<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-prodrigues-extar-00" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.2 -->
  <front>
    <title abbrev="extar">draft-prodrigues-extar-00</title>
    <seriesInfo name="Internet-Draft" value="draft-prodrigues-extar-00"/>
    <author initials="P." surname="Rodrigues" fullname="Patricia Rodrigues">
      <organization/>
      <address>
        <email>ytimyno@proton.me</email>
      </address>
    </author>
    <date year="2022" month="November" day="06"/>
    <area>Network</area>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>The shift to multi-cloud environments brought data leakage prevention challenges for organisations. The current Cross-Tenant Access Restriction (XTAR) mechanisms do not cover critical scenarios where users can connect to multiple tenants (organisational and personal), facilitating data exfiltration.
The goal, similar to previously proposed, reviewed and accepted protocols that have been published as RFC standards and are now widely adopted, is to help organisations keep their data under control when using one or more Cloud Service Providers (CSPs). This can be done by incentivising CSPs to adopt the proposed protocol, Extended-Cross-Tenant Access Restriction (E-XTAR), consisting of a globally readable header specifying the allowed &lt;CSP, tenantID&gt; combinations allowed by the home organisation.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Several organisations have been shifting their data and processes to cloud environments (1). A subset of those will have granted their colleagues work-specific devices, that they should only use to access cloud tenants associated with their work in the said organisation (2). One of the benefits of this is an enriched level of Data Leakage Prevention policies, as there is a clear separation between work and non-work environments. Additionally, the dynamics within a single organisation, or even inter-organisation, have contributed to the adoption of multi-cloud environments, that is, organisations instantiating organisational tenants in multiple Cloud Service Providers (CSPs) (3). 
The keyword there is "tenant". Employees/colleagues can, rightfully, instantiate their tenants in those CSPs.</t>
      <t>An approach that can be taken (and it indeed works in specific scenarios) is inserting a header in the authentication-related network traffic originating from the organisation-only devices (2). This is done through a network proxy or firewall. This header contains a list of allowed tenants/tenant IDs which is then used by the Identity Provider on the CSP's side to emit, or not, a valid authentication token.</t>
      <t>The catch: This is not something that all CSPs have adopted. In fact, to my knowledge, only one has a mechanism like such, and, it, itself, has scope for improvement. This Internet-Draft exposes the need for the standardisation of a cross-tenant access restriction protocol and consequent adoption by CSPs.</t>
      <t>Take the widely adopted Sender Policy Framework (SPF - <xref target="rfc7208"/>), Domain-Keys Identified Mail (DKIM - <xref target="rfc6376"/>) and Domain-based Message Authentication Reporting &amp; Conformance (DMARC - <xref target="rfc7489"/>) protocols that, together with the Domain Name Server (<eref target="https://rfcs.io/dns">DNS</eref>) protocol, help ensure the authenticity and integrity of electronic mail - related to yet another RFC-defined protocol: SMTP - <xref target="rfc5321"/>.
A noteworthy characteristic of these, and other, protocols defined in standards is: They are optional. There is no central body enforcing the adoption of the standards. What has happened, and still is, is that the community itself is pressured to adopt certain standards to guarantee reliable Internet communication between services.</t>
      <t>We can follow a similar strategy for data protection, to secure organisational (potentially sensitive) data from exfiltration, this document suggests a vendor-agnostic protocol that consists of having a single header, interpretable by any CSP's Identity Provider, to verify if the authentication request is coming from a restricted device and, if it is, only to emit an authentication token if the tenant being reached in that CSP is allowed by the home organisation, owner of the restricted device.</t>
      <t>Because we cannot guarantee every existing and new CSP will implement this sort of mechanism, the standardisation process incentivises it, and, if adopted by the CSPs and organisations, it restricts the attack vector where colleagues exfiltrate data from the organisational tenant into a personal tenant.</t>
    </section>
    <section anchor="background">
      <name>Background</name>
      <t>Organisations deal with sensitive data and therefore follow strict data governance rules. Many introduce data leakage prevention policies, which are eased or not fully effective on organisationally-owned devices (work devices), as these are usually within a corporate network and are trusted.</t>
      <t>As we will see from the <xref target="usecases"/>, a multi-cloud organisation cannot block access to a whole CSP. And even in a single cloud environment, except for specific CSPs that allow/understand an XTAR mechanism to restrict access to specific tenants within that CSP, there is no widely adopted protocol to restrict access to specific tenants across CSPs. This appears to be essential when organisations are looking to have clear isolation between organisational and personal tenants.</t>
