Security is a science, not an art
By adhering to well-understood principles and practices, from design through deployment, building secured devices is repeatable.
The first of seven properties of a highly-secured device:
1. Have a hardware root of trust.
At a minimum, a hardware root of trust for IoT must provide at least two features: a secured device identity and software integrity protection through secure boot. Better hardware roots of trust provide secured on-device generation of private keys, measurement of all software and firmware including ROMs, protection of data at rest, hardware write protection, trustworthy sources of entropy for random number generation, and irreversible storage for rollback protection.
Continue reading
Read on to discover the six remaining properties of a highly secured device and learn how the Azure team created and tested a highly secured microcontroller.
Read data sheetIf you’re building a device and want expert help to get your operating system secure to complete its fixed-function, contact us.
We provide guidance so that you can easily follow our proven systems engineering methodology to ensure your Windows IoT products are securely configured while reducing time to market.