Security & Compliance
Certificate management, security configuration, and compliance monitoring
Secure Isomorphic Communication
mTLS certificates create cryptographically verified identity mapping between physical devices and software models. Each certificate maps 1:1 to a physical device, enabling secure desired→reported state flow and preventing unauthorized commands.
Physical Device ↔ X.509 Certificate ↔ Cloud Identity
Desired state (command) → mTLS → Edge device
Reported state (reality) → mTLS → Cloud replica
Why this matters: Without mTLS, attackers could send malicious commands to physical equipment (e.g., overspeed motors, disable safety). Certificates ensure only authorized isomorphic replicas can command or query physical state.
💡 Tip: Monitor certificate expiry closely. Expired certificates break the identity mapping—edge devices lose authorization to report state or receive commands.
Certificates
...
0 active, 0 expiring
Expired
...
Requires attention
Active Alerts
...
0 critical
Security Configs
...
Active configurations
Certificate Monitor
Automatic certificate expiry monitoring and rotation tracking
Stopped
Certificates
Loading certificates...
Security Alerts
Loading alerts...
Security Configurations
Loading configurations...
Compliance Status
No compliance configurations found