The Future of the Tootsie Pop Strategy
The most common architecture for organizations when the Tootsie Pop strategy was developed and widely implemented was static data that largely remained behind the firewall. The line of demarcation was very clear. The ability to protect the firewall by opening very narrow point-to-point connections and opening a small number of commonly used ports and services made the firewall a relatively powerful tool that unfortunately was soon perceived as the be-all and end-all of security. Some network administrators who employed firewalls became a little too complacent. The idea that Port 80 would be used for the degree of malware and maliciousness that is now possible was not even on the horizon.
Today, we have ubiquitous access to data using bring your own device (BYOD) policies and Internet cafe users on the negative side and the widespread use of virtual hosts and mobile device management solutions on the controls side.
Use the study materials and engage in any additional research needed to fill in knowledge gaps. Discuss the following:
- Make a case for why the Tootsie Pop strategy is still important and useful.
- Make a case for why the Tootsie Pop strategy is outdated and no longer a viable way to think about network security.
- Suggest what the next strategy might be that would be a good replacement for the Tootsie Pop strategy.