WHAT IS ENDPOINT SECURITY
Endpoints are typically the computing devices used by users in an organization and they can be a desktop, laptop, a tablet or a mobile phone also. Since the dawn of pandemic , Endpoint security has again taken a front seat as the traditional network centric approach is no longer valid with users working from anywhere.
Endpoint security is defined as the process of securing the endpoints and includes a set of security controls and not a single control for example access controls, endpoint hardening , anti-malware , data loss prevention tools etc.
WHY ENDPOINT SECURITY IS IMPORTANT
Any end user computing device, such as a laptop, desktop or a mobile phone can be leveraged by hackers to gain foothold inside the enterprise network for carrying out malicious activities. Securing these end user devices to prevent loss of corporate / organization information has become very privacy important in the wake of heavy fines being imposed as per various regulations such as privacy regulations and also loss of business to competitors. Post pandemic the perimeter security ceased tto exist in its true sense as an enterprise security solution as users started accessing corporate information from discrete networks such as from their homes , with zero firewall filtering. The line of perimeter is fading away fast and the security solutions are becoming cloud centric.
The best way is to force endpoint devices to meet corporate security baselines prior to being granted access to corporate data, thus effectively mitigate the risk of exposure to unknown and unverified endpoint devices. Many organizations are also adopting the Zero Trust Architecture, which is more like a Always on VPN with no traffic splitting, so essentially all traffic will be filtered by the organization specific policies via a reverse proxy and for allowing access to internal network assets the solution provides a secure and encrypted tunnel typically referred to as Private VPN.
Please note that Endpoint security doesn't mean actions being taken solely on the endpoint side rather the Endpoint security now encompasses the actions which extend along the entire chain of information access : from OS booting, User login, Application usage and access of Corporate resources (internal applications, data on file server , email etc.) from anywhere.
ENDPOINT SECURITY REQUIREMENTS
100% protection of Endpoints is a myth unless the system is completely isolated and does not connect with any network , no usb is ever used and no external media is ever inserted. But than it would not be useful to serve a purpose to the user who may want to print a document or send out an email. To manage the security of endpoints and keep the risk of endpoint compromise to minimum, organizations need to adopt a layered defense approach. The layered defense approach focuses security controls by prioritizing essential security requirements versus good to have or non-essential security features. Basically you build up the defenses one above the other starting with the most needed controls first. The essential ones are non-negotiable while non-essential/good to have can be considered based on organization business domain , regulatory requirements , culture etc. Here is the list segregated into Essential and non-essential features , but you are free to build your own list.
Essential Features
- Endpoint Privileged Access control
- Application Control - Whitelisting and blacklisting
- Network access control
- Malicious Traffic Filtering
- Log Management
Non-Essential - Good to Have
- Device or data encryption at rest
- Information Rights Management
- Data loss prevention
- Insider threat protection
- Endpoint detection and response (EDR) - for Medium sized organizations
- Extended Detection and Response(XDR) for Large Organizations or for those who have complex business operations with sensitive data spread across multiple business units
As the technologies are evolving and most organizations are going cloud centric to reduce capex, become more agile and flexible, the endpoint technologies will undergo metamorphosis too, so it will be a good strategy not to commit for a endpoint solution that doesn't offer cloud integration or SAAS model.
Comments
Post a Comment