Cyber attacks and huge ransomware payments are making headlines. The growing complexity of deployed edge software and the necessity to tie it into a plethora of back-office systems is causing IT professionals to lose sleep. Since it’s hard to say no to new software applications, our advice is to not trust it. Instead, lock down your hardware so your IT staff can boot out or patch misbehaving software at any moment.
How is such a thing possible if edge nodes are remote and hard to get to? The KEY (literally and figuratively) is to apply a TLS lock around the whole box, and give the key only to your IT staff. This approach mimics cloud-native virtualization for application deployment, but enables secure control even in the field, on edge hardware. This talk shows how project EVE applies a security paradigm that lets IT professionals sleep peacefully, while not limiting the choices and flexibility (e.g, deploying MQTT + Sparkplug) required by edge application developers.