| |APRIL 20229Edge computing has gained popularity along with the proliferation of IoT and connected devicesIn this scenario, what can enterprises do to overcome these security challenges?Edge Security Best Practices:· Use identity and privileged accounts control and surveillance to enhance digital and physical security at the edge.· Apply the highest level of network security protocols amongst devices, users, and edge facilities.· Implement zero trust edge access. In this, cyber security professionals allow only the minimal amount of access for each device.· Ensure physical security of connected devices by deploying only authenticated devices.· The security of edge computing infrastructure should not be the exclusive responsibility of the cyber security team. All teams including cyber security, physical security, operations, and management must come together to ensure holistic security.· Ensure all devices are in operation mode and not accidentally left in default setup, reset, or pairing modes.· Train employees to recognize and deter social engineering attacks that could be exploited by attackers to gain access to restricted areas where edge devices are installed.· Establish audit procedures to control data and application hosting changes at the edge.Edge computing is transforming the way data is being collected and processed, thereby empowering several industries such as autonomous vehicles, IoT and smart devices, healthcare, and so on to name a few. With this industry growing at such a tremendous pace, cyber security teams must stay informed with the latest industry best practices to ensure that their edge computing infrastructure stays as secure as physical datacentres.
<
Page 8 |
Page 10 >