Microsoft Corporation
SECURING NETWORK ACCESS AT EDGE SITES USING TRUSTED NETWORK DEVICES

Last updated:

Abstract:

Techniques are described for securely managing computing resources in a computing environment comprising a computing service provider and a remote computing network. The remote computing network includes computing and network devices configured to extend computing resources of the computing service provider to remote users of the computing service provider. The network devices include a trusted network device that includes a root of trust. The trusted network device detects that a new device is communicatively coupled to a port on the trusted network device. The trusted network device determines that the new device is not authorized to access computing resources at the remote computing network. The port is isolated at the trusted network device.

Status:
Application
Type:

Utility

Filling date:

22 Dec 2020

Issue date:

23 Jun 2022