Microsoft Corporation
SECURING NETWORK ACCESS AT EDGE SITES USING TRUSTED NETWORK DEVICES
Last updated:
Abstract:
Techniques are described for securely managing computing resources in a computing environment comprising a computing service provider and a remote computing network. The remote computing network includes computing and network devices configured to extend computing resources of the computing service provider to remote users of the computing service provider. The network devices include a trusted network device that includes a root of trust. The trusted network device detects that a new device is communicatively coupled to a port on the trusted network device. The trusted network device determines that the new device is not authorized to access computing resources at the remote computing network. The port is isolated at the trusted network device.
Utility
22 Dec 2020
23 Jun 2022