Page 122 - Cyber Defense eMagazine October 2023
P. 122
The endpoint and IAM are key to addressing security concerns in light of the continuing hybrid
environment: hybrid workers and hybrid cloud usage. More surfaces to attack and a diversity of devices,
locations, and level of security awareness on the part of remote workers all add up to more risk of a data
breach, reputational damage to the organization and costly downtime.
Data Security Begins with a more Secure Operating system on the Endpoint
Protecting this mixed universe of devices, remote work, and hybrid cloud deployments starts at the
interface between the user and the access device, specifically the endpoint. Enterprises are finding that
purpose built, security focused Linux based operating systems to be the endpoint OS of choice. It’s
designed with a lightweight, small modular footprint, is read only, and contains no persistent user profile.
Its firmware files can be encrypted and partitioned to ensure the OS cannot be tampered with or modified
by malicious applications or extensions. This is accomplished via a full chain of trust from the hardware
to OS, all the way to the application layer, making it tamper-proof and inaccessible by ransomware. It
also allows for unmounted encrypted backup partitions that aid in rapid recovery in the event of an
unauthorized change to the OS.
Since the OS operates independently of applications or services, it further reduces the attack surface by
delivering only what is required for the usage model and removing anything unnecessary. A secure Linux
OS supports local applications, hybrid cloud environments and virtualization platforms, including AVD,
AWS, Citrix, VMware, and cloud workspaces as well as SaaS and DaaS services. It also offers IT
efficiency by enabling over-the-air updates and patching, saving valuable IT staff time, and ensuring
patches are deployed consistently across the enterprise. In this model, if a device has internet access,
it is part of the enterprise and fully managed and controlled.
A secure Linux-based edge OS provides flexibility and security attributes that are driving global growth
from an estimated $6.27 billion in 2022 to $22.15 billion by 2029, a CAGR of 19.8%, according to Fortune
Business Insights.
Mitigating Risk and Disruption via Cloud Workloads
Minimizing attack surfaces, in addition to a secure Linux OS, requires moving applications and data off
endpoint devices and storing them in the cloud. Every data file does not need to reside in the cloud, but
any sensitive data related to critical business operations, and to employees being as productive as
possible, should live in the cloud.
Should an attack occur, employees will be able to continue work by accessing their files from the cloud,
further ensuring business continuity.
Cyber Defense eMagazine – October 2023 Edition 122
Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.