Zero Trust or as close as you can get
In this section, we will discuss common and emerging practices to secure the application’s use of the network, and what really matters. We will review major aspects of a Zero Trust architecture in the context of edge computing. By the end, you will be able to describe the approaches, what potential benefits they bring, and when they might be useful to your edge architectures.
Let’s begin with the basics and discuss handling secrets. It can be surprising how often this discipline is overlooked or ignored, yet proper implementation is critical to prevent unauthorized access.
Managing secrets on the edge
Software development teams should not only be trained in how to securely connect applications to remote services but they should also be provided with edge-native solutions to enable them to properly manage the credentials, API keys, certificates, and other secrets. While some tools such as GitHub provide built-in secrets management...