Supplier eBooks

Cypress - 7 Experts on IoT Security and Privacy

Issue link: https://resources.mouser.com/i/1516458

Contents of this Issue

Navigation

Page 17 of 32

packages that demand more memory and processing power. "Hardware trust is necessary when you look at updates being required and the size of firmware images as the communication stacks mature," he says. Designers are often challenged to spend enough up front to support the full life of a design, and that includes thinking about security. So many design choices compete with one another that engineering teams often struggle to justify the cost of hardware security. To bake security into the device, however, you have to spell out security requirements at the earliest design stages. Cartrette says, "People look at that security chip like it's just another capacitor. But it's not just a capacitor. This is about compliance. This is about anchoring your trust strategy. It is about enabling ecosystem security management strategies." " Defining authentication in a way that is meaningful to a forward-looking security conversation is critical, or the rest of the conversation is going to be missing something." 18 18

Articles in this issue

view archives of Supplier eBooks - Cypress - 7 Experts on IoT Security and Privacy