In collaboration with our international partners, we have released a new publication series on securing ‘edge’ devices.
Edge devices are like doors into networks, where data flows in and out. Failing to secure these network perimeters is equivalent to leaving doors open, inviting malicious actors to access sensitive data, disrupt operations and initiate further exploits.
The most common edge devices across enterprise networks include enterprise routers, firewalls and VPN concentrators. This series of publications aims to provide best practices for securing edge devices to ensure they don’t compromise an entire network. The publication series includes:
- Mitigation strategies for edge devices: executive guidance – tailored for senior leaders and includes strategies to manage and secure some of the most common edge devices across enterprise networks.
- Security considerations for edge devices – contains best practices to secure edge devices for senior leaders in an IT decision-making role.
- Mitigation strategies for edge devices: practitioner guidance – provides IT practitioners with a list of principle mitigation strategies for the most common types of edge devices and appliances across enterprise networks and large organisations.
- Guidance on Digital Forensics and Protective Monitoring Specifications for Producers of Network Devices and Appliances – outlines minimum requirements for forensic visibility.
Find out more about securing edge devices and read the publication series.