Secure Edge-Native Architecture (SENA)
A comprehensive new vision for securing and managing edge computing environments at scale, with support from Intel.


“At Tevel, securing our edge devices, and the software and data on them, is absolutely critical. We are so excited to see how the SENA architecture comprehensively addresses security and manageability at the edge, step by step. Bringing together Palette Edge, the Kairos project and Intel platforms is an incredibly powerful combination, and sets a new benchmark for security across the edge computing lifecycle. This technology is a scale enabler for us.”
SENA step by step
We’ve designed SENA to integrate dozens of security and management features, for seamless protection across the three stages of the edge lifecycle.
Deploy trusted devices, quickly and easily
Take devices from manufacturing to staging to live in the field, without friction, without risk.
The first SENA requirement covers the initial deployment of edge hardware. To meet this requirement, you can use Palette Edge’s range of device onboarding options. It enables you to bring devices into management via GUI, API, low-touch QR code scans or zero-touch auto registration — even in air-gap environments. We support the FIDO specification for device onboarding.

Provision the complete stack from OS to app — verified
Verify integrity and minimize risk when deploying software stacks to the edge device.
Next, SENA mandates control of the software supply chain you’re deploying on your hardware. Here, Palette’s native scanning suite — security, conformance, compliance and SBOM — catch vulnerabilities in the images you plan to deploy.
Kyverno integration and SLSA help ensure artifact integrity from end to end in the software supply chain.

Operate the edge runtime with confidence
Protect against threats when it matters most.
SENA’s third requirement sets standards for protecting apps and data executed on the edge device in the field.
Here, the Kairos factory delivers the OS and Kubernetes stack on the device as an immutable, tamperproof image. Then, when the device boots, Intel’s Trusted Platform Module (TPM) is used to decrypt and verify the boot. Trusted eXecution Technology (TXT) dynamically assesses runtime state. When workloads start, all internal and external communication between services is secured via mutual TLS encryption. Both container and VM workloads are isolated in hardware-based memory enclaves using Intel Software Guard eXtensions (SGX).

Learn more about the SENA requirements and our solutions
Download the in-depth white paper, co-authored by Spectro Cloud and Intel, to learn more about the Secure Edge-Native Architecture and the technical security and management capabilities it brings to your edge deployments.
.png)
Take your next step
Unleash the full potential of Kubernetes at scale with Palette. Book a 1:1 demo with one of our experts today.