With Mobile devices, IoT and Cloud where is your perimeter?
Nice Article
Protecting your perimeter today means not only protecting your network edge devices, but also a plethora of internet of things (IoT) and mobile devices.
mobile device management software that authenticates the device by the applications on it, hard-coded IDs and other authentication data.
Identity and access management software also can include user provisioning, compliance auditing, role management, directory services, federated identity, and more.
If you have service accounts with business partners such as could services providers (software, backup, managed security services and other as-a-service providers) banks, local utilities, professional services vendors or others, you need to ensure that the system trying to access your network has not been compromised.
If your company is invested in smart devices such as lights, HVAC systems, security systems, or other infrastructure electronics, these devices generally have no way to update, enhance or often to even install any security. It might seem extreme but hackers have manipulated smart devices to enter corporate networks.
IMPORTANT - Make sure your infrastructure network is completely separate from your corporate data network.
Create policies and procedures for devices that are not on the white list.
The best way to ensure that only authorized devices connect to the network is to know which devices are indeed authorized
https://www.scmagazine.com/is-your-perimeter-secure/article/755177/
No comments:
Post a Comment