{"id":16741,"date":"2019-10-31T11:00:17","date_gmt":"2019-10-31T19:00:17","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/10\/31\/news-10480\/"},"modified":"2019-10-31T11:00:17","modified_gmt":"2019-10-31T19:00:17","slug":"news-10480","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/10\/31\/news-10480\/","title":{"rendered":"How to Prevent Edge Computing Security Risks in a Connected World"},"content":{"rendered":"<p><strong>Credit to Author: Steven Brown| Date: Thu, 31 Oct 2019 15:53:15 +0000<\/strong><\/p>\n<p><a href=\"https:\/\/www.apc.com\/us\/en\/solutions\/business-solutions\/edge-computing\/what-is-edge-computing.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">Edge computing<\/a> sites are cropping up all over, driven in large part by Internet of Things (IoT) technology and digital transformation efforts that are generating enormous amounts of data that demands localized processing and storage. At the same time, the proliferation at the edge is creating a new challenge: how to effectively secure all these far-flung environments.<\/p>\n<p>To manage edge computing sites, companies are increasingly instrumenting power and cooling systems, racks, UPSs, PDUs, and cabinets such that they can collect performance and operational data from them, typically via Internet connections. Doing so, however, creates a security challenge: all of those devices are now potential points of entry for cyber-attacks. Compounding the problem, the facility managers who oversee data center infrastructure previously haven\u2019t had to worry about security and don\u2019t necessarily have the expertise required to determine where vulnerabilities lie, nor should they be expected to.<\/p>\n<p> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-61608\" src=\"https:\/\/blog.se.com\/wp-content\/uploads\/2019\/10\/Cyber-security-image-300x200.png\" alt=\"edge computing cyber security\" width=\"650\" height=\"433\" srcset=\"https:\/\/blog.se.com\/wp-content\/uploads\/2019\/10\/Cyber-security-image-300x200.png 300w, https:\/\/blog.se.com\/wp-content\/uploads\/2019\/10\/Cyber-security-image-768x512.png 768w, https:\/\/blog.se.com\/wp-content\/uploads\/2019\/10\/Cyber-security-image.png 848w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/> <\/p>\n<p>Indeed, even seasoned security professionals struggle with the issue because they can\u2019t get visibility into the data center infrastructure to determine what may be at risk of an attack.<\/p>\n<p>That\u2019s because acquiring device information means logging into each device individually or looking at data log files filled with data from network management cards (NMCs). It\u2019s not feasible for a security professional to do either for hundreds or thousands of UPSs, PDUs, racks, cooling units, and other data center infrastructure \u2014 both in centralized data centers and geographically dispersed edge computing facilities. Even at 20 devices, the chore begins to get time-consuming and difficult.<\/p>\n<h2>Outlining IoT Security Risks for Edge Computing<\/h2>\n<p>But the risks are real. Just last month security researchers in the Microsoft Threat Intelligence Center announced they found attempts by \u201ca known adversary\u201d to compromise popular IoT devices across multiple customer locations.<\/p>\n<p>\u201cThese devices became points of ingress from which the actor established a presence on the network and continued looking for further access. Once the actor had successfully established access to the network, a simple network scan to look for other insecure devices allowed them to discover and move across the network in search of higher-privileged accounts that would grant access to higher-value data,\u201d <a href=\"https:\/\/msrc-blog.microsoft.com\/2019\/08\/05\/corporate-iot-a-path-to-intrusion\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft said.<\/a> \u201cThese simple attacks taking advantage of weak device management are likely to expand as more IoT devices are deployed in corporate environments.\u201d<\/p>\n<p>A survey of 625 risk management and governance experts by Ponemon Institute <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/major-uptick-in-iot-related\/\" target=\"_blank\" rel=\"noopener noreferrer\">illustrates the point<\/a>. It found 26% of respondents in 2018 suffered an IoT-related data breach, up from 15% in 2017.<\/p>\n<p>The issue arises at an inopportune time, as companies continue to build data centers, including edge data centers, to accommodate IoT, digital transformations, and other efforts that are driving the need for more compute power. In each one, they\u2019re also connecting previously unconnected devices, only adding to the potential attack surface.