Security challenges. In an edge-to-cloud environment

As computing moves from the data center to the cloud to the edge, complex hybrid environments make it more important than ever to ensure the security of users, devices, and data.
Security challenges. In an edge-to-cloud environment

Zero trust strategies remain the key to navigating the new world of risk.

Current scenario

As computing moves from the data center to the cloud and the edge, complex hybrid environments make it more important than ever to ensure the security of users, devices and data. Users working from home in droves, the proliferation of questionable Internet of Things (IoT) devices and a larger and more sophisticated cybercriminal community have all contributed to a larger, more complex and more difficult-to-defend attack surface.

Five key security challenges in the modern enterprise

For years, IT's security strategy has been to throw software package after software package at emerging problems, hoping to stop them as they develop. But we've reached a point where that approach simply won't work. With environments from edge to cloud, 'We can't do all this by just throwing third-party products everywhere.' Now the infrastructure has to lend a hand, whether it's securing storage resources, computing resources, or the cloud.

1. Eliminate network blind spots

Start by mapping the network inside and out, exposing IoT devices, remote users, and anything else that connects to IT resources from the edge so it can be profiled and managed.o para poderla perfilar y gestionar.

2. Verify identity before allowing access

It is no longer enough to enter a username and password to determine if a user is valid. New authentication techniques that take into account user location and behavior ensure that only legitimate users and devices can connect to network resources.

3. Compare the configuration of the access points

Compare to compliance baselines and proceed with necessary remediation solutions.

This key step allows security teams to define and enforce configuration guidelines, such as mandatory patch installation.

4. Establish least privilege access

Establish least-privilege access to IT resources by segmenting traffic based on identity-based policies.

Another critical component of zero trust, this step is designed to ensure that network services are segmented based on user role.

For example, marketing staff should not have access to application development cloud services or the on-premises accounting server. Even during a breach, usage policies can help contain the damage.

5. Continuous monitoring

Continuously monitor the security status of the user and device and communicate bi-directionally with other elements of the security ecosystem. The zero trust framework should be monitored in real time. In the event of a compromise, all rights are suspended while the issue is investigated. Again, this limits the potential for damage.

Zero trust More important than ever

Zero trust is becoming critical in an edge-to-cloud environment because we have forced the issue. IoT devices are being launched with default (or no) user IDs and passwords, organisations and users are slow to install patches, and attacks from malware downloaded from drives are common due to poor cyber hygiene. “It’s not about protecting the devices themselves, but the IT infrastructure.” “IoT devices like cameras and thermostats have been used as on-ramps, but that’s not where the damage is done. They just give attackers a way into the network.” We must develop security frameworks that take into account not just the infrastructure, but also user behaviour and workload.

loader
Loading...