This article originally appeared on Toolbox, June 11, 2021 by Philip Attfield
According to Enterprise Management Associates (EMA), more than 60 billion smart devices are expected to be online in the coming years. While this development is exciting, it underscores the ever-increasing importance of security at the network edge. The increasing proliferation of connected IoT devices performing mission-critical tasks means that there are more vulnerable access points than ever. To enjoy the benefits provided by “smart” devices, especially those implementing ML and AI in their applications, it becomes vital to protect the critical intellectual property that represents a large part, if not all, of the solution’s value. There must inherently be more interconnectivity built into the products with a need for access to the internet to receive critical updates to firmware or functionality. While the data center may be thought to be safe from outside intrusion, IoT devices are far more exposed, making them an ideal entry point for those looking for an easier way to exploit systems. One particularly vulnerable instance is the time at which a device is performing a firmware or application update. Firmware and application updates are inherently tied to the device boot process. A secure boot process authenticates the software and identities a device when it is powered on. Secure boot uses encrypted firmware images, which protects them while stored in non-volatile memory, whether or not the device is powered on. This process requires several stages of authentication, protection, and encryption/decryption to ensure that the device is secure.
A common misconception is that a device is secure if its first software payload, loaded by read-only memory (ROM), can be authenticated. This is, in fact, only the start of a truly secure boot process, which also includes:
These principles can be applied during product updates to authenticate firmware and applications and protect critical intellectual property from malicious attacks.
Following this process, the device can execute a firmware or application update safely and securely. This process can be executed locally, over an enterprise network, or through a cloud service. An IoT device must be maintained to remain useful. To ensure that the device is running as intended throughout its lifecycle, firmware updates, administered locally via a network or Over-the-Air (OTA), are essential. Keeping these principles in mind ensures safe and secure updates for the administrator’s fleet of devices.
The increasing proliferation of connected IoT devices performing mission-critical tasks means that there are more vulnerable access points than ever.