0% found this document useful (0 votes)
8 views1 page

Security Design Best Practices Mean Trust and Certification - Arm Newsroom

The blog discusses the importance of third-party certification in ensuring consistent security standards for IoT devices, highlighting the gap between consumer trust and self-assessed security implementations. It emphasizes a two-step approach of certification and attestation to validate the security of hardware and software, while advocating for collaboration within the industry to establish best practices. The article concludes that third-party certification not only enhances trust but also streamlines the development process, ultimately benefiting both companies and consumers.

Uploaded by

pyyjfs96w5
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views1 page

Security Design Best Practices Mean Trust and Certification - Arm Newsroom

The blog discusses the importance of third-party certification in ensuring consistent security standards for IoT devices, highlighting the gap between consumer trust and self-assessed security implementations. It emphasizes a two-step approach of certification and attestation to validate the security of hardware and software, while advocating for collaboration within the industry to establish best practices. The article concludes that third-party certification not only enhances trust but also streamlines the development process, ultimately benefiting both companies and consumers.

Uploaded by

pyyjfs96w5
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

NEWSROOM

Arm Newsroom / Blog

BLOG | OCTOBER 22, 2021

Security Design Best


Practices Mean Trust and
Certification
Third-party certification can aid device makers in ensuring a consistent
standard of security is designed into the hardware and firmware of all
devices, and the Arm ecosystem has a vital role to play in this.
By Wouter Slegers, CEO, TrustCB

Security

Share     

We’ve reached a crossroads in cybersecurity efforts in an increasingly


complicated era of development. On one side, consumers want to be
able to trust the security in their devices. On the other side, among
technology providers, there seems to be a reality gap: In a
recent survey by PSA Certified, 87 percent of respondents said they’re
satisfied with the quality of IoT security implementations within their
company.

However, 84 percent of the companies that have adopted an IoT


strategy have reported a security breach. Clearly the self-developed,
self-assessed security implementations are not providing what
everyone – except for cybercriminals – wants: trusted security in their
digital devices. The trick is charting the right course to ensure that
happens.

Governments and regulatory bodies, reacting to the headlines and a


perceived lack of industry progress, are increasingly enacting
standards, laws and rules outlining how security needs to improve.
Companies, on the other hand, tend to want to ensure their products
will be easily certified in components, enabling reuse of certification in
the interests of time, efficiency, and money.

This combination of forces demonstrates what should be the path


forward: third-party certification and attestation to do security
evaluation once and reuse it efficiently.

Certification and attestation is the two-step dance that ensures that, at


the hardware level, devices are what they say they are, and going up
the software stack, at the product level, validates they are still
providing the expected level of security. It enables longevity in the
security of connected devices, and an audit trail to ensure best
practices are being followed in the supply chain and in the usage.

As the world looks to well-known laboratories and certification


authorities to certify the security robustness of countless consumer
devices, so too is it beginning to look to our industry for similarly
making development, evaluation, and certification fast, easy, and
predictable in a modular fashion. The good news is the solution
development has been underway for a long time; the challenge is
building on the momentum to ensure that industry properly self-
regulates and avoids overly heavy governmental intervention.

One-two punch
The two-step approach to enabling more trusted devices is split
between hardware and software platforms (the chips and the OS), and
making these into end products (the doorbells, voice assistants, and
such).

The first step, certification of the platforms, is validation against well-


defined requirements that the platform provides the secure
functionality as advertised. Developing such secure functionality and
evaluating its robustness against serious attackers is an important,
niche skill. But once that functionality is known to be secure, it is easy
to use that functionality and make a secure product out of it.

This makes the second step easy: The product developer will rely on
the secure platform, and focus on the distinctive functionality to make
the product. Thus, certification makes it easy to ensure that your
digital doorbell or voice assistant is secure and attestation shows your
supply chain security credentials are in order.

Police thy self?


Many companies (62 percent in that PSA Certified report cited earlier)
have relied on self-certification to ensure for their customers that their
products are trustworthy.

