DigiPhusion

EDGE

Security & Compliance

Certificate management, security configuration, and compliance monitoring

Secure Isomorphic Communication

mTLS certificates create cryptographically verified identity mapping between physical devices and software models. Each certificate maps 1:1 to a physical device, enabling secure desired→reported state flow and preventing unauthorized commands.

Physical Device ↔ X.509 Certificate ↔ Cloud Identity
Desired state (command) → mTLS → Edge device
Reported state (reality) → mTLS → Cloud replica
Why this matters: Without mTLS, attackers could send malicious commands to physical equipment (e.g., overspeed motors, disable safety). Certificates ensure only authorized isomorphic replicas can command or query physical state.
💡 Tip: Monitor certificate expiry closely. Expired certificates break the identity mapping—edge devices lose authorization to report state or receive commands.

Certificates

...

0 active, 0 expiring

Expired

...

Requires attention

Active Alerts

...

0 critical

Security Configs

...

Active configurations

Certificate Monitor

Automatic certificate expiry monitoring and rotation tracking

Stopped

Certificates

Loading certificates...

Security Alerts

Loading alerts...

Security Configurations

Loading configurations...

Compliance Status

No compliance configurations found