Why zero trust needs to live on the edge

by | Nov 15, 2022 | Technology

This article is part of a VB special issue. Read the full series here: Zero trust: The new security paradigm.
Edge computing’s diverse platforms defy easy consolidation into a single security stack. This leaves networks vulnerable to endpoint attacks they never see coming. Yet, edge and IoT platform providers have only recently moved away from the “trust but verify” philosophy and begun instead “designing in” technology that treats every endpoint and identity as a new security perimeter.

The truth is, most edge and IoT platforms used today weren’t designed with enough security to withstand endpoint attacks. CISOs struggle to integrate these platforms into a single security stack because legacy edge, and IoT platforms are designed to lean on server and operating system security. Interdomain trust relationships that don’t enforce least privileged access by account or resource leave wide swaths of endpoints vulnerable to intrusion and breach attempts. 

To avert devastating breaches, CISOs need to secure edge computing and IoT platforms across the full stack they rely on. Hardware, operating system, app platform, data, network security — enterprises need to look at how zero trust can meet the challenge of securing complete tech stacks for edge computing and IoT networks.

Hyperscalers are competing to secure edge and IoT computing  

Amazon Web Services (AWS) for the Edge, Microsoft Azure Stack Edge and Google Cloud Platform (GCP) Distributed Cloud are each focusing R&D on helping enterprises solve edge computing, IoT and cybersecurity challenges. Of the three, AWS …

Article Attribution | Read More at Article Source

Share This