Contenu connexe

Similaire à Securing the Edge(20)

Plus de Advanced Technology Consulting (ATC)(20)



Securing the Edge

  1. © 2022 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo and Mobilizing Your World are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. The information contained herein is not an offer, commitment, representation, or warranty by AT&T and is subject to change. AT&T Proprietary (Internal Use Only) - Not for use or disclosure outside the AT&T companies except under written agreement 2022 AT&T Cybersecurity Insights Report™: Securing the Edge Eleventh Edition Theresa Lanowitz | Head of Cybersecurity Evangelism March 2, 2023
  2. Attack surface PC LAN Client/Server Web Mobile Cloud Edge Adversary Hobbyist hackers Financial motivation Hacktivists Nation states Frictionless commercialized cybercrime Threat Virus Worms DDoS attacks Phishing Man-in-the-Middle SQL injection New technology Threat improvement Cyber attacks for physical physical harm Cyber Risks | Proportionate to Attack Surface 2 AT&T Cybersecurity / © 2020 AT&T Intellectual Property Tomorrow Yesterday Today Future challenges • Maintaining proper security posture • Extending security policy to new types of devices • Implementing Zero Trust framework • Accessing and moving higher quantities of data • Handling bursts of workloads
  3. • 1,520 participants in NA, LATAM, EMEA, and APAC • Mid-size to enterprise companies (1,000+ employees) • Cybersecurity leadership (director-level and above, including CISO, CIO), IT leadership (director and above), line of business (director and above) • Vertical industry focus: • Financial services • Healthcare • Retail • Manufacturing • Energy and utilities • US public sector Global Survey | Demographics
  4. 2022 AT&T Cybersecurity Insights Report | Plus Verticals
  5. EdgeTypes Security strategies vary depending on edge type Workloads need to adjust to different types of data flow activity
  6. Edge |Characteristics Architectures for edge networks and security controls continue to exist in a hybrid world, both on-premises and multi-cloud. Edge definitions are in flux, essential characteristics of an edge include: o A distributed model of management, intelligence, and networks o Applications, workloads, and hosting closer to users and digital assets that are generating or consuming the data, which can be on-premises and/or in the cloud o Software defined (which can mean the dominant use of private, public, or hybrid cloud environments; however, this does not rule out on-premises environments) © 2023 AT&T Intellectual Property
  7. Key Findings Edge deployments have surprising momentum despite a high concern of “perceived risk” among organizations globally. 75% of respondents are planning, have partially, or have fully implemented an edge use case today. Architectures for edge networks and security controls continue to be deployed in hybrid environments. It’s 50/50! Respondents who are combining network and security functions in the cloud vs. on premises. Organizations are quickly adopting new approaches, however legacy controls remain popular and necessary. Cost vs. effectiveness is still in debate. 44% Say Firewall at the Network Edge offers the the most significant cost- benefit of security controls 7 65% are working with a third party for designing and deploying new architecture for edge use cases.
  8. Edge Momentum Edge deployments have surprising momentum despite a high concern of “perceived risk” among organizations globally. Security is a critical success factor for edge initiatives. 8
  9. TopUseCases |All Industries © 2023 AT&T Intellectual Property
  10. EdgeUseCases | Production within 3Years Globally and across industry use cases, loss prevention in retail and video-based quality inspection in manufacturing have the highest rate of mature stage adoption (59%). © 2023 AT&T Intellectual Property
  11. EdgeComputing | FamiliarComponentsToday © 2023 AT&T Intellectual Property
  12. Edge Risks | Concern Most Organizations Globally and across industries, organizations rank the risk of an attack as “highly likely” and the impact to the organization as “very impactful.” © 2023 AT&T Intellectual Property
  13. Concern Over Attacks 13 74% of respondents say a security compromise is “very likely” Attacks against server/data within the network edge and attacks against user/endpoint devices within the network edge consistently rise to the top.
  14. Hybrid is Reality Architectures for edge networks and security controls continue to exist in a hybrid world, both on-premises and multi-cloud. 14
  15. NetworksTypes forTopUseCases | Private 5G Leads 15
  16. 16 Traditional vs. NextGeneration | CybersecurityControls
  17. Legacy Controls and New Solutions Co-exist The cost of various security controls vs. effectiveness of those controls is still “in debate.” More importantly, organizations are adopting new approaches and emerging security solutions, but they are definitely not finished with legacy controls. 17
  18. 18 PreferredCybersecurityControls | By NetworkType Globally and across industry use cases, Intrusion / threat detection, data leakage monitoring, and devices authentication are top controls across all 6 network types
  19. 19 PreferredCybersecurityControls | By ComponentType Preferred cybersecurity controls vary, depending on the component. Consistently, network access control and patching are cited as the least preferred.
  20. 20 CybersecurityControls | Perceived HighestCost Benefit
  21. 21 Significant Investment Planned | Security of EdgeUseCases Percent of organization’s total COMBINED investment for ALL of use cases (in production within 3 years) that’s anticipated to be allocated directly to security
  22. Summary Securing the edge is a team effort • Edge has strong momentum and is far along in adoption, bring stakeholders along on a journey of opportunities and challenges • Throughout all stages of edge network discussions and implementations, consider legacy controls where effective, and be open to next generation-approaches • Evaluate the benefit cost of security controls Keep in mind the need for visibility across the entire attack surface Scrutinize traditional assumptions and look across industries for guidance and best practices • Edge security is emerging Collaborate with your peers and engage security services providers with broad, complementary capabilities to help reduce complexity, lower cost, and enable rapid © 2023 AT&T Intellectual Property

