. in the article were correct as of the date of the interview.
IIJ Information Center (9:30 - 12:00, 13:00 - 17:30 excluding weekends and public holidays)
End of the page.