Perimeter Security

Perimeter security is an integral part of cybersecurity frameworks. Standards like ISO27001 and Cyber Essentials help organisations to secure their networks. Perimeter security focuses on controlling connections between network devices. We call these “edge connections”. These are distinct from end-point device connections (often called access ports).

“Securing all edge connections is crucial. Without them, unauthorised users could gain access to systems and data, potentially leading to a breach. Perimeter security is also important in the fight against malware, as infections are easily transmitted across unsecured network perimeter connections. It’s this behaviour that made the WannaCry ransomware outbreak so prolific.”

What do the Security standards say?

Perimeter security is an integral part of cybersecurity frameworks. Perimeter security focuses on controlling connections between network devices. We call these “edge connections”. These are distinct from end-point device connections (often called access ports).

The table below provides some cross references to network and perimeter security and some of the standards

Sub category Framework reference
PR.AC-5: Network integrity is protected (e.g., network segregation, network segmentation) CIS CSC 9, 14, 15, 18
COBIT 5 DSS01.05, DSS05.02
ISA 62443-2-1:2009 4.3.3.4
ISA 62443-3-3:2013 SR 3.1, SR 3.8
ISO/IEC 27001:2013 A.13.1.1, A.13.1.3, A.13.2.1, A.14.1.2, A.14.1.3
NIST SP 800-53 Rev. 4 AC-4, AC-10, SC-7

How it works

Rebasoft’s perimeter security algorithms work automatically. They examine your network devices settings to identify network edges. They automatically identify connections to known network devices and approve them for you. Any unknown connections are highlighted.

The beauty of Rebasoft’s perimeter security is that the process is continuous. It can help you prevent shadow IT or rogue Wi-Fi attaching to your infrastructure.

or

Request demo