packages that demand more memory and processing power. "Hardware trust is
necessary when you look at updates being required and the size of firmware images
as the communication stacks mature," he says.
Designers are often challenged to spend enough up front to support the full life
of a design, and that includes thinking about security. So many design choices
compete with one another that engineering teams often struggle to justify the cost
of hardware security. To bake security into the device, however, you have to spell out
security requirements at the earliest design stages. Cartrette says, "People look at
that security chip like it's just another capacitor. But it's not just a capacitor. This is
about compliance. This is about anchoring your trust strategy. It is about enabling
ecosystem security management strategies."
" Defining
authentication
in a way that is
meaningful to a
forward-looking
security
conversation is
critical, or the rest
of the conversation
is going to be
missing something."
18 18