      <section anchor="protocol">
        <name>Proposed protocol</name>
        <t>In <xref target="usecases"/>, the <xref target="proposed"/> protocol accommodates scenarios of single- and multi-cloud organisations with the need to restrict access to organisational tenants within them. These organisations are assumed to have provided their colleagues with a corporate device that should only access organisational tenants.</t>
        <t>This approach is an extension of the approach taken by one specific CSP, which includes allowing an organisation to inject an optional header ("allowed-tenants-list") in the authentication-related network traffic destined for that CSP, which will then be read and interpreted by the CSP itself. This header will contain a list of organisationally allowed tenants (within that CSP). Once the traffic reaches the CSP's Identity Provider (the service granting the authentication token), the token will only be emitted if the tenant being accessed is present in the "allowed-tenants-list" network header.</t>
        <t>Limitations of this "legacy" protocol:</t>
        <ul>
          <li>Adopted by a single CSP, hence not apt for multi-cloud environments;</li>
          <li>Allow list of tenants must be fully declared on the header, rendering management and configuration difficulties.</li>
        </ul>
        <t>The proposed protocol (E-XTAR) extends the legacy protocol as follows:</t>
        <ul>
          <li>Instead of having a vendor-specific header, readable only by that specific CSP, introduce a new vendor-agnostic header "global-allowed-tenants-list";</li>
          <li>The new header can either (1) explicitly list all allowed &lt;CSP, tenantID&gt; pairs (similar to the legacy protocol's header) or (2) specify an endpoint for the target CSP to retrieve the allowed list of &lt;CSP, tenantID&gt; pairs;</li>
          <li>The effectiveness of this proposed protocol is dependent on the wide adoption by CSPs;</li>
          <li>This header would still be optional both for the organisation injecting it and for the CSPs that interpret it (organisational choice whether to fully restrict access to CSPs that do not implement the proposed E-XTAR verification based on the "global-allowed-tenants-list" header).</li>
          <li>Taking the organisational choice to fully restrict access to CSPs that do not implement the proposed E-XTAR verification, diminishes the need to implement network restrictions.</li>
        </ul>
      </section>
    </section>
    <section anchor="usecases">
      <name>Use Cases</name>
      <t>For the following use cases, letters are used to identify organisations and colleagues, numbers are used to identify CSPs and a combination of &lt;letter, number&gt; specified the tenant owned by the letter entity in the numbered CSP.</t>
      <t>Across the use cases, assume the base scenario:</t>
      <ul>
        <li>The organisation has fully or partially migrated data and processes to the cloud (to a CSP);</li>
        <li>The organisation has a Mobile Device Management (MDM) program to manage the work devices given to each employee;</li>
        <li>Due to data sensitivity, colleagues are restricted to access some of these data and processes through their work devices.</li>
      </ul>
      <section anchor="single-csp-organisation-with-no-controls">
        <name>Single CSP organisation with no controls</name>
        <t>Perhaps the most common, in this scenario the organisation's (lack of) controls allow an employee to connect from the work device both to the organisational tenant (using work credentials) and to personal tenants.</t>
        <ul>
          <li>Organisation A has a single cloud environment on CSP 1, with tenant A1;</li>
          <li>Employee B has personal tenants B1, also hosted in CSP 1, and B2, hosted in an alternative CSP, CSP 2;</li>
          <li>Employee B can access tenant A1 with its organisational account;</li>
          <li>Organisation A has no cross-tenant restriction (XTAR) mechanism in place.</li>
        </ul>
        <t>Because organisation A has no XTARs, employee B can access the organisational tenant A1 from the work device (expected) but it can also access both personal tenants B1 and B2 (malicious).</t>
        <t>Employee B can effectively download data into its work device from organisational tenant A1 and subsequently upload it to personal tenants B1 (hosted in the same CSP as the organisational tenant A1) and B2 (hosted in a different CSP).</t>
        <t><strong>Consequences</strong>:</t>
        <ol type="%d. " group="consequences6">
  <li>Colleagues have personal tenants in CSP 1 and CSP 2 and conduct data exfiltration to both.</li>
        </ol>
      </section>
      <section anchor="single-cloud-organisation-network-restrictions-applied">
        <name>Single-cloud organisation, network restrictions applied</name>
        <t>Following the previous use case, now consider that, because organisation A has a single cloud environment within CSP 1, it implements a network restriction that aids with XTAR:</t>
