Securing Atms With Zero Trust Networking
Securing Atms With Zero Trust Networking
Business Benefits
The Palo Alto Networks approach
$ Increase the availability of ATMs for customer to protecting ATM environments
convenience and transactions. can significantly lower risks.
Operational Benefits
At a high level, the approach includes:
Reduce losses from theft of ATM cash as well
as the number of field service calls with improved Zero Trust network segmentation for the ATM
resilience to cyber incidents. devices and related infrastructure.
Security Benefits Least-privileged access policy for all ATM-related
Prevent lateral movement by attackers or components.
unauthorized insiders to ATMs or related
systems. Inspect all traffic to/from ATMs for Secure IPsec VPN connection between the ATMs
malicious content. and the corporate data center.
Business Drivers
• Banks, credit unions, and other financial institutions maintain a fleet of ATMs as a strategic asset that establishes personalized
touchpoints for customer self-service and convenience.
• Availability and resilience are crucial to the role of ATMs in the omnichannel strategy for customer engagement, helping
them serve as the bridge between the physical and digital channels.
• Despite the growing popularity of electronic transactions, cash is still a preferred payment method for a significant segment of
the population.
• As a repository for cash, ATMs have been subject to physical attacks since their introduction more than 50 years ago. Recently,
malware-based attacks have gained prominence as a mechanism to “cash out” ATMs.
Traditional Approaches
Antivirus and Anti-Malware Approaches
In general, ATMs are physically hardened to restrict access to their underlying internal systems. However, this doesn’t offer any protection
against network-borne attacks. Since most ATMs are built on Microsoft Windows®, they have typically been secured with traditional, signa-
ture-based antivirus/anti-malware like any other Windows machine. Unfortunately, signature-based protection has proven less than desirable
given its reactive posture. Moreover, such products lack protection against exploits. Consequently, motivated and experienced attackers can
bypass these legacy products with inexpensive, automated tools that can produce countless unique, unknown attacks. Ultimately, traditional
approaches are proving inadequate to protect ATMs against compromise.
1
Palo Alto Networks | Securing ATMs with Zero Trust Networking | Use Case
USE CASE: Securing ATMs with Zero Trust Networking
GlobalProtect
agent
ATM-related infrastructure
GP
ATM
Next-Generation
Firewall IPsec VPN
Retail branch
Unrelated IT resources
Data center
Zero Trust can also be applied to data center resources to partition ATM-related servers and backend infrastructure from other
unrelated resources. Even east-west traffic to and from ATM-related components within the data center would be inspected
to prevent lateral movement by malicious actors or unauthorized insiders for further protection. Adopting this approach for
network segmentation complements other best practices for ATM cyber hygiene and minimizes the risk to these frequently
targeted devices.
3000 Tannery Way © 2019 Palo Alto Networks, Inc. Palo Alto Networks is a registered
Santa Clara, CA 95054 trademark of Palo Alto Networks. A list of our trademarks can be found
Main: +1.408.753.4000 at https://www.paloaltonetworks.com/company/trademarks.html. All other
Sales: +1.866.320.4788 marks mentioned herein may be trademarks of their respective companies.
Support: +1.866.898.9087 securing-atms-with-zero-trust-networking-euc-080119
www.paloaltonetworks.com