Intelligent CIO APAC Issue 20 | Page 19

LATEST INTELLIGENCE

AN OVERVIEW OF CYBERSECURITY BEST PRACTICES FOR EDGE COMPUTING

eExecutive summary

An edge IT environment , such as those found in industrial factories , can have a plethora of distributed endpoints providing a large attack surface for cyber criminals and hackers . Managing this risk requires the proper implementation of network segmentation and various security appliances . Edge computing involves connecting endpoint devices and systems to a network . design ( 3 ) device configuration , and ( 4 ) operation & maintenance to reduce the risk of breaches . Examples are provided as well as references to related cybersecurity standards . Note : While this paper is largely explained in the context of industrial edge applications , the concepts discussed are applicable to all edge IT environments .
Introduction
PRESENTED BY
These connections offer potential avenues of attack for hackers . Mitigating these cybersecurity risks requires solutions that encompass security best practices for devices , networks , and applications . This also requires actions on the part of the user to maintain their required level of cybersecurity . This paper discusses best practices for four key elements of an effective edge computing cybersecurity strategy including : ( 1 ) selection criteria for devices , ( 2 ) secure network
Incidents of cyber-attacks against IT networks have been intensifying globally . This combined with increasing adoption of IoT devices , the convergence of IT and OT ( operations technology ) networks , and the use of cloud-based management and analytic systems has led to cybersecurity being an urgent concern for edge IT owners and operators . Cyberattack risks are worsening due to the increasingly distributed nature of IT . p
Download whitepapers free from www . intelligentcio . com / apac / whitepapers
www . intelligentcio . com INTELLIGENTCIO APAC 19