Enforcing edge security
Your edge devices are computers. A lot of the things that apply to VMs apply to the computers that you will be setting up and deploying. However, you will not have the support of the cloud providers when you set up your edge devices, so you need to take care of everything yourself.
Operating system
The choice of the operating system that you install on your edge device is critical. You will want to avoid bleeding-edge and beta software. If possible, go for long-term support (LTS) variants of any operating system. Also, consider operating systems that will only run signed software. This will ensure that the computer will not run malicious software. One example of this is Ubuntu Core, which is designed for embedded applications and optimized for security.
Login and access control
Your computer can be accessed physically, so you want to ensure that bad actors can’t brute-force their way onto the computer. The way to avoid this is by disabling...