First published: 15 Oct 2025
Last updated: 15 Oct 2025

Content written for

Small & medium business
Large organisations & infrastructure
Government

Malicious actors continue to target internet-facing network devices as entry points into organisational networks. Once inside, they can exploit internal network infrastructure to move laterally, maintain persistence and exfiltrate data.

A single exposed management interface or unpatched VPN can provide a path into internal networks. Failing to secure these devices exposes organisations to the risk of compromise by malicious actors who bypass traditional network monitoring efforts and network defences. This can result in significant monetary loss, regulatory consequences, reputational damage and business disruptions.

This guidance supports executive and technical staff of medium-to-large organisations and government entities to strengthen their organisations network infrastructure. It complements existing guidance for securing edge devices by extending mitigations across the wider network environment, includes core routing, switching and intermediary network components.

This guidance provides two case studies, a set of actions for network defence, and questions to continue the conversation, including assurance questions for executives and validation checks for technical staff.

Find out more.

Was this helpful?
Yes this was helpful
No this was not helpful

Thanks for your feedback!

We welcome additional feedback below.

Was this information easy to understand?
Will you take action after reading this?
Did you find the information you were looking for?
Did the design and layout of this page meet your expectations?