1 of 19

How to Convince Your Security Team That Your AI App Is Secure Enough for the Edge

Based on true stories

Erik Nordmark, ZEDEDA

#onesummit

2 of 19

Original Cloud-Native System

IoT Gateway

  • Sending all the data to the cloud
  • Cloud running containers using docker or kubernetes

#onesummit

3 of 19

Desired Edge Cloud-Native System

Edge Server w GPU

  • Do the video analytics at the edge
  • Less data and can operate if Internet down

  • Requires a more capable edge server

#onesummit

4 of 19

Lab Edge Cloud-Native System

  • Pick some hardware, a Linux distro, and the runtimes (docker, kubernetes)

#onesummit

5 of 19

Real-world Deployment

  • Inside a machine in a factory
  • On a truck going to well sites

#onesummit

6 of 19

Real-world Issues - Connectivity

  • The network connectivity is intermittent
  • Might be out for minutes or days

  • Can runtime and workloads handle that?
  • Advanced: handling static IP, htttps proxies

#onesummit

7 of 19

Real-world Issues - Power

  • Some locations might not have reliable power
  • Might not even have a UPS

  • Can the OS and �runtime handle that?
  • Can a database in the container handle that?

#onesummit

8 of 19

Then Security Happens

#onesummit

9 of 19

Security Review Questions

  • What new attack surfaces are you exposing at the edge?
  • Have you done a threat model/analysis?

#onesummit

10 of 19

Security Review Questions (more specific)

  • What new attack surfaces are you exposing at the edge?
  • Have you done a threat model/analysis?

  • Our crown jewels at insecure location?
  • Security/privacy of customer data on disk?
    • Secure network?
    • Physical theft of software or data?
  • Patch/update when CVEs?
  • Security monitoring?
  • RBAC and SSO integration?

#onesummit

11 of 19

DIY Edge Security Approach

  • Harden all software?
    • OS - 940 pages:https://www.cisecurity.org/benchmark/ubuntu_linux
    • Runtimes e.g., k8s 60 pages: https://media.defense.gov/2022/Aug/29/2003066362/-1/-1/0/CTR_KUBERNETES_HARDENING_GUIDANCE_1.2_20220829.PDF
    • Applications/containers?
  • And/or run a host-based firewall to protect applications?

#onesummit

12 of 19

DIY Edge Security Approach

  • Theft?
    • Secure boot insufficient. Attacker: Find old signed firmware/software with known CVEs
    • Full disk encryption doesn’t help - no user to input password
  • How to update OS + runtime + containers to fix CVE?
  • Immutable OS images makes it easier
    • Whole fleet runs few versions
  • Need some Special Purpose OS

#onesummit

13 of 19

Project EVE Approach

SaaS

Web Console

Edge Virtualization Engine (EVE)

  • Abstraction layer designed for the edge
  • Created and donated by ZEDEDA to LF
  • Open sourced under Apache License v2
  • Part of Linux Foundation LF Edge Project

Any Gateway at IoT Scale

Hardware

Free self-service

SaaS

Open Source

EVE API

App Marketplace

Any Application

VM or Container

APP

APP

APP

APP

No Compromise to Security

(TPM and vTPM)

Historian, SCADA

or On-Premises System

Any Cloud

Adam

Controller

Eden driver

Sandbox

#onesummit

14 of 19

EVE Architecture

containerd

User Edge Compute Hardware

Open API

Partition A

Partition B

EVE managed, workload-centric storage

EVE services

EVE Controller

Disk overhead: 500M

RAM overhead: 500M�CPU overhead: 1 core

Hypervisor (Xen, KVM, ACRN)

On host/dom0

Dom 2

Dom 1

EVE Controller

#onesummit

15 of 19

EVE Robustness Elements

  • Immutable, read-only OS image
  • A/B booting
  • Hardware and software watchdogs - automatic rollback
  • Declarative, eventual consistency API
    • Including device network connectivity (static IP, https proxy)

#onesummit

16 of 19

EVE Robustness and Security Elements

  • Immutable, read-only OS image
  • A/B booting
  • Hardware and software watchdogs - automatic rollback
  • Declarative, eventual consistency API
    • Including device network connectivity (static IP, https proxy)
  • Disable (USB) ports by default - assignable to applications
  • No user accounts/login in EVE
  • Zero touch, zero trust onboarding
    • Mutual trust EVE - Controller from secure onboarding process
    • Mutual TLS plus object signing/encryption
  • Distributed firewall for every app
  • Support deployment of virtual security appliances

#onesummit

17 of 19

Example EVE Security - handle stolen disk or server

  • Start with hardware root of trust (TPM chip or firmware)
  • Use TCG measured boot and remote attestation
  • Use standard sealing of (storage) key under TPM measurements
  • Unique: avoid attestation if no hardware/firmware/software change
  • Unique: if change retrieve encrypted “for me” key from controller
  • Details in https://wiki.lfedge.org/display/EVE/Measured+Boot+and+Remote+Attestation

#onesummit

18 of 19

Join us - as Users or Developers

  • EVE features under way:
    • Application volume snapshot and rollback
    • Richer 5G/LTE and local connectivity (CAN bus, USB, VLANs)
    • Handling broken TPMs better
    • Clustered compute and storage at the edge
    • Real-time support

#onesummit

19 of 19

#onesummit