Why Dronacharya deserve the Best CISO award for 3000 BC?

Dhiraj
3 min readSep 26, 2020
while designing Protection framework, Dronacharya introduced modern security architecture.

Dronacharya served as the second commander-in-chief of the Kaurava army in the epic Mahabharata. On the thirteenth day of the battle, Dronacharya formulated the Chakravyuha with the intention of capturing the Pandava chief. Chakravyuha is a sophisticated labyrinth structure.
I was reading about the establishment of Chakravyuha and the Zero Trust Approach at the same time. The Zero Trust Approach was first developed by Forrester Research in the field of digital security, although our ancestors previously used it while they were at war. War in 3000 BC included soldiers, weapons, and bloodshed. Instead of referring to a bloodbath, the new world of cybercrime uses terms like ransomware and data breach to describe conflict in the digital age. You employ terms like firewall, micro-segmentation, anti-virus, and so on in place of weapons and tactics.
Wow… Comparing the two battlefields is intriguing, but the fundamentals are the same. Albert Einstein once said, “We are going to connect time using the three dimensions of space, so fasten your seat belt!”

A) The First Step to Zero Trust Is Micro-Segmentation.
1) Chakravyuha’s micro-segmentation as well as the present solutions
For each of the seven tiers of Chakravyuha, there were distinct security elements. The deepest level was level 7, and each tier was divided logically. The fact that they should only be concerned with their own layer and that only the commanders of each layer may interact with one another was effectively conveyed inside the layers.
Security measures for each individual section — Each layer was distinctive from the others. Following the DRAVIDIAN MODEL OF DECIPHERMENT was Dronacharya. We rely on prime number-based contemporary techniques like RSA these days. We’ll speak about cybersecurity threats and quantum computing later.
defends the border- The more secure you are, the stronger the castle wall traditionally is. The troops’ sole duty in the outer tiers was to stop warriors from entering. If the barrier is penetrated, the outer layer troops’ goal is to stop subsequent intrusions rather than to combat the warriors who have already done so. Don’t you believe it’s more akin to the MITRE ATT&CK framework’s post-compromise threat-based modeling?
Architecture based on zero trust
Zero Trust is a security concept, or to put it simply, “No access” is the default option. Check first. Zero trust architecture, or ZTA, abides by a few criteria, some of which are relevant to Chakravyuha:
Minimum Size for Access: The lack of understanding was one of the reasons Chakravyuha was particularly hard to compromise. Only 3 or 4 persons, including Arjun and Dronacharya, had access to the information (student of Dronacharya later fight in battle with Dronacharya).
Check All Access: There was a mechanism in place to gather as much data as feasible on the status of the assets at the time and the infrastructure that was available to ensure the security posture. Hai… It perfectly matches NIST principles. 7. Secure Every Access: As was already indicated, Dronacharya used many strategies for safe communication.
What I learned: Implementing Zero Trust is challenging, as I have heard from several sources. Zero Trust is a mix of philosophy, technology, and goal rather than just a technology. You must mix like Dronacharya if you want to create a secure design.

--

--