Website Maintenance Announcement – September 19–21
Activities begin at 6:00 PM CT on Friday, September 19 and continue through Sunday, September 21.
During this time, Product and My Product List functionality will be unavailable
Website Maintenance Announcement – September 19–21
Activities begin at 6:00 PM CT on Friday, September 19 and continue through Sunday, September 21.
During this time, Product and My Product List functionality will be unavailable
CommScope understands the challenges our government clients face, and we have compiled this list of top network security trends to expect for 2021.
As we say good riddance to 2020, a year which some say was “the worst year in cybersecurity history,” we say hello to 2021 – with its continued work from home restrictions and the requirement to formalize mitigation strategies regarding agencies’ use of compromised monitoring software. CommScope understands the challenges our government clients face, and we have compiled this list of top network security trends to expect for 2021. Some items listed below are new solutions to old problems (#2 and 3), some are old solutions to new problems (#4), and there may even be a couple new solutions to new problems (#1 and 5).
While the Wi-Fi 6 (or 802.11AX) certification was finalized by the Wi-Fi Alliance in September 2019, this compelling technology is currently seeing a surge in growth as users start to demand higher throughput, longer battery life, and increased capacity. In Q3 2020, worldwide smartphone sales approached 367 million units sold—most of which are now Wi-Fi 6 capable. Although Wi-Fi 6 is markedly more efficient, there are three key security trends associated with the growth of these new devices:
No list of 2021 predictions would be complete without security analysts noting the potential difficulties agencies will have continuing to support a remote workforce. Agencies have experienced VPN vulnerabilities caused by user tampering and poor configurations, as well as other issues with segmentation, scaling, and setting-up multicast. 2021 will see networking vendors push their VPN alternatives including SD-WAN and/or encrypted GRE tunneling options to provide comprehensive solutions that may mitigate VPN security challenges.
With the Pentagon recently relaxing regulations allowing DoD civilians to telework, federal agencies will require solutions which provide split-tunneling options for some user accounts and disabled split-tunneling for other accounts. Moreover, there will be requirements for employees to update their ill-protected home gateway routers that have poor QoS and low bandwidth, creating challenging latency issues on team calls. Simultaneously, federal employees will be requesting gateway upgrades that provide better coverage for their wired and wireless devices as well as an easier experience accessing internal files – so that logging on at-home is as seamless as what they experience in the office. Finally, despite funds being allocated for VPN connectivity solutions, procurement offices will be looking for alternative fixed-pricing options that are cost-effective and scale to their agency’s needs rather than relying on expensive and complicated subscription services.
The Internet of Things (IoT) is an ambiguous term most closely associated with either smart home devices or a Wireless Sensor Network; however, in the same way that most smartphone companies standardized on USB-C, most infrastructure equipment is now moving to Cat 6A cabling over TCP/IP. These “things” which had not traditionally been Internet-connected, are notable for having low data flows and high PoE budgets, while not utilizing FIPS-validated encryption.
This will continue to be an important trend as agencies upgrade systems to include these additional IoT devices. Proper planning will have to include more than just PoE budgets and IP schemes. Agencies must be aware of the new risks associated with headless devices including DDoS, sniffing, and vectoring attacks. Agencies will look for technologies capable of securing headless devices by dynamically assigning pre-configured VLANs and appropriate ACLs to effectively segment and safeguard all IoT devices – both wired and wireless.
This topic is also of interest to us this year because of H.R. 1668 becoming a law on December 4, 2020, requiring NIST “to develop and publish standards and guidelines for the federal government on the appropriate use and management by agencies of IoT devices” by mid-year 2021 (see more here: https://www.congress.gov/bill/116th-congress/house-bill/1668).
While Wi-Fi 6 receives a great deal of attention, it is important to note that Private LTE, or CBRS – which utilizes the 3.55-3.70 GHz spectrum – is a favorite of many agencies who require a more secure form of on-site wireless connectivity. Projections indicate that up to 90% of smartphones will be CBRS compatible by 2023; correspondingly, vendors of CBRS access points (called CBSDs) will start to position the technology in certain environments as an alternative to Wi-Fi in 2021. Along with the security advantages of LTE, CBRS requires that devices be “lightly licensed” and that the Spectrum Access System (SAS) monitors spectrum to ensure there is no harmful interference. These requirements reduce the security risks associated with unlicensed spectrum (Wi-Fi) such as Evil Twin Attacks, Man-in-the-Middle Attacks, Rogue APs, Rogue Clients, and Wardriving. CBRS can be seen as Wi-Fi managed like LTE, or as LTE at the price point of a Wi-Fi network, and will give agencies a reliable QoS path with minimal interference for critical applications.
Before the term Zero Trust Architecture (ZTA) gets hijacked to refer to a specific company or product, it’s important for network engineers to understand that ZTA is a NIST-defined strategy, oftentimes involving multiple interconnected system components. Fundamentally, ZTA necessitates that every network connection be verified and validated properly and access to resources is dynamic and granted on a per-session basis. In a ZTA, all users and all actions are treated as malicious. In 2021 and beyond, it will be important to ask how vendors help your agency network accomplish a ZTA, including:
CommScope will be publishing a White Paper and Best Practice Design Guide on ZTA later this year, so stay tuned!
Have you experienced challenges implementing your Work-From-Home solution? Or are you interested in learning about how RUCKUS fits into your 2021 Zero Trust objectives? If so, please contact your CommScope sales representative today.