Skip to main content

Protecting the Cloud Demands Security at the Edge

Image Source: DudeDesignStudio/stock.adobe.com; generated with AI

By Mark Patrick, Mouser Electronics

Published January 16, 2026

The number of electronic devices that require network access is growing at a prodigious rate. Every device added to a network represents a potential security vulnerability, making it challenging to keep the cloud secure. Furthermore, emerging technological trends can also make it difficult to ensure the cloud remains secure.

As an increasing number of new devices connect at the network edge, a growing percentage of them also need to operate as close to real time as possible. The only way to accommodate this is to install new computing resources closer to the edge of the network, where those resources are potentially more vulnerable.

The Cloud Expands to the Edge

Historically, as the demand for computing grew, it gradually became possible for only the most well-funded organizations to maintain their own server farms. In response, data communications networks evolved into centralized architectures anchored by huge data centers.

The number of these data centers is relatively small, and they are often located at a significant distance from the majority of the customers they serve. This distance was once of little concern, but it is becoming increasingly important as more applications emerge that require near-instantaneous computing results.

The additional milliseconds necessary for a signal to travel to and from a remote data center are intolerable for vehicle-to-vehicle (V2V) communications, safety infrastructure (e.g., traffic control, disaster warning systems), and some virtual reality (VR) applications, including remote surgery or augmented manufacturing processes. Network latency can be exacerbated by bottlenecks in and around data centers that result from spikes in network traffic overwhelming available communications bandwidth and/or computing resources.

The need to avoid latency and delays is compelling further evolution in the cloud, this time toward decentralization, with more computing resources being placed closer to, or at, the network edge.

The Advantages and Disadvantages of Computing at the Edge

Computing at the edge reduces the latency that is inimical to applications that operate in real time, but there are other benefits. Reducing data traffic to and from distant data centers frees network bandwidth, decreases network load, and improves spectrum utilization.

It also creates the opportunity for local interests to manage local data directly. This can be important not only for operational reasons but also for conforming to data privacy regulations that dictate that individual users’ personal data remains local.

However, edge computing makes security more difficult. Not only are there more devices at the edge, but many are inexpensive devices that might not have sufficient security built in. There are also more computing nodes at and near the edge, further expanding the attack surface. And because many new edge applications have some bearing on public safety, keeping them secure is increasingly critical.

Evolving Security

It is challenging to maintain the level of control or vigilance in edge solutions that is possible inside a data center. There are far more server facilities, network nodes, and individual devices, while the attack surface, already enormous, continues to expand with every new connected product and application.

Edge devices can have weak, and sometimes even no, security, making every device and user potentially vulnerable. Cybercriminals can exploit these weaknesses and fool people into revealing passwords or otherwise providing digital access.

Traditionally, security measures have been based on software. Cybercriminals have used stolen credentials and exploited security loopholes to insert their own code that subverts defenses. There are numerous ways to essentially trick software with malware and viruses. The growing problem is that software is much harder to protect outside of firewalls—and being outside of firewalls is a defining trait of edge devices. Additional security measures are necessary, meaning that more security measures are hardware-based.

Hardware Security Benefits and Implementations

Hardware-based security extends defense measures all the way down to the component level, embedding security features into the hardware itself. These measures have inherent advantages over software security, including greater resistance to attacks, acceleration of encryption processes, the ability to isolate critical functions, and reduced vulnerability to physical tampering.

Just as there are many different software-based security techniques, there are also a variety of hardware-based approaches. For example, hardware security modules (HSMs) and Trusted Platform Modules (TPMs) safeguard cryptographic keys and perform secure computations in cloud environments, thereby enhancing data protection and authentication.

Hardware Security Modules

HSMs are dedicated hardware devices that provide a secure environment for operations involving encrypted data, ensuring the integrity and confidentiality of the data. In a typical HSM, the manufacturer defines the firmware key, encrypts the firmware, and stores the key to one or more devices. The manufacturer can specify a limited number of programming operations that the HSM permits before becoming permanently deactivated.

Trusted Platform Modules

TPMs are embedded within connected devices of almost any size, from personal computers to sensors. TPMs harden security functions such as secure boot processes, encryption, and authentication by serving as a trusted anchor within the device, protecting against unauthorized modifications and ensuring the integrity of system components.

Secure elements and trusted execution environments (TEEs) are two techniques for providing isolated execution environments. By segregating sensitive operations within secure enclaves, both hardware-based solutions mitigate the risk of unauthorized access and manipulation.

The Future of Edge Security

The growth of edge computing promises tremendous benefits: safer roads, safer cities, and more intelligent services. However, this growth is also perilous, and modern society already relies heavily on data communication systems. Interconnectivity and communication serve as the backbone of nearly every facet of our lives, from essential transportation and power infrastructure to various sources of entertainment, such as streaming TV and gaming services. Unfortunately, the last decade has seen a surge in high-profile cyberattacks and faulty updates, which have had severe consequences, including incapacitating global networks and causing substantial financial losses.[1]

Keeping the cloud and the edge—i.e., the entire network—safe requires extensive and varying levels of security. That includes both software- and hardware-based mechanisms.

Security experts have already begun bolstering security technology with artificial intelligence (AI) and machine learning (ML). As we move ahead, the application of AI/ML in security is poised to become increasingly advanced in fortifying threat detection and mitigating attacks. Nevertheless, for a reliable system, it is crucial to have sophisticated hardware security components alongside any software measures to effectively safeguard and protect our networks.

 

Sources

[1]https://www.ibm.com/think/insights/decade-global-cyberattacks-where-they-left-us; https://www.csis.org/programs/strategic-technologies-program/significant-cyber-incidents

About the Author

Part of Mouser's EMEA team in Europe, Mark joined Mouser Electronics in July 2014 having previously held senior marketing roles at RS Components. Prior to RS, Mark spent 8 years at Texas Instruments in Applications Support and Technical Sales roles and holds a first class Honours Degree in Electronic Engineering from Coventry University.

Profile Photo of Mark Patrick