Introduction
Industrial Edge Virtual Device
5 Operating Manual, 03/2023
Security Measures
To fulfill "Security Guidelines for Device Builders" the following security measures were taken
during development of the Industrial Edge Virtual Device:
Network Segmentation
IEVD prohibits general routing or bridging between connected networks by default to prevent
it to operate as a bridge between two networks and therefore overrules existing subnet
segmentations that might ensure network security policies of the users' network operators.
Hard Reset
Whenever the hard reset is triggered, it is ensured that all security-relevant information is
deleted from the device to ensure that devices can be wiped for other use cases without
retrieving pre-existing information by the subsequent user.
Handling of Onboarding Credentials
Onboarding credentials are only transferred via secured connections and are not persistently
stored within the device to prevent intruders from catching files and gain access to devices or
IEM.
Time Synchronization
Time is synchronized with IEM after onboarding to ensure up-to-date information within the
device. Initial boot sequences get passed time via (virtual) RTC of the hardware.
Storage of Credentials
Credentials and certificates are stored in a secure manner as far as in scope of the device.
Secure Logging
Device emits logs via an API to be exported by IEM in case of auditing and operational
purposes.
Trusted Deployment of Updates
Updates are deployed and applied with the validation of integrity of the update package to
prevent the execution of malicious update images.
Authentication
There are no authentication mechanisms implemented by the device itself. User only
authenticates via Industrial Edge mechanisms.
Root privileges / Runtime protection
There is no authentication to the device given to the user and therefore no gain of root
privileges possible by accessing the device itself.
Miscellaneous
Due to the virtual execution of the IEVD a secured environment is assumed. Therefore, no
strong security measures in regards of physical intrusion are taken or may be achieved by the
user with hypervisor features (e.g., encryption).
In regard to intrusion from remote the device is secured and does not provide any remote
interfaces or open ports besides Industrial Edge platform dependencies.