Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

EVE is designed to work with devices that are deployed in physically insecure and constantly connected environments. First, EVE-managed devices make use of Trusted Platform Modules (TPM) or Trusted Execution Environments (TEE) when available for managing private device keys for strong device and session identitiesapplication instance  identities, and implementing measured boot. This also allows the EVE device API to work without needing to store login credentials. Next, following a zero trust, secure-by-default design approach, all  EVEEVE-managed devices have all physical and unused network ports disabled by default, disallowing SSH and keyboard access.

EVE has multiple layers of network security built in.  VPNs can be provisioned to cloud services. Applications are deployed with firewalls. Access controls firewall rules. Firewall rules can be managed remotely, and violations are logged. EVE’s has its own highly secure overlay network for device management that is also available to hosted applications. EVE supports TLS 1.2 for secure network communications.

...