        <ul>
          <li>Organisation A blocks any traffic going to CSPs other than CSP 1.</li>
        </ul>
        <t>In this scenario, employee B can still access tenant A1 from CSP 1, using its work device. Employee B will not be able to access its tenant B2 from CSP 2, as network traffic is blocked when trying to access CSP 2. However, employee B is still able to connect to personal tenant B1 (hosted in the same CSP as the organisational tenant A1).</t>
        <t>The organisation cannot fully restrict network access to CSPs itself uses. So, if organisation A is using CSP 1, traffic to it will have to be allowed, at a network level.</t>
        <t><strong>Consequences</strong>:</t>
        <ol type="%d. " group="consequences5">
  <li>Colleagues cannot access personal tenants blocked by network traffic restrictions (these exclude organisational tenants' CSPs);</li>
          <li>Governance and configuration effort to keep the network access restrictions up to date is required;</li>
          <li>Colleagues that have personal tenants in the same CSP used by the organisation, can conduct data exfiltration to it.</li>
        </ol>
      </section>
      <section anchor="single-cloud-organisation-csp-xtar-network-restrictions-applied">
        <name>Single-cloud organisation, CSP XTAR &amp; network restrictions applied</name>
        <t>Further building on top of the second use case, consider that CSP 1 (used by organisation A and employee B), allows the organisation to insert metadata in the network traffic, specifying the list of allowed tenants within such CSP 1.</t>
        <ul>
          <li>Organisation A blocks any traffic going to CSPs other than CSP 1;</li>
          <li>Organisation A now inserts a header into the network traffic with destination to CSP 1, specifying the allowed tenant - tenant A1.</li>
        </ul>
        <t>Employee B can still access tenant A1 from CSP 1, using its work device. Employee B will not be able to access either personal tenants, B1 (XTAR implemented by injecting the network header) or B2 (network traffic is still blocked when trying to access CSP 2).</t>
        <t>Shortcomings of this approach include:</t>
        <ul>
          <li>XTAR mechanism of including a list of allowed tenants is not widely adopted and can be improved according to the proposed protocol (in fact, only a single CSP seems to have such a mechanism, and the header is vendor-specific - as in, it is only understandable by that vendor);</li>
          <li>Organisation A will not be able to collaborate or have a multi-cloud environment, or, if it does, it will not be able to introduce the same XTAR mechanism as CSP 1.</li>
        </ul>
        <t><strong>Consequences</strong>:</t>
        <ol type="%d. " group="consequences4">

  <li>Colleagues cannot access personal tenants blocked by network restrictions (these exclude the organisational tenant's CSP);</li>
          <li>Governance and configuration effort to keep the network access restrictions up to date is required;</li>
          <li>Colleagues cannot access personal tenants in CSPs where XTARs are applied;</li>
          <li>Governance and configuration effort to keep these XTARs up to date is required;</li>
          <li>Organisation A is not multi-cloud ready.</li>
        </ol>
      </section>
      <section anchor="single-cloud-organisation-csp-xtar">
        <name>Single-cloud organisation, CSP XTAR</name>
        <t>Consider the scenario where organisation A is still single-cloud and decides to drop the network traffic to other CSPs restrictions, but implements its tenant's CSP's XTARs. This results in less strict access than the previous one but does reduce the Governance required.</t>
        <t><strong>Consequences</strong>:</t>
        <ol type="%d. " group="consequences3">
  <li>Colleagues can access any personal tenants hosted outside the organisation's own tenant's CSP;</li>
          <li>Colleagues cannot access personal tenants where XTARs are being applied (organisation's own tenant's CSP);</li>
          <li>Governance and configuration effort to keep these XTARs up to date is required;</li>
          <li>Organisation A is not multi-cloud ready.</li>
        </ol>
      </section>
      <section anchor="multi-cloud-organisation-csp-xtar-network-restrictions-applied">
        <name>Multi-cloud organisation, CSP XTAR &amp; network restrictions applied</name>
        <t>Changing the scenario to illustrate one of the shortcomings of the third use case:</t>
        <ul>
          <li>Organisation A has a multi-cloud environment, using both CSP 1 and CSP 2, with tenants A1 and A2, respectively;</li>
          <li>Organisation A blocks any traffic going to CSPs other than CSP 1 or CSP 2;</li>
          <li>Only CSP 1 understands the XTAR mechanism where organisation A inserts a header into the network traffic with destination to itself, CSP 1, specifying the allowed tenant - tenant A1.</li>
        </ul>
        <t>Employee B can still access tenant A1 from CSP 1, using its work device. Employee B will not be able to access personal tenant B1 (XTAR implemented by injecting the network header). But because there is no XTAR mechanism understood by CSP 2 and organisation A cannot block network traffic to it (since it hosts an organisational tenant A2 in CSP 2). Employee B will be able to access organisational tenants A1 and A2, but it will also be able to exfiltrate data through its tenant B2, hosted in CSP 2.</t>
