One of the most valuable security controls that can be implemented within an IoT system is the use of secure hardware. For example, using ARM TrustZone technology, system on chip (SoC) developers can create both secure and nonsecure environments for their platforms. This allows developers to block access to secure resources by nonsecure components and actors.
Secure drivers run on top of a stripped-down micro-kernel within the trusted environment, and an Application Programming Interface (API) provides a limited set of commands for interactions between the trusted and untrusted environments.
Technology, such as ARM's TrustZone, provides a number of security services for IoT deployments: ...