Member-only story
Securing Distributed Computing
Cloud or Decentralized …
Simplify
Simplify and unify GRIC throughout the organization. The optimal way to communicate is to commune the security culture. Normalize vigilance as part of the human behavior. Ensure human exhaustion and exasperation does not become the weakness of the cause. Ensure operational and systematic complexity do not creep into the organization as the threat.
Clarify
In the context of borderless and multi-heterogeneous environments, ensure clarity of precise security boundaries, perimeters and parameters. It has to be clearly defined and understood. To comprehend the enterprise attack surfaces, it’s crucial to define and familiarize oneself with the boundaries and accessible entry points.
To identify, there has to be mechanisms to tag, track and trace. The clarity is on visibility and observability.
Mechanisms for Identification and Tracking: Identification requires the implementation of effective mechanisms for tagging, tracking, and tracing. The emphasis here is on enhancing visibility and observability. This can be achieved by logging all resource access requests, including those related to WiFi, while also ensuring that sharing functionalities are deactivated. Additionally, the scanning of access services…