C h a p t e r 3
Security in edge computing isn't about implementing
every possible safeguard—it's about applying the right
level of security in the right places. This concept,
often referred to as the proportionality of risk, aims
for resources to be effectively allocated to protect
devices and systems on the basis of the potential
threats they face.
Over-securing low-risk devices can result in unnecessary
costs and inefficiencies, while under-securing high-
risk devices can lead to significant vulnerabilities. To
strike the right balance, organizations must perform
PROPORTIONALITY
OF RISK –
INTRODUCTION
TO RISK/
THREAT ANALYSIS
A security problem can have
multiple solutions. Here
is where it's important to
understand the overall
system and measure the
impact of the risk. At the
end of the day, you need
to look back at what makes
sense and what is efficient
for your unique application."
Carlos Serratos
IoT Certification Expert, NXP Semiconductors
16
7 Experts Discuss Managing Security Risk and Regulatory Compliance at the Edge