Home > Edge > Manufacturing Edge > White Papers > Integrated Edge Management in Smart Manufacturing - White Paper > Security
Security risk is a major challenge in edge computing. This risk can be described as breach of data, device, network, or an application due to an incident that results in unauthorized access. The most common breaches include physical access to manipulate and steal data, malware, virus, and phishing attacks.
Facilities are evaluated for limitations and constraints for identifying mitigation strategies across the four breach elements that are listed in the following figure.
Data evaluation focuses on risk during data movement, storage, and processing. It is reviewed based on different classifications, for example, confidential, private, restricted, or public.
Device evaluation focuses on physical attacks and damage to the functional edge of things, and edge computing devices during a breach, including sensors, machines, robots, servers, gateways, and PLCs.
Applications across the multicloud environment are evaluated for robustness and integration vulnerabilities if there is a breach. Unauthorized access can compromise the confidentiality of the product, process, customer, and workforce information. A breach can also corrupt the data and cause applications to malfunction, including manufacturing execution systems, product data management and customer resource management.
Network security review focuses on the breach of a physical communication network between the functional edge, edge computing, and cloud computing layers of the edge to cloud continuum.
While data, device, and application vulnerabilities are reviewed for securing the hardware and software assets of a computing environment, the purpose of a network security review is to secure the communication network of a facility.