This has the benefit of being controllable by the company and is usually
expedient. But this approach is not robust enough (especially if the
threat model isn’t well-rounded, or in many cases is non-existent) and
has a number of challenges.

First, pity the internal compliance administrator urged on by a boss to


certify the product so it can get to market quickly. Certify now and risk
some vague, potential issues years in the future to be handled by the
people over at the security response team then? Or refuse to “be
flexible with the rules,” delaying certification and risk getting fired? Are
most companies even staffed properly to handle what could be scores
of required certifications depending on their product portfolio? Are
they positioned to consider every potential breach, especially as the
threat landscape evolves? Or will they introduce a serious technical
depth of potential security issues in the future, especially in the IoT
domain with long operational deployment?

Second, self-certification failures have been prompting severely


stricter regulatory requirements, especially where critical
infrastructure and societal damage is at stake. And, while there are
some logical reasons for a company to self-certify, it also means the
company takes on liability for those claims. Lastly, self-certification
isolates the interpretations of the requirements – highly relevant in the
security domain – which can lead to a market of siloed developments,
disparate, proprietary solutions, and an uneven playing field.

Third-party certification ensures consistent


standards
Enter third-party certification, which has historically had a strong basis
in the governmental eID and payment industry. Device makers can
ensure a consistent standard of security is designed into the hardware
and firmware of all devices, and the ecosystem has a vital role to play in
this.

We all need to work together to identify and share industry best


practices, so we can overcome current and future security threats and
make sure everything is built on a common foundation of security and
trust. This works so well that vulnerabilities in the eID and payment
card domains are rare nowadays. Surely this is desirable for our
consumer IoT, critical infrastructure, and personal privacy? And, it
suggests that additional security goals can be achieved.

The second prong, attestation, comes as the products are delivered


and function in the field. Attestation is a technical means to make sure
a product is genuinely what it claims to be, and still operates in a secure
manner. Attestation can be used to translate the human-readable
certificate of trust into something that’s machine-readable.

Previously, to attest to the trustworthiness of a device, you had to take


the package off a silicon device and examine its markings to ensure it
was what it said it was. This isn’t very practical even for the
professional evaluation labs, let alone end-consumers, and also is
vulnerable to forgers.

Today, to manage this better and ensure scalability, devices have a Root
of Trust that can provide the attestation chain from chip to full system.
A product with this functionality can prove to its owner and the other
devices and services it’s talking to that it is genuine and trusted, and
those other devices in turn can trust it. It’s a key element of securing a
device throughout the lifecycle, and showing the value of secured
devices to the network it is in.

PSA Certified, founded by Arm in 2017 to provide a security


framework for the IoT sector, has developed so that today it has more
than 70 products PSA Certified across the world.

An ecosystem of trust
Technology alone isn’t enough to make an ecosystem. We at
TrustCB are just one aspect of a rapidly expanding certification and
attestation ecosystem that aims to ensure trusted, validated security
from IP to system.

These include partnerships such as PSA Certified (founded by Arm,


Brightsight, CAICT, Prove & Run, Riscure and UL) which is an open,
industry-standard threat-modeling framework to ensure secure-by-
design up through and including security consultation, evaluation, and
finally certification. PSA Certified is also concentrating on aligning with
other schemes (such as GlobalPlatform SESIP, UL IoT Security Rating
and ioXt Alliance) to further reduce fragmentation and improve the
composite certifications reuse in other schemes.

In the end, third-party certification sets a common bar for everyone to


protect the connected world. This enables companies to use
certification to build or expand a trusted brand and position against
competitors that have avoided certification or employed self-
certification. And because it’s an ecosystem of companies dedicated to
making the digital world more secure, it’s trusted: These companies put
their reputations and business models on the line in the name of
security certification.

