Talk
Intermediate

Edge-First Security at Scale: Lessons from orchestrating security across 35,000+ POS Devices

Approved

How do you enforce real-time security on 30,000 unorchestrated POS devices that go offline for days? With no k8s, no fleet orchestration, and unreliable connectivity — we had to rethink cloud-native assumptions and build a resilient edge-first architecture.

Technical Highlights:

  • Devices required persistent runtime security, even while disconnected.

  • Cloud-based EDR models failed due to their reliance on constant connectivity and orchestration.

  • KubeArmor enabled local runtime policy enforcement directly on the devices.

  • gRPC wasn’t a failure, but scaling connection management across 30,000+ devices added unnecessary complexity.

  • RabbitMQ handled bidirectional, event-driven messaging with built-in reliability and no custom connection logic.

  • Streams and replayability were key for delayed policy delivery, audits, and recovery.

  • Policies and telemetry flowed asynchronously between the central control plane and devices.

  • Local cache persisted on disk to work within edge limits (0.5CPU, 500Mi RAM).

  • We reduced RabbitMQ from 20 to 4 nodes using clustering, tuning, and stream optimizations.

  • Open-source RabbitMQ plugins enabled customization without vendor lock-in.

  1. Cloud-based EDRs are insufficient for disconnected edge environments — devices need local, independent runtime enforcement.

  2. KubeArmor enables localized runtime security, enforcing policies without cloud or orchestration dependencies.

  3. gRPC adds high operational complexity at scale; maintaining 30,000+ persistent connections is not practical.

  4. RabbitMQ provides built-in connection management, reliable delivery, bidirectional communication, and supports event-driven design.

  5. Replayable streams and disk-based local caching are essential for handling policy sync, audit trails, and device restarts in low-resource edge environments.

Technology architecture
Which track are you applying for?
Main track

Barun Acharya
eBPF Engineer Odigos
barun.cc
Speaker Image
Swarit Pandey
Founding Software Engineer Step Security
https://www.linkedin.com/in/swarit-pandey/
Speaker Image

100 %
Approvability
3
Approvals
0
Rejections
0
Not Sure

This seems like a highly technical talk, but it may be a little too specific and boring. This might need to include a demo of what the speaker is talking about in order for people to really grasp what's going on.

With a few changes to spice it up, I think it could be a very good talk.

Reviewer #1
Approved

Interesting to know how real-world challenges are solved around security especially remote and I agree with the other review, strong narration will be key. We can probably share pointers to the speaker on a dry run.

Reviewer #2
Approved

"How do you enforce real-time security on 30,000 unorchestrated POS devices that go offline for days?"... you can't! Any new security threats that emerge when the device is offline can't be addressed. The POS device could be connected to WiFi and not connected to the their cloud... providing a sufficient window for exploitation.

This talk seems is about leveraging KubeArmor in a local context - but who is this aimed at ? Is it aimed at cloud developers looking to build on device software, or to persuade device level software devs to use cloud derived tools ?

It's not clear why the proposers started with KubeArmor when something more suitable to that purpose such as microk8s is an option too.

Despite some lack of clarity this could well be a useful talk, provided the proposers set adequate context and make this talk an exploration of a set of choices they took, what drawbacks they found and how they addressed them.

Reviewer #3
Approved