- Hardware and Software. Software security is built on top of Hardware therefore, your security strategy requires both Hardware and software perspectives. For example Arm TrustZone Technology provides Hardware-enforced isolation built into the CPU.
- Solutions are not universal. The solutions described below must be analyzed considering the use case, the available hardware components, the expected performance and the budget.
Secure development Lifecycle (SDLC)
- Looking at the secure development lifecycle, the solutions described in this document fall under Require and Design phases.
- We encourage IoT companies to embrace a platforming strategy where a unique distribution provides security by Design functions to all IoTs running on Linux."
Pour recevoir ce livre blanc, merci de cliquer ci-dessous :