Essential Security Measures to Safeguard Against Threats in IoT Devices
![microcontroller,RX,RENESAS](https://en.sekorm.com/front/website/images/logo_v2_2x.png?v=2x01)
In recent years, the widespread use of IoT devices has led to a significant increase in cyberattacks. These attacks have the potential to cause major disruptions to socioeconomic activities and even threaten national security. As a result, countries around the world are working to establish security measures by enacting legislation and developing guidelines related to cybersecurity.
Recently garnering attention, the Cyber Resilience Act, which imposes new security requirements on digital products, has been announced in Europe. This legislation is anticipated to extend to everyday household appliances and other devices, so it's crucial to keep a close eye on its progression. In Japan, IoT security guidelines were put into place in 2017, while in the United States, the NIST IR 8259 was established to outline fundamental security requirements for IoT devices. Adhering to these guidelines is becoming more and more essential in today's world.
Amid the multitude of security requirements that have emerged, many of you may be struggling with determining the specific security measures that need to be implemented for your IoT devices.
As an international security standard that has been established for a long time, the standard model called FIPS140 has been defined by the NIST (National Institute of Standards and Technology) of the United States. FIPS140 defines how encryption modules should be developed according to the requirements of the US Federal Government, and a certification system (CMVP) has also been established.
Looking at the security requirements that each country has established, Renesas can see that they are similar to the standard model defined by NIST in the following areas:
1. Protection of highly confidential security parameters and personal data
2. Root of Trust (a configuration element to verify device trustworthiness - secure boot, firmware update, tamper detection, etc.)
3. Lifecycle management (key generation to use/disposal, etc.)
In other words, preparing for these similar requirements is a top priority for effective security measures.
Renesas focuses on the NIST standard model and has implemented "Robust Key Protection", "Root of Trust", and "Secure Key Management" with RENESAS RX microcontrollers equipped with RENESAS proprietary security IP, Trusted Secure IP.
Of course, each country's security guidelines include the need to establish system-level measures and organizational structures, and it is not possible to cover all security requirements with semiconductor devices alone. However, RX microcontrollers with Trusted Secure IP do have features that cover the baseline security requirements and have achieved the highest level of CMVP Level 3, which is typically the highest level for consumer-level devices.
As mentioned earlier, one of the most critical tasks to prioritize is the establishment of a Root of Trust, which verifies the trustworthiness of software running on a reliable device. For attackers, the software is an excellent target to embed malicious code, making it vulnerable to attacks. With Trusted Secure IP (TSIP) integrated into RX microcontrollers, the RENESAS security solution offers a comprehensive package of three software samples, including security drivers, secure boot, and secure firmware update. This one-package solution reduces the barriers to security implementation, allowing for the establishment of a Root of Trust and safeguarding customer assets from various threats.
As you can see, with just one RX microcontroller and three software solutions, RENESAS can achieve the Root of Trust, which is one of the top priorities. In addition, RENESAS offers various solutions for "confidentiality protection for security parameters and personal data" and "lifecycle management" on RX, so in the next article, RENESAS will touch upon those topics as well.
- +1 Like
- Add to Favorites
Recommend
- Renesas 32-bit RX at the Closing of 10th Anniversary: RX roadmap continues to expand
- Renesas‘ RX Security Solutions Provide A Unique Hardware Technology, Implementing Robust IoT Security Easily
- Renesas DSP Solution on Renesas Lab on the Cloud, Input Analog Signals Directly From A Signal Generator To The Rx231 Microcontroller Evaluation Board
- Renesas RX Becomes World‘s First General-Purpose MCU to Obtain CMVP Level 3 Certification Under NIST FIPS 140-2
- The Past and the Future of Renesas RX Family Software
- Renesas Ships 1 Billionth Device From RX Family of 32-bit Microcontrollers
- Evolve Your HMI Effortlessly with Renesas RX Microcontrollers and Serial LCD
- Renesas RA and RX families of MCUs Offer a Comprehensive Ecosystem Enabling Users to Effortlessly Connect to Their Preferred Cloud Services
This document is provided by Sekorm Platform for VIP exclusive service. The copyright is owned by Sekorm. Without authorization, any medias, websites or individual are not allowed to reprint. When authorizing the reprint, the link of www.sekorm.com must be indicated.