Chapter 13. Securing the Platform Itself

Topics covered in this chapter include security of the software platform and the nodes that support it, with focus on

   Visualization Dashboards and Multitenancy

   Back-end Platforms

   Communications and Networking

   Fog Nodes

   End Devices or “Things”

Automating the security of a set of use cases that can bring business value to an organization is unthinkable if the platform that delivers automated deployments is not secure itself. Hence, any system that is capable of orchestrating and automating security for IoT obviously requires a secure platform. As discussed in previous chapters, the IoT platforms considered in this book extend the capabilities of NFV/SDN systems and offer uniform orchestration ...

Get Orchestrating and Automating Security for the Internet of Things: Delivering Advanced Security Capabilities from Edge to Cloud for IoT now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.