Best Practices for Securing Your Distributed Edge Deployment