        <t>Even if CSP 2 had yet another vendor-specific XTAR mechanism, this would add to the governance and implementation effort.</t>
        <t><strong>Consequences</strong>:</t>
        <ol type="%d. " group="consequences2">
  <li>Colleagues cannot access personal tenants blocked by network restrictions (these exclude organisational tenants' CSPs);</li>
          <li>Governance and configuration effort to keep the network access restrictions up to date is required;</li>
          <li>Colleagues cannot access personal tenants in CSPs where XTARs are applied;</li>
          <li>Governance and configuration effort to keep these XTARs up to date is required;</li>
          <li>Being multi-cloud, and unable to apply XTARs to all the CSPs presents gaps: Employee B can access and exfiltrate data to any personal tenant that is both not network traffic restricted and has no XTARs applied.</li>
        </ol>
      </section>
      <section anchor="proposed">
        <name>Multi-cloud organisation, E-XTAR</name>
        <t>Now consider the implementation of the proposed <xref target="protocol"/>, extended-XTAR (E-XTAR), following the scenario:</t>
        <ul>
          <li>Organisation A has a multi-cloud environment on CSP 1 and CSP 2, with tenants A1 and A2, respectively;</li>
          <li>Organisation A blocks any traffic going to CSPs that do not implement an E-XTAR verification based on the "global-allowed-tenants-list" header;</li>
          <li>The "global-allowed-tenants-list" contains either (a) the explicit list of &lt;CSP, tenantID&gt; pairs that are allowed by the organisation or (b) the endpoint that should allow the destiny CSP to retrieve the (centrally managed) allowed tenant list.</li>
        </ul>
        <t>Employee B can access tenants any tenants, as long as these are specified either on (a) the "global-allowed-tenants-list" header explicitly or (b) on the allowed tenants list returned by the endpoint specified in the header.</t>
        <t><strong>Consequences</strong>:</t>
        <ol type="%d. " group="consequences1">
  <li>Network restrictions not required ("traffic only to CSPs that implement the E-XTAR mechanism, allowing header-based validation");</li>
          <li>Governance and configuration effort associated not required;</li>
          <li>Colleagues cannot access tenants not allowed in the E-XTARs configuration;</li>
          <li>Governance and configuration level of effort to keep E-XTARs valid is low-medium: Having to either (1) keep the "global-allowed-tenants-list" updated or (2) specify an endpoint that allows the target CSP to retrieve the allowed list of &lt;CSP, tenantID&gt; pairs;</li>
          <li>Organisation is multi-cloud ready.</li>
        </ol>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The proposed mechanism aims to prevent data exfiltration via the attack vectors specified. Current implementations (and non-implementations) of XTAR are exploitable. E-XTAR aims to make it harder to exploit but requires us to consider factors, such as E-XTAR adoption and alternative attack vectors.</t>
      <section anchor="proposed-protocol-adoption">
        <name>Proposed protocol adoption</name>
        <t>A CSP/CSP-like service might not adopt the protocol here proposed. To make sure E-XTARs configurations are validated, the organisation can:</t>
        <ul>
          <li>Deny traffic to these CSPs (network restrictions);</li>
          <li>Or (preferably) have a verification step in the protocol. As the authentication request into a CSP is made with the proposed, globally readable optional header, the complete authentication process is only completed if we know for sure that the target CSP has adopted the protocol.</li>
        </ul>
        <t>Elaborating on the latter the organisation would have a choice of only allowing traffic to CSPs that have adopted E-XTAR.</t>
        <t>This could be done by (i) having a central authority maintaining a list of CSPs that adopt the proposed protocol (verification process and management overhead needed) or (ii) implementing a mechanism that verifies if the CSP is adopting and implementing E-XTAR, independent of a central authority.</t>
        <section anchor="verifying-e-xtar-implementation">
          <name>Verifying E-XTAR implementation</name>
          <t>To achieve a mechanism that thoroughly verifies if the CSP is adopting and implementing E-XTAR, without relying on a central authority, perhaps a challenge-response mechanism, through which the target CSP can prove that it is implementing the proposed protocol, is worth considering.</t>
        </section>
      </section>
      <section anchor="alternative-attack-vector-upload-portals">
        <name>Alternative attack vector: Upload portals</name>
        <t>One can consider an actor to create an internet-accessible upload portal (not recognised by typical website classification tools), where it can upload data from its corporate device into it, effectively exfiltrating data from an organisation. This is an attack vector achievable now and not covered by the protocol.</t>
