Operational security
As your IT team/OT manages day 1 provisioning and deployment tasks based on the architecture and plans defined during day 0, let’s address operational security issues from both a planning and process perspective, with emphasis on aspects that may be unique to edge computing. In this section, we’ll discuss limiting access in all layers of the architecture, how that applies to automation, and an example based on the concept of the Tactical Edge. As you read through this section, consider creating a custom checklist containing the items and considerations that apply to your specific architecture deployment scenario and then review it with the staff that will be working on the deployment.
Limiting physical access
When it comes to regional deployments at the service provider edge, most access to equipment is managed by the facility staff and infrastructure. But when it comes to field deployments at the user edge, there can be little to no consistency...