The business value to the certification ecosystem is shorter time-to-


market. Developers need to make a secure end product fast. One can
risk time to market using a component of unknown security: Finding
out that a core mechanism that’s depended on for the security, is in fact
insecure causes a very expensive rush to fix late in the development
cycle (even more so if that core mechanism is provided by another
party).

Thus the evaluation and certification process needs to be predictably


short. The time the product is in limbo for its security certification is
very costly to developers and reduce security for all. After all, the
attackers do not wait.

Some smaller companies worry that certification schemes could add


costs to their product development that, because of their size, they
can’t afford. It is quite the opposite: Certification and attestation help
the ecosystem spread the cost with the reusable certifications of the
platforms.

For example, a company taking a small control and communications


module and layering software on top to make it a solution for farm
irrigation now only has to worry about certification of its software
running on the module. The security of the underlying hardware and
OS has been validated and certified, and those costs are spread over
the many users of that hardware and OS.

In short, through certification and attestation, companies now see a


pathway to trust, just as much as they realize that the cost of inaction
can be incalculable.

Read the 2021 Arm Security Manifesto


The third Arm Security Manifesto surveys the threat landscape today
and details the tremendous strides the industry has made in the past
four years.

Read Now

By Wouter Slegers,
CEO,
TrustCB

Share     

 Article Text Copy Text 

Any re-use permitted for informational and non-commercial or personal use


only.

Editorial Contact
Brian Fuller and Jack Melling
[email protected]

Subscribe to Blogs and Podcasts


Get the latest blogs & podcasts direct from Arm

Email
[email protected]

Country
Select Country / Region

Arm will process your information in accordance with our Privacy Policy.

Subscribe

Related
B LO G | O C T 1 1 , 2 0 2 1

Cybersecurity: Do You
Hear the Tiger in the
Grass?
Matthew Griffin, Fanatical Futurist
and Founder, 311 Institute and
World Futures Forum

B LO G | AU G 0 5 , 2 0 2 1

Read the 2021 Arm


Security Manifesto
Arm Editorial Team

Media Information

Company Arm
Overview Corporate
& History Guidelines
Arm is defining the Information on how to
future of computing use the Arm corporate
logo

Media
Contacts
Get the latest Media
contact information

Latest on X

Arm 14 May Arm 14 May Arm 14 May


; ; ;
Great conversation yesterday Is AI the new engine of Stable Audio Open Sm
at @SelectUSA Investment creativity? built on Arm CPUs by
Summit on how public-private @StabilityAI - is now
collaboration can drive Join Arm CMO, Ami Badani, at
innovation and resiliency in @Tribeca Festival as she and What’s new?
the semiconductor industry. leaders from the AI and Step-by-step lear
creative ecosystems explore for Android deploym
Arm CEO Rene Haas shared how a new generation is using Open-source cod
Arm’s perspective on building AI to unlock creativity at copy, run, or drop int
the future of computing and unprecedented scale. Behind own app
why U.S. investment and it all is Arm, delivering the
talent… compute platform… Build it. Remix it. Sha
Get started:
https://okt.to/YXyZv

5 14 Twitter
1 7 Twitter

Products
CPUs & NPUs

Arm Immortalis & Mali

Physical IP

Security IP

Subsystem IP

System IP

Development Tools

License Arm Technology

Architecture
Learn the Architecture

CPU Architecture

System Architecture

Architecture Security Features

Partner Ecosystem
Join Partner Program

See All Partners

AI Partners

Automotive Partners

IoT Partners

Support & Training


Documentation Hub

Downloads

Contact Support

Support Forum

Training

Design Reviews

Education

Research

Company
Leadership

Investors

Arm Offices

Newsroom

Careers

Quality

Trust Center

Suppliers

Regional Newsrooms
English

⽇本語

中⽂(台灣)

Terms & Policies Terms of Use Privacy Policy Suppliers Accessibility


Subscription Center Trademarks Modern Slavery Statement Glossary

Copyright © 1995-2025 Arm Limited (or its affiliates). All rights reserved.

You might also like