Malicious actors continue to target internet-facing network devices as entry points into organisational networks. Once inside, they can exploit internal network infrastructure to move laterally, maintain persistence and exfiltrate data.
A single exposed management interface or unpatched VPN can provide a path into internal networks. Failing to secure these devices exposes organisations to the risk of compromise by malicious actors who bypass traditional network monitoring efforts and network defences. This can result in significant monetary loss, regulatory consequences, reputational damage and business disruptions.
This guidance supports executive and technical staff of medium-to-large organisations and government entities to strengthen their organisations network infrastructure. It complements existing guidance for securing edge devices by extending mitigations across the wider network environment, includes core routing, switching and intermediary network components.
This guidance provides two case studies, a set of actions for network defence, and questions to continue the conversation, including assurance questions for executives and validation checks for technical staff.