Upgrade to Pro — share decks privately, control downloads, hide ads and more …

How to Secure Edge Compute

How to Secure Edge Compute

In this talk, I share lessons learned about protecting edge compute, and why the focus must be squarely on process and people.

This version of the talk was given at devopsdays Vilnius in September 2023.

Kerim Satirli

September 07, 2023

More Decks by Kerim Satirli

Other Decks in Technology

Transcript

  1. edge com·put·ing noun computing that takes place at or near

    the physical location of the producer or consumer of data. point of presence mobile datacenter Similar:
  2. Challenges trackers must be easy to enroll trackers can break

    rogue trackers lead to bad data trackers identify people
  3. Challenges instances must be easy to enroll instances can break

    rogue instances lead to bad data instances identify services
  4. Off-shore Challenge: Enrollment On-shore ▪ establish trust between network and

    device ▪ ensure device works ▪ disable (without removing) device in network gateway ▪ establish allowlist ▪ re-enable previously activated device ▪ ensure device works
  5. mutual TLS for gateway-to-cloud transform sanitized data to make it

    actionable inspect payload for rogue tracker data Ingress Protection