Secure Your Edge for NIS2 Directive Compliance: Mission Possible!

Complete Asset Discovery – The Missing Link to Effective Edge Security

Challenge Introduction

As was discussed in the Elimination of Edge Network Vulnerabilities—Mission Impossible?, the network perimeter can pose distinct challenges to many centralized or agent-based cybersecurity solutions related to:

  • Incomplete device, endpoint, or infrastructure discovery
  • Restricted deployment to headless endpoints or devices

The resulting degraded security visibility can result in assets with vulnerabilities going undetected and corresponding weaknesses open to exploit by threat actors. Cybersecurity professionals need much more than “dead reckoning” to keep ahead of the many bad actors in the world.

The Four-Steps to Overcoming the Obstacles

Step #1 – Complete Asset Discovery (Inventory)

An effective, ongoing, and comprehensive discovery (inventorying) process can overcome these blind spots in your cybersecurity defenses. This task is often the responsibility of the network team. There are many techniques, individually or in combination that can be used here. Examples include:

ActionDescription
ARP SweepUsed within local networks to map IP addresses to MAC addresses. Sends ARP requests to all possible IPs in the subnet to discover devices.
Ping SweepSends ICMP Echo Requests to a range of IP addresses and collects replies. Used to identify active devices on the network.
SNMPQueries network devices for information using SNMP agents. Useful for retrieving device details like hostnames, IPs, and hardware information.
DNS QueryQuery DNS servers to resolve hostnames to IP addresses. Use reverse DNS lookups to discover hostnames.
mDNS QueryUsed in local networks for name resolution without a central DNS server. Multicast queries to discover services and devices (e.g., printers, smart devices).

Worth mentioning is the inherent advantages that come with connecting directly on the local edge network, rather than from a centralized (often remote) location. It is this vantage point that is best suited for optimal situational awareness in the network edge. Typically, these tools are portable and can quickly connect anywhere on the edge both physically and wirelessly.

Steps 2, 3 and 4, described below should really be conducted in parallel.

Step #2 – Perform a Cybersecurity Vulnerability Assessment

Now that assets have been fully inventoried, the next step is to apply various tests to these devices, endpoints, and infrastructure. This includes examining switch ports for proper provisioning, confirming proper VLAN segmentation, checking acceptable wireless security authentication, and scanning for known vulnerabilities among many others. It is best to work closely with the security operations team to develop a process or workflow to ensure all possible exposures are addressed. Here is an excellent blog that can help: How to perform a cybersecurity assessment.

Step #3 – Integration with Other Vulnerability Activities

Whatever tools are used in Step 1 and 2 above, it is ideal if these activities and subsequent results be incorporated into other security efforts. Examples here include vulnerability management and testing, network management, and endpoint monitoring platforms. This being the case, be sure to seek offerings that make such integration simple.

In addition, it’s crucial—if applicable—to ensure results are incorporated into any organizational-wide initiatives such as those related to implementing NIS2 or CIS Critical Controls.

Step #4 – Network and Security Team Collaboration

It should be evident by this point that to achieve the most robust edge security posture, that those responsible for edge network management and security work closely together. If the duties are delegated to separate groups, the network team is often best positioned within the organization with knowledge of perimeter architecture details as well as current tactical status of the resources. In this scenario, they can provide a critical, unique “see the edge, from the edge” perspective.

In contrast, security staff are typically more well-versed with topics related to vulnerabilities and countermeasures.

Here is a summary of each group’s role in this important effort and the upside of partnering:

ChallengeNetOps RoleSecOps RoleCollaboration Outcome
Visibility and MonitoringEnsure network health and uptimeIdentify and mitigate security threatsComprehensive monitoring and control at the edge
Threat MitigationConfigure edge devices securelyImplement threat mitigation toolsReduced risk of edge-based attacks
Incident ResponseProvide network-level insightsInvestigate and address security incidentsFaster, more accurate response
Zero Trust ImplementationDeploy and validate network segmentation and policiesDefine and enforce least privilege accessSeamless integration of zero trust at the edge
ComplianceImplement technical controlsEnsure regulatory adherenceLower risk of fines and legal issues

Summary

Even though most organizations utilize a number of advanced security solutions, there are certain situations where gaps may exist because of undiscovered devices, endpoints, and infrastructure.

Hence, it is critical that all network assets, especially at the edge are one hundred percent accounted for to ensure IT resources are fully protected against cybersecurity threats.

If you are doing this research to comply with NIS2, our handy guide CyberScope Addresses Three Critical NIS2 Measures at the Challenging Edge will provide you with valuable insights (even if your organization is not located within the European Union).

Ultimately, whatever tools are deployed must effectively address the unique challenges at the dynamic network edge – including those less obvious gaps.

NIS2
Author Bio –
Product Manager – Wired

As a Product Manager at NetAlly, Brad Reinboldt is responsible for wired and cybersecurity solutions. He has more than 30 years’ of experience in the computing, networking, and storage sectors in various development and technical management roles. He holds a master’s degree in electrical engineering as well as an MBA in management.

CyberScope®

Edge Network Vulnerability Scanner

CyberScope empowers you to quickly discover, identify, and test edge infrastructure and IoT, OT, and ICS devices, wired (Ethernet/Fiber) and WiFi networks, then assess cybersecurity posture against policies, generate reports and perform ongoing monitoring—all without deploying agents.

CyberScope® Air

WiFi Vulnerability Scanner & Tester

CyberScope Air enables SecOps or NetOps teams to discover, validate, and scan edge infrastructure and IoT, OT, and ICS devices whether WiFi or Bluetooth/BLE. Assessing cybersecurity posture of WLANs against policies, generating reports, and performing ongoing monitoring for changes has never been easier.

More Posts