Help Center/ Intelligent EdgeFabric/ FAQs/ Edge Node FAQs/ How Is Edge Environment Security Protected?
Updated on 2024-01-19 GMT+08:00

How Is Edge Environment Security Protected?

IEF provides a security solution under edge-cloud synergy.

  • IAM authentication

    Agencies can be created in Identity and Access Management (IAM) to allow edge nodes to access resources such as Application Operations Management (AOM), Data Ingestion Service (DIS), and SoftWare Repository for Container (SWR).

  • Edge node security

    Edge Agent creates dedicated service users whose accessible directories and permissions are limited. Users can upload logs and monitoring information to the cloud based on their requirements.

  • Edge-cloud synergy communication security

    Edge Agent initiates a request to IEF for establishing a bidirectional encrypted channel. Messages exchanged between devices and IEF are authenticated and encrypted by certificates.

  • Cloud security

    The frontend anti-DDoS protects the cloud against malicious attacks.

    A unique access certificate is issued for each edge node. Bidirectional communication is authenticated and encrypted by certificates.

  • Device security

    End devices use certificates for identity authentication.

Figure 1 IEF security solution