Edge Computing Requires Edge Security: Best Practices for Protecting Sensitive Data at the Edge

October 15, 2024
6 minute read
Ryan Matthews

Edge computing has created a data security threat

The growth of edge computing, emerging technologies and evolving mission requirements are driving the rapid expansion of sensitive data at the edge. 

A growing portfolio of edge devices are collecting, processing, and storing sensitive data.  In addition to PCs, laptops, servers, and removable media, a multitude of other device types, including IOT, OT, manned, and unmanned vehicles now collect sensitive data. 

These devices may be lost, stolen, confiscated, or accessed with malicious intent potentially resulting in unauthorized data access. Sensitive data on these vulnerable devices must be protected from stealing, cloning, manipulating, or wiping by malicious actors. 

Edge data on edge computing devices is highly vulnerable 

Edge computing devices are particularly vulnerable to data compromise due to three reasons:

  1. Adversaries have can gain physical access to edge devices
  2. Protection cannot interfere with operations
  3. Administration and oversight may be difficult due to remote location

Opportunity for Adversary Access. The proliferation of edge computing devices increases the likelihood adversaries will gain physical data access. They can use techniques to circumvent legacy protection and compromise data in seconds. Edge devices need advanced data protection and data recovery.

Simple Operations. Data security measures for edge devices cannot get in the way of or compromise critical mission execution. Operators are unlikely to have technical sophistication. For this reason, data security measures must balance data protection with end user friction and ensure a simple, straightforward user experience.  

Administration and Oversight. Data protection requires properly deployed and provisioned data security. Accurate reporting ensures that edge device security is properly configured, and edge data is fully protected. It is imperative that endpoint security includes easy and efficient administration. Additionally, given the number of edge devices now in use and in development, edge computing edge data security management at scale is critical.  

Advanced data protection and recovery 

Advanced data recovery techniques include a diverse range of methods and technologies.  Adversaries are growing in sophistication and are capable of overcoming traditional protection approaches. Advanced protection and recovery approaches for edge data include: 

Edge data protection compliance requirements 

Federal agencies have issues specific requirements for proper edge data protection. These include:   

Commercial Solutions for Classified Data at Rest (CSfC for DAR): NSA established Commercial Solutions for Classified (CSFC) programs setting requirements to protect classified data stored on devices. The NSA mandates a layered approach requiring a combination of hardware encryption and pre-boot authentication (PBA). NSA publishes a component list of organizations meeting NSA CSfC for DAR requirements.  

Federal Information Processing Standard Publication 140-2: FIPS 140-2 is a US government computer security standard that verifies the effectiveness of cryptographic hardware. FIPS is administered by NIST, US National Institute of Standards and Technology, a nonregulatory federal agency within the U.S. Department of Commerce. Its mission is to promote innovation and industrial competitiveness by improving measurement science, standards, and technology. 

Common Criteria. This internationally recognized framework for evaluating and certifying the security of IT products is administered by NIAP (National Information Assurance Partnership) through the Cybersecurity Collaboration Center Oversees, a national program to evaluate commercial off-the-shelf information technology products for conformance to the international Common Criteria.  

Executive Order 14028:  The President’s Executive Order (EO) 14028 on Improving the Nation’s Cybersecurity  issued on May 12, 2021, charges multiple agencies with enhancing cybersecurity through a variety of initiatives related to the security and integrity of the software supply chain. The EO references FIPS mandates and provides direction on the use of encryption and multifactor authentication for data protection at the edge.  

Cigent edge computing security capabilities

Cigent protects edge data with a patented portfolio of integrated solutions that combine hardware and software security. Using a layered-protection approach to ensure data integrity, Cigent includes encryption, multifactor authentication, and advanced threat protection capabilities.  

Cigent edge data protection solutions have been thoroughly tested and validated by leading federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK).

Cigent secure edge data storage 

While DAR protection with full drive encryption is fundamental in edge computing, Cigent complements its security with a patented portfolio of data protection features to ensure sensitive data remains secure in all aspects of an operation. These features streamline administration and reporting, provide additional protection for physical and remote threats, and address critical edge data hygiene challenges.

Addressing the specific challenge of edge computing and edge data protection

As more missions require the capabilities that edge computing and edge devise provide, edge data protection grows more important. The damage done when such devices are lost, stolen, confiscated, or accessed with malicious intent is incalculable. Contact us for more information.

More from Cigent