Mitigating Security Risks at the Network’s Edge

2233 0

Organisations operating across multiple locations face ongoing, extensive challenges in maintaining network security and are at a particularly high risk of suffering data breaches. The highly vulnerable ‘Network’s Edge’ must be carefully protected against threats and malicious attacks. Criminals view the Network’s Edge as a soft target, since the distributed locations frequently process highly sensitive data (e.g. credit cards) while often employing weaker security practices.

According to Gartner, by 2016 thirty percent of advanced targeted threats will specifically target distributed locations as the entry point.

A range of factors contribute to security weaknesses in distributed networks, but they can be heightened by factors such as limited onsite IT support, lack of employee security awareness, and the dangers associated with third parties and customers accessing the network.  Despite the risks, organisations can focus on some key mitigation priorities to secure the Network’s Edge more effectively.

Strategies for a Safer Network

Ensuring device visibility is the key to any security strategy. With many new devices joining enterprise networks, visibility into mobile networks is becoming critical. Network administrators need the ability to identify, track, and categorise all devices accessing the network. Device visibility provides IT with real- time inventory and security intelligence for active remediation while allowing users to seamlessly connect to the network without disruptions or changes in end-user experience.

A disciplined approach to security at the Network’s Edge can play a major role – regular audits should be conducted to maintain up-to-date and accurate network topologies (logical and physical). Use a common set of security controls for policy management, and institute governance, risk, and compliance security best practices.  Strong collaboration and communication across teams within the IT organisation is also key to creating a reliable and uniform approach.

These human factors are very important – it is imperative for enterprises to teach and enforce employee security protocols. In particular, employees should be trained to recognise and report phishing emails – they should be able to spot the common signs of suspicious communication, such as encouragement to click on links, especially examples that are unfamiliar or do not match the supposed source’s web address. Urgent requests to provide information, call a phone number, or download attachments are also a danger sign, along with bad spelling or unusual grammar.

Beyond organisational and strategic efforts to improve security, specific policies, such as controlling entry points to routers and correctly configuring network firewalls are a vital steps in minimising the risks of a security breach.

With the explosion of ‘Bring Your Own Device’ (BYOD) and mobility, there are more network access points than ever before. Organisations should also create segmented safety zones and implement Parallel Networking to deliver extra layers of security.

Network segmentation allows for the partitioning of the network into “security zones,” or segments separated by firewalls. Properly configured segments separate applications and prevent access to sensitive data. A Point-of-Sale system, for example, should operate on a segment separate from third party applications, employee email, or public WiFi.

This limits the ability of attackers to pivot from one application to another, and allows network administrators to manage the quality of service (QoS) on specific segments, prioritising bandwidth usage for mission-critical applications.

In contrast to segmenting a single network, creating multiple Parallel Networks is a relatively simple solution. Separate applications are assigned completely separate networks, or “air-gapped.” This physical separation of data further prohibits attackers from using a compromised device to pivot to other servers and networks, including those that hold sensitive data.

Based on information collected by Verizon, a global network carrier, for the 2015 Data Breach Investigations Report, twenty-three percent of recipients now open phishing messages and eleven percent click on attachments. This allows attackers onto the network, set up camp and continue to work to find vulnerabilities. Because of this, enterprises should consider hosting customer WiFi, employee devices, and Point-of-Sale systems on their own respective networks.

Enterprises should also expect third parties such as vendors, partners and kiosks who require Internet access to “Bring Your Own Network.” By expecting third parties to provide their own Parallel Networks, the company can retain governance over its own network functions, while reducing the overall scope of work to maintain network security.

Parallel Networks significantly reduce the amount of time and expertise needed to segment networks based on application, and limit the scope of work for maintaining PCI Compliance on the network used for transmitting cardholder data.

Enterprises with distributed locations or branch offices are at the highest risk of suffering data breaches, but the primary focus is often placed on securing central systems rather than vulnerabilities at the Edge.  An approach, which focuses on specific initiatives to protect the Network’s Edge, can help organisations stay out of the headlines in the fight against serious and ongoing security risk.

About Kent Woodruff
Kent WoodruffWith over 28 years in the IT field, Kent has experience with a wide variety of technologies and the business processes that these technologies support within large Enterprises. He applies a keen understanding of industry trends and Regulatory/Compliancy standards, leveraging his experience in demonstrating vulnerabilities of wireless networks and how such vulnerabilities can be mitigated. Kent’s talents include Storage and Systems management, Software Development for embedded systems, Service Oriented Architectures and middleware, WLAN and mobile device security, Vulnerability Management, Security Architecture, PCI, Policy and Compliance. Prior to joining Cradlepoint, Kent was Chief Security Analyst for Motorola AirDefense and has held many senior positions with notable security companies including Atrysk Security, Credant Technologies, Foundstone Inc. (acquired by McAfee), Qualys Inc. and Savant. He is a frequent speaker at regional and national security conferences and guest lecturer at Universities and Hacking Workshops. Kent holds a Bachelor’s Degree in Mechanical Engineering from the University of Maryland.

In this article