Get the latest tech news
Securing edge device systems, including firewalls, routers, and VPN gateways
FORT MEADE, Md. - The National Security Agency (NSA) has joined the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), the Canadian Centre for Cyber Security
“Edge devices act as boundaries between organizations’ internal enterprise networks and the Internet; if left unsecured, even unskilled malicious cyber actors have an easier time finding and exploiting vulnerabilities in their software or configurations,” said Eric Chudow, an NSA cybersecurity vulnerability analysis subject matter expert. Know the edge Procure secure-by-design devices Apply hardening guidance, updates, and patches Implement strong authentication Disable unneeded features and ports Secure management interfaces Centralize monitoring for threat detection The companion guide, “Mitigation Strategies for Edge Devices: Practitioners Guidance,” is written for operational, cybersecurity, and procurement staff and provides an overview of what edge devices are; risks and threats to them; relevant frameworks and controls by some of the authoring nations; and a more in depth discussion on the seven mitigation strategies.
Or read this on Hacker News