Anastasiya Novikava
Copywriter
Anastasiya believes cybersecurity should be easy to understand. She is particularly interested in studying nation-state cyber-attacks. Outside of work, she enjoys history, 1930s screwball comedies, and Eurodance music.
Hybrid working practices pose significant security challenges to IT departments. Endpoint security and its access rules to internal resources are essential, but it can also be challenging to set up effectively. Failure to do so severely limits endpoint visibility in the network and prevents from setting up company-wide security policies.
Network administrators are working with limited information about who’s connecting and making assumptions about the trustworthiness of the new joining devices. As the device number is growing exponentially and with employees connecting from personal and company-owned tools, this is a true puzzle.
Let’s look at how network administrators establish trust rules when managing company networks and how NordLayer can help.
The key problem is that device states change constantly — the same device could be secure or vulnerable based on different factors. The software setup could be identical, but the configurations might be different, which could make a distinction between trusted and untrusted states. Not to mention other problems like different resources requiring different security standards.
For this reason, it can be useful to consider several device trust states that could be attributed to any device.
Paradoxically, trust doesn’t mean that the device doesn’t have any vulnerabilities or is perfectly secure. It means that the device is known or recognized by the organization’s administrator. For instance, if an organization issued its own pre-configured devices, the device would be safe to allow into the network.
However, there can be a wide variety of trust conditions applied to your devices. In some cases, they may only have a password, while in others, the checks could be much more intricate to make the systems harder to penetrate.
Some devices will fall outside the stated entry requirements when processing device posture checks. These can be classified as untrusted, which is also, by default, assigned to all incoming connections under the Zero Trust framework. This assumes that a device could pose risks of diverse nature, which should be taken into account. Often, when the security risks aren’t known, this also warrants flagging a device under an untrusted state.
Performing device posture checks on all connecting devices allows clearer visibility of the company’s network. This also can act as a reliable inspection point blocking potentially problematic devices that could serve as launchpads for hacking attempts.
A well-rounded security posture can prevent threats before they cause any damage to important infrastructure resources. This is made possible by the fact that device posture checks help to enforce security policy rules. For instance, your account can’t be accessed if two-factor authentication isn’t enabled. This helps a great deal when securing large companies that use various managed and unmanaged devices.
Administrators and logs can enable the Device Posture Monitoring feature to determine whether the connecting device complies with the predefined security rules.
Currently, the feature checks:
It’s also possible to set up additional checks like:
The feature significantly expands the possibilities of what network administrators are capable to achieve by using NordLayer.
Device Posture Monitoring makes it easier for network administrators to keep their finger on the pulse regarding network security. The new feature alerts about unknown or non-compliant devices connecting to the network. The administrator can inspect a full list of unidentified or non-compliant devices and plan accordingly on how to deal with them.
They are also given a report of how many non-compliant devices were connected during a specific period. This allows administrators to draw certain conclusions about the scope of the risks associated with unmanaged endpoints.
Device Posture Monitoring captures various data from connecting devices. NordLayer aggregates this data and presents it in a digestible form to help network administrators to make a better-informed decision to protect the integrity of your organization’s network security. The feature supplements your currently used application access control lists. Various rules help keep strong entry boundaries to deter and increase the connected device’s visibility of the organization’s IT assets.
Administrators can only enable Device Posture Monitoring. Here’s how it can be done.
Keep in mind that if you want to disable one of the enforced rules, the profile which was applied before disabling will be saved. This means that previously saved profiles will be automatically turned on.
Subscribe to our blog updates for in-depth perspectives on cybersecurity.