Making the Edge Tamper-Proof: Security Challenges and Solutions in Edge Computing
LF Networking via YouTube
Overview
Learn critical edge computing security strategies in this 34-minute conference talk from Erik Nordmark of ZEDEDA. Explore unique security challenges faced in edge computing environments compared to traditional datacenters, focusing on physical access vulnerabilities and supply chain integrity. Discover practical solutions for protecting edge devices from firmware and software attacks, maintaining security with unreliable network connections, and implementing effective supply chain attack prevention. Gain valuable insights from real-world deployments across industries like oil and gas and automotive retail, while understanding how Linux Foundation's EVE-OS specifically addresses edge computing security risks. Master essential security considerations through detailed examination of measured boot remote stations, content inspection proxies, and the three-layer security model, along with guidance on evaluating hardware suppliers and implementing application security measures.
Syllabus
Introduction
Challenges
Oil and Gas
Car Dealers
Security
Project Eve
Tools
Content inspecting proxies
Different perspectives
The three layers
Measured boot remote station
Project summary
Security considerations
Application considerations
App security
Taught by
LF Networking