        <t>To tackle this, we would rely on Data Leakage Prevention mechanisms. Alternatively, would need a per-website allow-list, which may be hard to achieve in very dynamic organisations. Plus it includes management overhead.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="rfc7208" target="https://www.rfc-editor.org/info/rfc7208">
        <front>
          <title>Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1</title>
          <author fullname="S. Kitterman" initials="S." surname="Kitterman">
            <organization/>
          </author>
          <date month="April" year="2014"/>
          <abstract>
            <t>Email on the Internet can be forged in a number of ways.  In particular, existing protocols place no restriction on what a sending host can use as the "MAIL FROM" of a message or the domain given on the SMTP HELO/EHLO commands.  This document describes version 1 of the Sender Policy Framework (SPF) protocol, whereby ADministrative Management Domains (ADMDs) can explicitly authorize the hosts that are allowed to use their domain names, and a receiving host can check such authorization.</t>
            <t>This document obsoletes RFC 4408.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7208"/>
        <seriesInfo name="DOI" value="10.17487/RFC7208"/>
      </reference>
      <reference anchor="rfc6376" target="https://www.rfc-editor.org/info/rfc6376">
        <front>
          <title>DomainKeys Identified Mail (DKIM) Signatures</title>
          <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker">
            <organization/>
          </author>
          <author fullname="T. Hansen" initials="T." role="editor" surname="Hansen">
            <organization/>
          </author>
          <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy">
            <organization/>
          </author>
          <date month="September" year="2011"/>
          <abstract>
            <t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message.  This can be an author's organization, an operational relay, or one of their agents.  DKIM separates the question of the identity of the Signer of the message from the purported author of the message.  Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key.  Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t>
            <t>This memo obsoletes RFC 4871 and RFC 5672.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="76"/>
        <seriesInfo name="RFC" value="6376"/>
        <seriesInfo name="DOI" value="10.17487/RFC6376"/>
      </reference>
      <reference anchor="rfc7489" target="https://www.rfc-editor.org/info/rfc7489">
        <front>
          <title>Domain-based Message Authentication, Reporting, and Conformance (DMARC)</title>
          <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy">
            <organization/>
          </author>
          <author fullname="E. Zwicky" initials="E." role="editor" surname="Zwicky">
            <organization/>
          </author>
          <date month="March" year="2015"/>
          <abstract>
            <t>Domain-based Message Authentication, Reporting, and Conformance (DMARC) is a scalable mechanism by which a mail-originating organization can express domain-level policies and preferences for message validation, disposition, and reporting, that a mail-receiving organization can use to improve mail handling.</t>
            <t>Originators of Internet Mail need to be able to associate reliable and authenticated domain identifiers with messages, communicate policies about messages that use those identifiers, and report about mail using those identifiers.  These abilities have several benefits: Receivers can provide feedback to Domain Owners about the use of their domains; this feedback can provide valuable insight about the management of internal operations and the presence of external domain name abuse.</t>
            <t>DMARC does not produce or encourage elevated delivery privilege of authenticated email.  DMARC is a mechanism for policy distribution that enables increasingly strict handling of messages that fail authentication checks, ranging from no action, through altered delivery, up to message rejection.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7489"/>
        <seriesInfo name="DOI" value="10.17487/RFC7489"/>
      </reference>
      <reference anchor="rfc5321" target="https://www.rfc-editor.org/info/rfc5321">
        <front>
          <title>Simple Mail Transfer Protocol</title>
          <author fullname="J. Klensin" initials="J." surname="Klensin">
            <organization/>
          </author>
          <date month="October" year="2008"/>
          <abstract>
            <t>This document is a specification of the basic protocol for Internet electronic mail transport.  It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete.  It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions.  Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5321"/>
        <seriesInfo name="DOI" value="10.17487/RFC5321"/>
      </reference>
    </references>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>I am very grateful for the people around me that, knowingly or not, incentivised me to learn and explore the subject and, eventually, to work on this piece.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
