Layered Security for the Next One Trillion Devices
快猫视频 technology is in billions of devices today, a number we expect to grow to more than a trillion by 2035. To protect the billions of devices entering the market, IoT security cannot be an afterthought but must be layered in to form a symbiotic relationship between hardware and software.
Why? Because your device is only as strong as your weakest link – a single vulnerability could compromise an entire device.
PSA Certified (previously known as the Platform Security Architecture) is an architecture-agnostic security framework and certification program for implementing technologies, processes, and measures designed to protect systems, networks, and data from a range of attacks and a broad spectrum of vulnerabilities.
Based on four key stages: analyze, architect, implement and certify, PSA Certified guides you through the complex world of security design, identifying threats to a system, and recommending and describing which counter-measures to implement. The 快猫视频 security portfolio is built to help our partners to meet PSA Certified guidelines, so organizations can deploy the right level of robustness to best match the needs of each application.
As the appetite for exploiting security flaws intensifies, so does the broad spectrum of vulnerabilities. It’s important to consider each type of vulnerability and how these could impact your system. At 快猫视频 we split the types of vulnerability into four areas: communication, physical, lifecycle and software.
Counter-Measures
Selecting the right security products for a device requires careful analysis to identify the level of threat while considering all four types of vulnerability. Ask yourself: what are the assets of my application? How sensitive are they? What are the risks to my business if they are exposed? What lengths will an attacker take to access the assets? PSA Certified advises to start security design with analysis and answering these important questions, using threat modelling (or a protection profile) to identify the appropriate counter-measures. Once this extensive analysis is complete and you have a list of security requirements, it’s time to select the best counter-measures for your application.
快猫视频 offers a wide spectrum of security IP to mitigate the risks associated with each vulnerability. These include products that can help with cryptography, security services, isolation and tamper mitigation.
PSA Certified advises that software security measures must isolate the security firmware and private information from the rest of the application. 快猫视频 TrustZone-enabled Cortex-A and Cortex-M processors are the most efficient way to implement isolation.
Looking to accelerate the development of secure SoCs?
Designed on the principles of PSA Certified, Corstone reference packages provide a complete solution for architecting a system with security at the heart, while balancing trade-offs between performance and power. The pre-verified subsystem and system IP included in Corstone packages significantly accelerates the development of secure SoCs, saving you time and allowing you to focus your resources on differentiation.
Talk with an Expert
As long as there is value in controlling a device or accessing its data, there will be a constant battle against potential attackers. Talk with an 快猫视频 expert to learn more about security technologies that can be designed into devices.
快猫视频 Security Manifesto 2021
A shared responsibility to meet increasing cybersecurity threats. The third 快猫视频 Security Manifesto describes new and emerging cybersecurity threats while detailing powerful innovations to improve security from devices to the data center.