Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Improving Edge Computing Security in 2022
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Improving Edge Computing Security in 2022

4 years ago Tripwire Guest Authors
Improving Edge Computing Security in 2022

More organizations are turning their eyes to edge computing as cloud adoption reaches new heights. Experts predict there will be 55 billion edge devices by 2022 as latency and resilience demands grow and 5G makes these networks possible. While this growth is impressive, it raises several security concerns.

Edge computing expands attack surfaces, and data centers lack the resources of traditional cloud infrastructure. If security approaches don’t shift to meet these new challenges, the edge may bring more risks than value.

Here are six ways companies can improve their security as companies prepare to expand their edge environments in 2022.

1. Zero-Trust Architecture

Another way edge environments can ensure security by design is to embrace a zero-trust approach. While many think of zero trust as a method of restricting user access, it applies to devices, too. Each edge device should only have access to what it absolutely needs, and even then, authenticate its identity before access.

Edge environments are too complex and full of endpoints to trust any network request. Implementing zero-trust security will ensure one endpoint doesn’t jeopardize the rest of the network. Zero-trust architecture also works well with SASE, as SASE provides the context necessary for situational authorization.

2. SASE

One of the most important security upgrades is secure access service edge (SASE) architecture. SASE brings wide-area networking (WAN) and network security services into a single cloud solution. This convergence gives organizations more transparency and control over their operations, which is essential for edge security.

Monitoring edge networks can be challenging given their distributed, endpoint-heavy nature. SASE makes it easier to look into and control these networks by reducing complexity and automating background security tasks. As IT sprawl rises and edge environments become increasingly complex, that benefit will become difficult to overlook.

Fewer than 1% of organizations had SASE strategies as of 2018, but Gartner predicts that figure to rise to 40% by 2024. As edge computing becomes more common, it may have to grow faster still.

3. Distributed Resiliency

Part of reliable cybersecurity is ensuring a network can continue functioning when a disruption occurs. Traditional data centers can ensure this resiliency through redundant on-premises infrastructure, but this isn’t an option for edge computing. That’s why nine out of 10 edge data center owners say that network-based distributed resiliency will become common in the next few years.

Distributed resiliency involves replicating data across multiple sites. That way, if one edge data center experiences disruption, the network can shift the workload to another center or across several. This setup lets these facilities mitigate disruptions and downtime without increasing their physical infrastructure.

4. Confidential Computing

As edge networks grow and handle more sensitive information, they should also employ confidential computing. This process encrypts data while in use, not just in storage or in transit. Since edge centers have limited infrastructure for securing their access and availability, this step is crucial for improving security.

Traditional computing methods leave data vulnerable right before, during, and immediately after processing, as they must decrypt it. Confidential computing uses hardware-based trusted execution environments (TEE) to lock this process behind encrypted doors, removing that vulnerability. If edge systems include these TEEs by design, they can scale without introducing security issues.

5. Standardization

One easily overlooked but critical part of edge computing security for 2022 is standardization. Since edge networks involve diverse endpoints with specific functions, they’re often eclectic and complex, making them difficult to manage. Standardizing security protocols and processes helps reduce this complexity, enabling faster responses.

Setting standard controls and security measures on the underlying cloud platform can help ensure consistency across the edge. When these networks become easier to manage, they become easier to secure. This standardization is also crucial for some of the edge’s most impressive applications.

Edge networks will likely prove essential for self-driving cars, but a delay of just 100 milliseconds is enough to cause a crash. By reducing complexity through standardization, edge environments can ensure faster data transmission and processing, preventing these accidents.

6. Physical Security

Edge computing adopters must also consider physical security. Organizations that move away from traditional data centers lose their privacy and access controls, even without realizing it. Since edge centers are more publicly accessible, they must include strong physical security controls.

Edge devices must include tamper-proof designs, locking mechanisms, and similar protections. Internal factors like hardware root of trust and ID authentication measures are also recommended. Since companies cannot continually monitor these locations, they must ensure no one can interfere with them through physical access.

Edge Computing Security Must Improve

The edge has the potential to revolutionize the world of cloud computing. However, companies must be careful not to overlook security considerations in their excitement to embrace this new technology. Edge security must improve before the edge becomes widespread.

These six steps provide a starting point for reliable edge security. Implementing these improvements will let organizations expand their edge environments without compromising cybersecurity.


About the Author: Devin Partida is a cybersecurity and data privacy writer whose work is regularly featured on Yahoo! Finance, Entrepreneur, AT&T’s cybersecurity blog, and other well-known industry publications. She is also the Editor-in-Chief of ReHack.com.

Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” Improving Edge Computing Security in 2022″ appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: Cloud, Critical Severity, Encryption, High Severity, Medium Severity, Privacy, TripWire

Continue Reading

Previous What the Rise in Cyber-Recon Means for Your Security Strategy
Next Microsoft Issues Fix for Exchange Y2K22 Bug That Crippled Email Delivery Service

More Stories

  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists

4 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

1 day ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

1 day ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

1 day ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

How Samsung Knox Helps Stop Your Network Security Breach

1 day ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

1 day ago [email protected] (The Hacker News)

Recent Posts

  • German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists
  • China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
  • CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
  • Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
  • How Samsung Knox Helps Stop Your Network Security Breach

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT