Supplier eBooks

Renesas - Secure Your connected World

Issue link: https://resources.mouser.com/i/1437738

Contents of this Issue

Navigation

Page 11 of 27

For the hardware side, effective security needs to include: • Secure key management, to ensure that keys are not accessible in an unencrypted state. The device should be able to securely generate and store keys, including private keys, to enable truly secure device-unique identity and provisioning. • Hardware-accelerated encryption, hashing, and true random number generation, which accelerates cryptographic operations on the device. This hardware support saves both time and power. • Secure memory access to protect specific regions of RAM and flash memory from unauthorized access. Separate memory domains isolate sensitive code and data from non-secure code and data, while write-once protected memory safeguards code and data from change or reprogramming. • Protected debugging and programming access, which reduces the risk of hackers using debugger and programming interfaces as attack vectors. The software side should include: • Integrated and optimized commercial-grade software with proven application frameworks and standard application programming interfaces (APIs). • Driver-level APIs to provide an easy interface to hardware security features. • Cryptographic libraries with a collection of APIs that provide a wide range of security features, including macro-level security functions, root-of-trust, and the ability to recognize trusted sources and code. • Built-in support for common communication protocols and transports, such as Hypertext Transfer Protocol Secure (HTTPS), Transport Layer Security (TLS), and other cloud- specific protocols. | 4 | | 12 | Here are the six security challenges for the embedded developer explored throughout this white paper: 1 How do I secure my device today? 2 How do I secure my products so they are not replaced by unauthorized copies? 3 How can I manage security with less complexity? 4 How do I secure my device against multiple security threats? 5 I'm not a security expert, but I need a secure product. What do I need to know? 6 How can I get more standardization and support for security from vendors and put my own resources on the parts of the design that differentiate? How Do I Secure My Device Today? A few years back, application developers didn't need to worry about securing their products because devices and applications were not connected like they are now. Today, even the most basic items–from light bulbs to baby monitors and prescription drug containers–are connected to the internet or a cloud. Too often, security is overlooked or only addressed after it is too late. Today, securing IoT applications from cyber threats to protect data and functionality is a critical concern for developers and must be built into devices from the start at both the hardware and software levels. A platform-based approach to security offers multiple layers of defense by taking advantage of the latest security advances in both hardware and software to implement in-depth, comprehensive protections.

Articles in this issue

view archives of Supplier eBooks - Renesas - Secure Your connected World