Star Lab discusses Zero Trust Security for Embedded Devices in Forbes
Washington, DC, June 6, 2022 — Today, with the growing prevalence of the cloud, and the growing rate of remote work, traditional and trusted perimeters do not exist. We must shift away from “trust but verify” towards “never trust, always verify.” The only question that remains is how to get there.
To assume that the attacker is already in our system, it is important to use a layered defense method against malicious or unintentional modifications, both of which can jeopardize the system’s security and functionality. Such a method can take the following forms:
Allowlisting
Kernel Configuration Hardening
System Call Filtering
Read the full article here.