Edge Computing device onboarding — Part I— Introducing the challenge
This article outlines the challenges that you will face while performing a secure device onboarding at the scale needed in Edge Computing environments and will also introduce FIDO device onboarding (FDO) which will be covered in the following article of the series.
The “edge device onboarding” problem
Device onboarding refers to the act of including a new device into your established IT/OT architecture, including the specific device configuration needed to be trusted and integrated with the rest of the running systems….in plain words, deploying new systems in a way that you can start using them.
I also mentioned “Edge Computing” in the title. When someone mentions the words “Edge Computing” while describing solution architecture, you should start considering multiple, if not all, of these technical constraints:
- It will be capable of working in small HW footprint environments
- It will work at big scale
- It will tolerate network disruption (or being disconnected)
- It will be fully automated with a central point of management and observability
- I will secure data at rest and in transit (even against physical threats)