C h a p t e r 1 | T h e N e e d f o r S e c u r i t y a n d C o m p l i a n c e
While complying with security regulations
may seem like a burdensome cost, such
compliance can serve as a competitive
advantage. As more industries adopt
edge computing, customers are
increasingly prioritizing security in their
purchasing decisions. A company that
demonstrates its compliance with strict
security standards and its ability to
protect customer data will stand out in a
crowded market.
NXP is supporting the growing need for
security and compliance in edge devices by
• Offering comprehensive root of trust
technologies anchored in hardware
to establish a security foundation
for secure device commissioning,
administration, operations, connections,
updates, and maintenance throughout
its lifecycle.
• Pre-certifying edge processing
platforms and mapping NXP security
technology to market requirements,
accelerating herewith OEM proof of
conformance to security standards and
regulations such as ISA/IEC 62443
(Industrial), EN 18031 (RED), and NIST
8425 (US Cyber Trust Mark).
• Collaborating with regulators,
policymakers, and industry standards
bodies to foster a common approach
to security and help OEMs simplify
conformance to the multiple emerging
regional regulations.
In particular, NXP offers advanced
security technologies such as
• EdgeLock
®
Secure Enclave, a dedicated
security unit integrated into edge
processing platforms.
• EdgeLock
®
Secure Elements, discrete
IC for protection of device credentials.
• EdgeLock
®
2GO, NXP cloud services for
managing IoT device credentials (device
access keys, device connection keys,
device attestation certificates, etc.)
over its lifecycle.
Risks to edge computing are
similar to overall information
security concerns. Special
emphasis needs to be put on
data confidentiality, integrity,
availability, and the security of
identities from both the client and
server perspectives."
Asad Haque
Executive Director, Security Architecture,
Comcast
9
7 Experts Discuss Managing Security Risk and Regulatory Compliance at the Edge