“Securing all edge connections is crucial. Without them, unauthorised users could gain access to systems and data, potentially leading to a breach. Perimeter security is also important in the fight against malware, as infections are easily transmitted across unsecured network perimeter connections. It’s this behaviour that made the WannaCry ransomware outbreak so prolific.”
What the standards say
Perimeter security is an integral part of cybersecurity frameworks. Perimeter security focuses on controlling connections between network devices. We call these “edge connections”. These are distinct from end-point device connections (often called access ports).
The table below provides some cross references to network and perimeter security and some of the standards
Sub category | Framework reference |
---|---|
PR.AC-5: Network integrity is protected (e.g., network segregation, network segmentation) | CIS CSC 9, 14, 15, 18 |
COBIT 5 DSS01.05, DSS05.02 | |
ISA 62443-2-1:2009 4.3.3.4 | |
ISA 62443-3-3:2013 SR 3.1, SR 3.8 | |
ISO/IEC 27001:2013 A.13.1.1, A.13.1.3, A.13.2.1, A.14.1.2, A.14.1.3 | |
NIST SP 800-53 Rev. 4 AC-4, AC-10, SC-7 |
How it works
Rebasoft’s perimeter security algorithms work automatically. They examine your network devices settings to identify network edges. They automatically identify connections to known network devices and approve them for you. Any unknown connections are highlighted.
The beauty of Rebasoft’s perimeter security is that the process is continuous. It can help you prevent shadow IT or rogue Wi-Fi attaching to your infrastructure.