CXO Bytes

The Ideal Cybersecurity Strategy for Edge Device Management

The importance and need of cybersecurity in the current Industrial Automation landscape needs no special mention. It has become one of the most critical factors of Industry 4.0 strategies and functions. Cybersecurity strategy is an enterprise model spread across various fields and geographies. It encompasses a series of activities and tasks through multiple layers of industrial infrastructure.

The scope of industrial cybersecurity includes individual and collective security of data, information, assets, processes, and operations – starting from the smallest device or sensor; right up to the cloud-based data centers. The elements in the network chain span multiple generations, resources, and constraints etc.   So, a cookie-cutter approach to cybersecurity does not fit all, but the basic principles still hold good.

Depending on the role of the ‘edge layer’, the consequences of a cybersecurity events for enterprises are far beyond the data breach. All the activities related to cybersecurity for Edge Device Management revolve around a mix of on-demand (only) connectivity, planning and implementing measures for known/unknown and anticipated cyber threats using defenses such as zero trust, antiviruses, firewalls, and so on.

  • Why is Edge Computing the next big Cybersecurity Challenge?

It’s the ‘Edge’ where data and information is aggregated, orchestrated, and processed. Since, it’s here that data and information is possibly exposed to public networks, edge devices are vulnerable and most targeted in cyber-attacks. Moreover, as these devices are often deployed outside the central data center, monitoring and safeguarding them against a host of security risks is challenging. Thus, Edge Computing is one of the most critical challenges that organizations deal with.

Due to the sheer volume of heterogeneous devices and equipment, Edge Computing is exposed to innumerable internal and external threats. The significant reasons why Edge Computing is one of the biggest challenges facing cybersecurity are:

  1. Local Data Processing & Storage: Processing and transferring humongous data originating from a host of IoT devices may pose network connectivity and latency issues.  
  2. Weak Security-mindset of Users:  The culture and practice of inclusive security across the workforce is easier said than done. Users’ and supervisors’ mindset of ‘local interest’ can be a daunting task to replace with a unified ‘enterprise interest’ approach.
  3. Device Overcrowding: Applying 100% security to all devices is challenging. Weak protection for some devices may expose the dangers of attacks creeping in. Scalability issues to accommodate devices from different vendors in the existing security setup is a practical challenge in terms of uninterrupted operations.
  4. Balancing Functional and Platform Security Issues: Encrypting and decrypting of data using the latest and evolving technologies demand high investment. It also requires time to implement and reach a 100% risk-free state.
  5. Business Insights from Connected Devices: Filtering and processing data to derive impactful business insights from a host of edge devices can be a nightmare. Any lacunae on security aspects means losing control of critical business-related focus.

 

  • What are the best practices for edge computing security?

To mitigate the chances of risks, total security for edge computing should perform dual functions – ‘prevention and cure’. While an over-security approach can erode finances, voluntary bypass of safeguards and insufficient security measures can result in irrecoverable losses. Malicious electronic Viruses, Software, and Ransomware can have No-U-Turn damages via data theft or manipulations.

It is challenging to anticipate cyber threats from various pockets and design counter-solutions even before the cyber-criminals can develop a new way to hack the infrastructure. Like other security principles for advancing the industrial environment, the need for and importance of cybersecurity strategies for edge device management must evolve. Some of the best practices and strategies every organization must follow while implementing edge computing are:

1.Best End-case Point: Visualize the best-desired scenario of Edge Computing security and work backward. Create a blueprint and invite challenges to identify loopholes or lacunae in technologies or processes.

2.Embrace ‘Security by Design: Adopt the way of thinking about security from the conceptual stage itself and as an external monitoring. Reiterate, align, and expand your security practices based on industry best practices, proven methodologies, and from your own mistakes. Some of the best practices are:

    1. Zero Trust and Isolation: Assume nothing is safe. Irrespective of internal or external factors, investigate vulnerabilities arising from devices, users, consumers, networks, and systems. Some measures include strong authentication and related policies. No Admin Users, No Hardcoded Passwords, Mutual Authentication. Multi Factor authentication, FIDO Challenge, DMZ, Air gapping, etc. are a few to mention.
    2. Hardened and Rightly Patched Systems: Deploying Trusted Execution Environments such as Secure Boot and Containers safeguard systems and networks for cyber attacks . Bare Minimum Components and qualified Software BOM (OSS, Revisions, etc.) and System Configuration, Restrictive Users and Privileges, Air gaping, Up-to- date Software & Firmware and the most common, and the most effective way to arrest and minimize security related issues.
    3. Data Security:  Transport data only with encryption. Restrict the access for data or information storage and display only to the privileged uses with uncompromised authentication.
    4. Restricted Bidirectional Communication: Ensure no access to data via the backdoor for convenience. As much as possible, eliminate Edge access with the traditional remote software.
    5. Hardware & Physical Security: Select a device that supports hardware security. If the device can be physically secured, just do it.

3. SOP : Service and Support are the key sources in disguise that give rooms for vulnerabilities. Review and Audit SOPs should be in place for Edge Qualification, Deployment Verification, and Operations. The best mantra is to keep it simple – the more complex the procedures are, more likely they are to be violated.

4. Automated Management: A comprehensive automated system must ensure that edges are provisioned, monitored, audited, and patched on time, every time. Design maximum security automation covering requests and responses spanning the complete infrastructure. Real-time monitoring, industry-standard security compliance, and certifications are proven ways to adopt workable and scalable security strategies.

5. Obsolescence Management:  As much as possible and viable, retire the obsolete systems.

6. Look Out and Within: Don’t try to fix everything internally. Instead, reach out to credible advisors, expert consultants, and emerging trends & technologies to counter security threats. Nevertheless, build upon the internal strength of the workforce dedicated towards total edge security.

By the way, every aspect elaborated above adds up to build, execute, and manage matured and intelligent security. One aspect cannot replace the other.

  • How a cybersecurity strategy helps prevent costly business disruptions

Security cannot be an afterthought. As an example, selecting an Edge with or without Trusted Platform Module (TPM) defines an organization’s security posture. Devices without TPM may cost less to procure but could prove very expensive in the security-compromised events. On the other hand, TPM by itself does not lend to improve the security if unutilized, or mis-utilized.

The maturity of the enterprise security model is not limited to prevention, but also the ability to contain/isolate the compromise, recoup and deploy remedial measures. Security posture is always the outcome of design, deployed systems, and practices. Not to forget, the culture of ‘inclusive security’ by every user and stakeholder in the chain plays a vital role in defining the successes of cybersecurity.

Some of the obvious benefits delivered by careful planning, execution, and implementation of intelligent cybersecurity strategies are:

  1. Un-interrupted Workability
  2. Business Continuity
  3. Prevents Customer Dissatisfaction

 

(The author is Mr. Rushendra Babu,  Chief Technology Officer of Utthunga Technologies and the views expressed in this article are his own)

Leave a Response