Introduce secure hardware components within your IoT system

One of the most valuable security controls that can be implemented within an IoT system is the use of secure hardware. For example, using ARM TrustZone technology, system on chip (SoC) developers can create both secure and nonsecure environments for their platforms. This allows developers to block access to secure resources by nonsecure components and actors.

Secure drivers run on top of a stripped-down micro-kernel within the trusted environment, and an Application Programming Interface (API) provides a limited set of commands for interactions between the trusted and untrusted environments. 

Technology, such as ARM's TrustZone, provides a number of security services for IoT deployments: ...

Get Practical Internet of Things Security - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.