Servers & Systems: The Right Compute
1846607 Members
1440 Online
110256 Solutions
New Article
ComputeExperts

Zero trust and edge computing: protect your decentralized enterprise

As organizations strive to bolster their defenses against cybersecurity threats, Zero Trust emerges as a critical strategy. Conversations around Zero Trust now represent about 20% of security discussions, with key insights highlighting that traditional perimeter-based security is no longer enough.

It will probably come as no surprise to you that the zero trust approach to security continues to dominate our conversations as many organizations look to harden their defenses against possible threats. To understand this better, I asked a colleague, Aravind Krish, Networking and Edge Expert from the HPE C2MI team, to analyze the top discussions found on the web.

Zero Trust_Image 1.pngThis tool, which is represented by the graphic to the right, maps all the new stories on data security and analyzes data patterns through neural mapping to identify top insights.

So, what was the top takeaway? Zero trust represents approximately 20% of security discussions with these top trending subtopics:

  • Traditional perimeter-based security is no longer effective
  • AI for rapid detection and incident response
  • Zero trust is essential for edge computing security

Edge computing and low-latency applications

Edge computing is the practice of processing data closer to the data sources, such as IoT devices and edge servers, rather than relying on centralized cloud services. This decentralized approach reduces latency, which is critical for applications requiring real-time processing. For example, autonomous vehicles using V2X technology require latency below 5 milliseconds to communicate effectively with nearby cars and infrastructure, while factory automation processes may need latency as low as 0.25 to 1 millisecond.

Embracing zero trust for edge security

Traditional centralized security measures often fall short in decentralized architectures with extensive estates. The projected explosion of connected IoT devices to 40 billion by 2030, expands the attack surface exponentially with each edge device. This poses potential multiple entry points for cyberattacks, making securing edge computing environments and adopting advanced security frameworks a survive-to-succeed imperative.

A key component of this survival tactic is the zero trust security model, which is based on the principle of least privilege, where users and devices are only granted the permissions necessary to perform their tasks. This model assumes that no user or device can be inherently trusted, even if they are within the corporate network. Over 60% of enterprises are currently planning or have already implemented zero trust network access (ZTNA) solutions as part of their cybersecurity strategy.

Key benefits of zero trust security at the edge

  1. Enhanced Security. Zero trust eliminates implicit trust and enforces strict access controls, significantly reducing the attack surface. This is crucial in environments with outdated Operational Technology (OT) devices that are vulnerable to cyberattacks. By continually verifying user identities and device security postures, organizations can prevent unauthorized access and lateral movement within networks, safeguarding critical systems and data.
  2. Improved visibility and control. Zero trust frameworks offer comprehensive visibility into user activities and device interactions. This oversight allows security teams to detect anomalies and respond swiftly to potential threats. In environments where multiple teams and external contractors may access systems, granular control over access is vital for maintaining operational integrity.

Getting started with zero trust security

  1. Assess critical assets and data. Begin by identifying the most critical assets and data within your environment. This includes OT systems, industrial control systems (ICS), and sensitive information requiring protection. Understanding these elements will guide the design of a tailored ZTNA architecture that provides appropriate security measures.
  2. Select a compatible ZTNA solution. Choose a ZTNA solution that integrates seamlessly with your existing infrastructure and workflows. Look for features such as Identity and Access Management (IAM), device posture assessment, to provide the ability to enforce granular access controls. This ensures the solution can adapt to the unique requirements of your processes without significant disruptions.
  3. Implement in phases. Adopt a phased implementation approach to ZTNA. Start with a pilot program focusing on a limited subset of users and services to test the system's effectiveness, and address any onboarding challenges. Gradually expand the deployment based on insights gained during the pilot, ensuring that security measures evolve alongside operational needs.

Zero Trust_ Blog_HPE_Structure_Orange_1_800_0_72_RGB.pngAs edge computing continues to expand, securing these environments becomes increasingly complex yet essential. By adopting a zero trust approach, you can enhance security, improve visibility, and maintain control over your decentralized networks. The journey towards zero trust begins with understanding your critical assets and selecting compatible solutions that can be implemented in phases, ensuring minimal disruption and maximum protection.

To learn more about how HPE is engineering compute with a fundamental security approach to defend against increasingly complex threats, please check out HPE Compute Security, and for latest in edge server innovation be sure to check out the new HPE ProLiant DL145 Gen11 Server

 

Aaron Lamond-2.jpgMeet HPE Blogger Aaron Lamond, Worldwide Product Marketing, AI Solutions, HPE Compute Aaron is an experienced marketing manager with a demonstrated history of working in the information technology and services industries. He has deep expertise in enterprise software and infrastructure, and extensive experience in engineering and sales. Aaron is based in New Zealand. 

 

 

Compute Experts
Hewlett Packard Enterprise

twitter.com/hpe_compute
linkedin.com/showcase/hpe-servers-and-systems/
hpe.com/servers

 

0 Kudos
About the Author

ComputeExperts

Our team of Hewlett Packard Enterprise server experts helps you to dive deep into relevant infrastructure topics.