Designing secure IoT devices starts with a secure boot

Last week, I had the pleasure of taking part in an embedded security webinar called “Designing secure IoT devices starts with a secure boot”, hosted by one of our silicon partners, NXP. I presented alongside Donnie Garcia, Solutions Architect for Secure Transactions at NXP.

Highly engaged audience for our technical security webinar

It was our most popular joint webinar to date, with the large majority of those who attended staying engaged until the end. If that does not attest to the quality of the content, then I do not know what does!

The webinar covered in practical details how to:

  • Manage the life cycle of an IoT edge node from development to deployment
  • Leverage hardware and software offerings available for the Kinetis MCU portfolio, designed to help protect against attacks
  • Ease the burden of future secure IoT edge node development using new processors and architectures from Arm

Focus: Kinetis K28F MCU and Arm TrustZone for Armv8-M

The webinar kicked off strong with Donnie covering the secure boot solution for the Kinetis K28F MCU, using mbed TLS for cryptography and the KBOOT tools. Then, I introduced TrustZone for Armv8-M as the foundation of all future secure embedded designs, building on the success of TrustZone for Armv8-A in billions of devices the past ten years. The objective of TrustZone for Armv8-M is to open the door for all developers to create such embedded and secure solutions by creating a developer-friendly processing execution environment.

 Arm TrustZone system security diagram

How TrustZone for Armv8-M creates hardware-enforced security for embedded applications

For more information about TrustZone for Armv8-M, please visit the TrustZone page in the Arm community, in which you can join for free to interact with leading developers of tools, silicon, and solutions. Ask questions and see the list of many resources relating to the embedded security: whitepapers, blogs, webinars, etc. In this blog, you will find a comprehensive set of documents regarding the operation and design of systems with TrustZone for Armv8-M. For training, view our technical courses.

If you are creating embedded solutions with NXP microcontrollers, then I highly recommend watching the webinar and downloading the whitepaper for more information.

Thank you to the hundreds of developers who joined Donnie and I and left such positive feedback.

View the recording

Get the whitepaper

Anonymous