You know the feeling. The business is hard with a new initiative that has to go live NOW ! But in the rush to get this deployed, are you creating a new headache ? What is your plan when you hear the deployment is at the “edge” of your network ?
Edge computing pushes applications, data and computing power (services) away from centralized points to the logical extremes of a network. Edge computing takes advantage of micro services architectures to allow some portion of applications to be moved to the edge of the network. While Content Delivery Networks have moved fragments of information across distributed networks of servers and data stores, which may spread over a vast area, Edge Computing moves fragments of application logic out to the edge. As a technological paradigm, edge computing may be architecturally organized as peer-to-peer computing, autonomic (self-healing) computing, grid computing, and by other names implying non-centralized availability.
To ensure acceptable performance of widely dispersed distributed services, large organizations typically implement edge computing by deploying server farms with clustering and large scale storage networks. Previously available only to very large corporate and government organizations, edge computing has disseminated technology advances and cost reductions from large-scale implementations and made the technology available to small and medium-sized businesses.Small, low-cost cluster hardware and freely-available cluster management software have increased accessibility. (Source: Wikipedia)
Robotics, immersive reality, artificial intelligence, and connected devices are bringing a new level of technological sophistication to the physical world. But businesses that assume their existing IT infrastructures will support these systems without added risk do so at their peril.
Enabling intelligence for the next generation of technology demands an overhaul of existing IT infrastructures. A balance of cloud and edge computing along with a renewed focused on hardware can help companies deliver intelligence everywhere.
The onset of the IoT, and other localized systems and networks used in remote facilities and users areas creates a new risk zone in your network:the edge. Corporate IT is increasingly disenfranchised in the rush by non-IT staff to deploy and manage networks and devices in this area,, with the end result that not every end device is logged and accounted for in risk controls.Even if an asset management software package is used, this often requires manual update, and this is bypassed in the rush to go-live.
Rather than create an adversarial relationship between the business and IT, this is in fact an opportunity to strengthen relations by acting in a security conscious way, by giving the business tools and procedures that don’t impeded their rapid progress, but setup new services in a risk controlled manner.
New technology should ideally link into a zero trust network, where security protections already exist. Since the network is established, IT doesn’t need to confront end users and end users can self-enable their technology. IT can also issue security policies and tool kits that can self-enable end user security. There must also be a focus on any unpatched operating systems, and how the expanded network conforms with existing DR planning.
Across industries, the next generation of intelligent solutions are moving into physical environments. Improving traffic flows in smart cities, telemedicine that continuously analyzes a patient’s condition, and disaster analysis that prevents oil field catastrophes before they start are all possible with intelligent solutions. IT Infrastructures need to be developed to reach into the dynamic physical environments they want to serve–and it needs to happen now.
TIPS TO ENSURE EDGE COMPUTING SECURITY
- Determine what is in your network – Discover every IoT device in your network. If you don’t know if something exists, you can’t protect against it. Most companies don’t even know what’s on their networks anymore. Just understanding what’s on a network and what they do is probably the most important thing a company can do. Remember, early detection is better than cure.
- Make a Profile of Every Device – It is important to understand the behavior and interactions in every device. Gather necessary information in each device.
- Ensure a high strength password – Make sure to change or update IoT devices’ passwords. Unchanged default passwords are prone to Cyber criminals.
- Have a good knowledge of where data is stored– Carefully track your data and keep it stored safely. It is important to secure your data in a storage which you can easily track but also well defended from hackers.
For edge computing, especially for sensitive workloads, the scope has to be ramped up. When faced with a large number of devices, in remote locations, with different levels of control, there is only one thing for companies to do: assume that the edge devices are compromised. Once you make that assumption, it changes how these devices are allowed to connect to the data center, and what access they are granted. Think Security. Think Ahead.