Notes de l'éditeur

  1. Attack Surface -The total number of entry points where an adversary can attempt to enter data or extract data from an environment. Adversary - An entity with the intent to conduct malicious and detrimental activities by accessing or modifying data. Threat - A malicious act with the intent and capability to damage data, steal data, or disrupt digital life.
  2. Security is key to success and orgs are looking for help in design and deployment of architectures. 65% are working with MSSP/MSS, Telco, SI, VAR/reseller
  3. Respondents are concerned about all attack vectors that were offered as options in the survey. Across all edge use cases, 74% of respondents say the likelihood of compromise is very likely, a four or five with five equaling “very likely”. Respondents rank ransomware as the most likely objective of an attack overall, across verticals and regions. This should not surprise anyone due to the number of high-profile ransomware attacks in 2021 and predictions that ransomware will continue as a primary attack objective in 2022. Ransomware is the top concern, however, respondents had consistent, high concern of attacks (above 60%) across many attack vectors:
  4. Private cellular 5G network dominates in support of edge computing use case. The types of edge networks that organizations expect to use in support of their edge use case within three years varies by industry. Organization may be using multiple types of networks, such a private cellular 5G network, a remote office / branch office edge network, and a multi-cloud environment (IaaS/PaaS/SaaS).
  5. Assume that traditional security controls, such as firewalls, are still relevant but in a different, next-generation form. Secure access service edge (SASE) is in the spotlight, and it’s on the radar of all industries surveyed (healthcare, retail, finance, manufacturing, public sector, and energy and utilities). Currently, about the same number of respondents are interested in either deploying an on-premises solution that mirrors the security plus network capabilities (51.9%) and/or deploying a similar solution in the cloud, i.e. SASE (51.3%).  
  6. The primary security controls that are put in place for edge initiatives vary by the types and “mix” of networks an organization is using. And, these controls may overlap. For example, an organization may be using a private cellular 5G network, a remote office / branch office edge network, and a multi-cloud environment (IaaS/PaaS/SaaS). Top controls deployed across all types of networks for edge use cases include: Intrusion / threat detection (top in all 6 network types) Data leakage monitoring (top in all 6 network types) Device authentication (top in all 6 network types) Firewall at network edge (top in 4 network types) Application proxy, e.g. secure web gateway, CASB, etc. (top in 3 network types) Encrypted traffic at gateway / proxy — external (top in 1 network type, public cellular 5G/Telco network) Encrypted traffic throughout — internal (top in 1 network type, public cellular 5G/Telco network) Network access restrictions device-device (top in 1 network type, IaaS/PaaS/SaaS cloud environment) Distributed denial of service, DDoS, (between 4% and 29%) and encrypted traffic throughout (29% - 33%) were ranked as the lowest deployed security controls across all network types
  7. Many stakeholders in 5G and edge are using open source software, a known target for attackers. But because the software is embedded, dependencies aren’t always apparent. As a result, enterprises may want to prioritize the design of a clear process for receiving notifications about vulnerabilities or patches.  Patching isn’t always an option. But when patching is an option, stakeholders should patch software in the infrastructure as quickly as possible. Yet they won’t always know the threat source, especially of zero-day attacks. The reality of this situation may be one reason why patching is the lowest ranked control 
  8. Cybersecurity controls that are considered to provide the most significant cost benefit for edge security are as follows. (This does not preclude other controls such as multifactor authentication, encrypted traffic gateway/proxy (external), endpoint/device monitoring (antimalware, EDR, etc.), device authentication (e.g. certs), data encryption (at rest), network access control (e.g. ZTNA), patching, or DDoS mitigation. Respondents simply stated that the following were the “most cost effective.”) Firewall at network edge Intrusion/threat detection Network access restrictions device-device Data leakage monitoring Password authentication Application proxy (e.g. secure web gateway, CASB, etc.)  
  9. Organizations anticipate investing broadly and holistically in cybersecurity controls to secure the entire network and IT systems, of which edge is increasingly a part. In terms of investments being allocated directly to security as a percent of an organization’s total investment for all edge use cases in production within the next three years, most orgs expect to invest 11% - 20%. For each industry, the expected investment is as follows. Finance: 59% expect to allocate between 11-21% or more Healthcare: 61% expect to allocate between 11-21% or more Retail: 61% expect to allocate between 11-21% or more Manufacturing: 58% expect to allocate between 11-21% or more Public Sector: 67% expect to allocate between 11-21% or more Energy and Utilities: 65% expect to allocate between 11-21% or more