Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

IoT Security: The EdgeX Advantage

It’s the best of the internet of things and the worst of the internet of things: unprecedented connectivity that creates both tremendous opportunity and considerable risk. In an environment extending from sensors and devices at the network edge to applications and services in the cloud, an end-to-end IoT ecosystem is essential to realizing opportunity without risking security, manageability and interoperability.

It’s the best of the internet of things and the worst of the internet of things: unprecedented connectivity that creates both tremendous opportunity and considerable risk. In an environment extending from sensors and devices at the network edge to applications and services in the cloud, an end-to-end IoT ecosystem is essential to realizing opportunity without risking security, manageability and interoperability. That’s why I applaud The Linux Foundation’s recent announcement of the EdgeX Foundry™ Project
 
Created to build an open framework for IoT edge computing, EdgeX Foundry addresses the risks created by IoT’s complex interplay between multiple devices, connectivity protocols, applications and tools. This complexity is already fragmenting the nascent IoT market into competing segments, each promoting a different set of standards and frameworks. The resulting lack of a common framework makes it increasingly difficult and costly to develop pluggable services for capabilities such as security and management in a consistent and interoperable way. 
 
EdgeX Foundry couldn’t come at a better time, as architectural models such as fog computing emerge to bring data collection, storage and compute closer to data in devices and sensors. While there are clear advantages to such an approach, it also creates security and manageability challenges as apps and data are deployed at remote and potentially hostile edge environments.
 
With a modular architecture based on loosely coupled microservices, EdgeX Foundry attempts to unify the marketplace and enable vendors to provide interoperable components built to a common framework. It is designed to run on any hardware and operating system and support diverse application environments.
 
EdgeX Foundry High-level Architecture
 
EdgeX Foundry High-level Architecture (source: EdgeX Foundry)
 
It’s exciting to think of the many IoT edge security challenges EdgeX Foundry can address. Here are a few that spring immediately to mind.
 
 • Visibility and monitoring for EdgeX nodes and connected devices: There is an increasing concern from enterprise IT about the lack of visibility into IoT endpoints. Ideally, IT needs global visibility from sensors and devices to gateways, routers, servers and other IT assets. 
 
 • Identity and access management for operators as well as devices:  Tasks such as device authenticity and onboarding, credential provisioning and device runtime authentication must be performed securely and at scale to meet IoT requirements. 
 
 • Data protection: For IoT to deliver its promised value and insight, data integrity and data provenance are key. As analytics and processing move closer to data sources (sensors and devices), protecting data at the edge, whether at rest or in transit, is critical.
 
With more than 50 members representing a diverse set of expertise, the EdgeX Foundry community provides a powerful and dynamic force for addressing IoT challenges in a collaborative environment under Linux Foundation governance. This environment allows for core services, such as security, to be built into a common foundation, while individual members can continue to innovate and add unique extensions as differentiated values. For RSA and other security vendors who would otherwise face the likely insurmountable challenge of attempting to secure competing platforms built to different architecture and for different hardware and software stacks, this announcement is great news. 

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

ICS/OT

Wago has patched critical vulnerabilities that can allow hackers to take complete control of its programmable logic controllers (PLCs).

ICS/OT

Cybersecurity firm Forescout shows how various ICS vulnerabilities can be chained for an exploit that allows hackers to cause damage to a bridge.

ICS/OT

More than 1,300 ICS vulnerabilities were discovered in 2022, including nearly 1,000 that have a high or critical severity rating.

ICS/OT

Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.

Cybersecurity Funding

Internet of Things (IoT) and Industrial IoT security provider Shield-IoT this week announced that it has closed a $7.4 million Series A funding round,...

ICS/OT

Siemens and Schneider Electric address nearly 100 vulnerabilities across several of their products with their February 2023 Patch Tuesday advisories.