An Overview of Cybersecurity Best Practices for Edge Computing

An edge IT environment, such as those found in industrial factories, can have a plethora of distributed endpoints providing a large attack surface for cyber criminals and hackers. Managing this risk requires the proper implementation of network segmentation and various security appliances. Edge computing involves connecting endpoint devices and systems to a network. These connections offer potential avenues of attack for hackers. Mitigating these cybersecurity risks requires solutions that encompass security best practices for devices, networks, and applications. This also requires actions on the part of the user to maintain their required level of cybersecurity. This paper discusses best practices for four key elements of an effective edge computing cybersecurity strategy including: (1) selection criteria for devices, (2) secure network design (3) device configuration, and (4) operation & maintenance to reduce the risk of breaches. Examples are provided as well as references to related cybersecurity standards. Note: While this paper is largely explained in the context of industrial edge applications, the concepts discussed are applicable to all edge IT environments.

Complete this form to
download the whitepaper

AI-Driven Data Centers: Revolutionizing Decarbonization Strategies

@Schneider Electric

Subscribe To Our Newsletter

Join our email list to get the exclusive unpublished content right in your inbox