Cloud Edge computing use cases range from IoT to VR/AR and any widely distributed application in between. However, taking OpenStack out of the data center requires an entirely new approach to security when there is far less ability to restrict access and often the applications require a shared tenant model. Some of the factors that need to be considered include:
- More stringent requirements for infrastructure software (code/design) in exposed environments
- New ways of thinking about RBAC at the control interfaces
- Conflicts arising from shared ownership and divided responsibilities for devices/systems/applications
- Managing lifecycle operations and deployments over insecure WAN connections
- Different ways of looking at tenant spaces in remote locations
- Imposing network/compute/storage/memory separation from the underlying virtualization/hardware components
- Managing security over intermittent WAN connections
- Securing semi-autonomous and self-managed locations
During this session you will learn how security must be incorporated into Cloud Edge architectures and the some best practices for doing it.
- What security standards apply and how does that affect your system and applications?
- How different architectures affect security: hierarchical, matrixes, widely distributed, or mesh.
- How to incorporate and manage security across hundreds or thousands of nodes
- How node location affects security and fit for each use case.
- Deployment considerations
- Minimizing the issues related to exposed environments
- How to address the complex vendor integration, product orchestration, service delivery and scale requirements
- Leveraging vendors to increase security, reduce footprints without compromising performance and usability
- Security requirements for specialized workload such as IOT/AI/ML/AR/VR/NFV
- Can containerized workloads be properly secured in a distributed environment
- How to secure tenant space on remote nodes
- Protection against DDoS attacks