The most popular and comprehensive Open Source ECM platform
Cybersecurity Mesh: Scaling Security Controls Across Distributed Assets
Gartner has identified Cybersecurity Mesh as a top trend for security in 2022. The idea is that rather than enforce only one security perimeter around the complete IT environment, each device in the environment has its own security structure, complete with firewalls and network protection.
The idea of a mesh is driven by the growth of distributed applications like microservices and blockchain. Ruggero Contu, Gartner analyst, described the cybersecurity mesh as “pluggable, composable tools that can be plugged anywhere into the mesh.”
Niel Harper, a chief information security officer and ISACA board director, said that “the increase in remote access to on-premises data centers and cloud resources is driving the need for a flexible, composable architecture that integrates widely distributed and disparate security services. The goal would be to move perimeters encapsulating data centers to also creating perimeters around identities and objects that are not on-premises or on the same network — specifically, users accessing objects from anywhere, anytime and with a variety of device form factors. It also enables organizations to bring cloud services into their zero trust architecture and employ adaptive access control with more granular analyses of both subjects and objects.”
There are four layers that make up a Cybersecurity Mesh:
- Security Analytics – Make use of historical security events and incorporate that information into future actions
- Distributed Identify Fabric – Uses decentralized identify and directory services
- Consolidated Policy Management – Centralizes the tool policies from all security frameworks used
- Consolidated Dashboard – A central point for managing the entire security ecosystem