Star Lab discusses Zero Trust Security for Embedded Devices in Forbes

Washington, DC, June 6, 2022 — Today, with the growing prevalence of the cloud, and the growing rate of remote work, traditional and trusted perimeters do not exist. We must shift away from “trust but verify” towards “never trust, always verify.” The only question that remains is how to get there.

To assume that the attacker is already in our system, it is important to use a layered defense method against malicious or unintentional modifications, both of which can jeopardize the system’s security and functionality. Such a method can take the following forms:

  1. Allowlisting

  2. Kernel Configuration Hardening

  3. System Call Filtering

Read the full article here.

Jessica Starkey