<\/p>\n<p>Clearly there\u2019s a growing need for tools that make it easier to manage power and cooling network security from the data center to the edge, without requiring scarce security experts to do the heavy lifting. Companies need a way to quickly determine whether devices need firmware updates to get the latest security patches, or if they\u2019re not configured properly, such as using the HTTP protocol instead of the secure HTTPS or Telnet vs. SSH. Some devices may be so old they don\u2019t support secure communications protocols and simply need to be replaced.<\/p>\n<h2>EcoStruxure<sup><img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/12.0.0-1\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/><\/sup> IT Expert Offers a New Device Security Vulnerability Assessment<\/h2>\n<p>Schneider Electric is working to fill the void with <a href=\"https:\/\/www.prnewswire.com\/news-releases\/schneider-electric-solves-edge-computing-challenges-with-new-6u-wall-mount-ecostruxure-micro-data-center-300929511.html\" target=\"_blank\" rel=\"noopener noreferrer\">a new security assessment <\/a>offering as part of its <a href=\"https:\/\/ecostruxureit.com\/ecostruxure-it-expert\/\" target=\"_blank\" rel=\"noopener noreferrer\">EcoStruxure IT Expert<\/a> platform. IT Expert is a next-generation DCIM software leveraging cloud-based technologies to monitor data center infrastructure and collect data to drive applications, including preventive maintenance.<\/p>\n<p>The new security monitoring feature enables customers to assess the status of infrastructure devices for all kinds of data center infrastructure \u2014 UPSs, PDUs, and in-row cooling systems. The assessment will alert you to configuration errors that can cause potential security vulnerabilities, if firmware is out of date, and whether devices are too old to support modern security best-practices and should be replaced. This assessment can uncover issues that may have previously been unknown. For example, David Radszuweit, CEO Linespotting AB, a pilot customer of the assessment shared, \u201cEven if I know what I am doing and do it pretty well after 25 years, I found security issues on my devices that I didn\u2019t think existed. It was a real eye opener.\u201d<\/p>\n<h2>Start Your Free Trial<\/h2>\n<p>Complacency is no answer in the face of the very real security threats that IoT devices present. You need to take action to protect your data centers, and your company. <a href=\"https:\/\/ecostruxureit.com\/ecostruxure-it-expert\/\" target=\"_blank\" rel=\"noopener noreferrer\">Click here<\/a> for your free trial of the EcoStruxure IT Expert monitoring software and its new assessment to start countering security threats now.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.se.com\/datacenter\/dcim\/2019\/10\/31\/how-to-prevent-edge-computing-security-risks-connected-world\/\">How to Prevent Edge Computing Security Risks in a Connected World<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.se.com\">Schneider Electric Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.se.com\/datacenter\/dcim\/2019\/10\/31\/how-to-prevent-edge-computing-security-risks-connected-world\/\" target=\"bwo\" >http:\/\/blog.schneider-electric.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Steven Brown| Date: Thu, 31 Oct 2019 15:53:15 +0000<\/strong><\/p>\n<p>Edge computing sites are cropping up all over, driven in large part by Internet of Things (IoT) technology and digital transformation efforts that are generating enormous amounts of data that&#8230;  <a href=\"https:\/\/blog.se.com\/datacenter\/dcim\/2019\/10\/31\/how-to-prevent-edge-computing-security-risks-connected-world\/\" title=\"ReadHow to Prevent Edge Computing Security Risks in a Connected World\">Read more &#187;<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.se.com\/datacenter\/dcim\/2019\/10\/31\/how-to-prevent-edge-computing-security-risks-connected-world\/\">How to Prevent Edge Computing Security Risks in a Connected World<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.se.com\">Schneider Electric Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[12389,12388],"tags":[12608,12391,12401,22566,12395,18818,23325,23229],"class_list":["post-16741","post","type-post","status-publish","format-standard","hentry","category-scadaics","category-schneider","tag-cyber-security","tag-data-center","tag-dcim","tag-ecostruxure-it-expert","tag-edge-computing","tag-it-infrastructure-management","tag-network-management-cards","tag-next-generation-dcim"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16741","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16741"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16741\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16741"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16741"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}