No Need to Worry

Since I started dealing with the topic of edge servers, I have become more sensitive to reports related to cybersecurity. And I have to say that the situation is tense and the threats are constantly multiplying. Here are just a few examples: In 2022, 380,000 new virus variants were detected every day. Cyberattacks on industrial operations and critical infrastructure grew by a mind-boggling 140% in 2022. At the same time, attacks that cannot be fended off can lead to immense risks and financial losses.  

Security, Security, Security 

For example, the downtime after a ransomware attack is approx. 136 business hours. This corresponds to 17 workdays at 8 hours per day. It is only natural, then, that security is becoming the most important criterion at all levels. Especially for critical infrastructures. This makes IoT both a curse and a blessing, because the IoT connection naturally creates completely new attack vectors that must be countered on site, in harsh environments.  

Of course, the exact way in which a company implements its individual cybersecurity strategy cannot be definitively specified, but it does have to work. And for this, powerful security edge servers are needed on site. However, these “watchdogs” must be kept in a completely different way than conventional servers in air-conditioned data centers are. You can’t afford downtime. 

Minimize the Risk of Downtime 

But the risk of downtime lurks everywhere. Even if it occurs just once, downtime can seriously jeopardize an industrial company’s existence. Therefore, reliability in harsh environments is important for cybersecurity, and this also requires a physically safe mechanical design. From rugged housings with thick cooling fins for passive heat pipe cooling so you can hermetically seal servers to prevent dust and moisture ingress without using active ventilation to shock- and vibration-optimized connectors and threaded fittings: there are many things that you have to consider if you want to operate powerful server technology safely outside a protected data center. In addition to a robust design, further safety-related characteristics such as 24/7 availability for more than 10 years for use in the most demanding conditions or continuous operational reliability should be mentioned.  

Build on What’s Good and Make Use of Standards 

One approach for efficiently meeting these requirements is to use modular designs based on open server-in-module standards such as COM-HPC Server. These new modules build on established standards and products, such as the new Intel Xeon D 2800 processors. As a result, they offer powerful cybersecurity functions such as Intel Boot Guard and Intel Total Memory Encryption, which significantly improve the level of security. Intel Boot Guard ensures that only trusted firmware is started, whereas Total Memory Encryption protects the entire main memory from unauthorized access. These processors also provide high computing power and energy efficiency, ideal for edge computing environments in which fast real-time data analysis with advanced encryption is required. With Intel Software Guard Extensions (SGX), the protection of sensitive data is further improved. In addition, there is already an immense ecosystem of accompanying services, software, and developer support for it.  

 

Cover-adapting-industrial-edge-servers-to-evolving-markets-with-shadow

 

The modular concept also offers a “Next Gen Refit” strategy that enables seamless upgrades for rapid technological development with new security functions. If you need more performance or new, processor-integrated security features, you just have to change the module. The rest of the hardware can be used as is. Even with completely closed systems.  

For more details, take a look at my paper “Ensuring Cybersecurity at the Industrial Edge.


Posted by Zeljko Loncaric

Zeljko Loncaric is Market Segment Manager - Infrastructure. Zeljko has a long history in embedded computing and Computer-on-Modules Prior to joining congatec mid-2010, he held various positions with international companies in product management, marketing and sales marketing in Germany and Australia. Zeljko, who holds an MBA in business management and a degree in Media Technology from the University of Deggendorf, is also a Bosch-trained electronics technician. The investigation of improved product and service solutions in the early start-up phase is not only a passion, but also the core of the scientific doctorate. The research deals with start-ups in the innovative technology sector and the use of experimental innovation methods.