Trusted Factory Provisioning for Trusted IoT Devices: A How-To Guide

In a recent blog, one of the leading voices in IoT security highlighted the importance of IoT devices that are secure by design and how device management platforms can help secure a growing attack surface from cybercriminals.

David Rogers MBE, who co-authored the UK’s Code of Practice for Security in Consumer IoT and Services highlighted how IoT products are failing even on the most basic precautions and the importance of a secure device life cycle.

A deployed device moves through several stages during its life cycle as it progresses from deployment to regular use and periodic updates to eventual retirement. Each of these stages poses a new risk to an unsecured device as attack methods can vary and the tactics employed during a mid-life update campaign will differ to the methods used to hack a retired device.

Our latest how-to guide focuses on the security precautions required at the start of a device’s life and explains how:

  • A device manufactured without security precautions remains insecure regardless of subsequent precautions
  • To reduce complexity whilst introducing scalability and security
  • To instill trust in a factory line
  • To prepare a factory line for secure provisioning
  • Click here to learn how IoT Device Management Platforms like Pelion can help IoT devices embark upon a scalable secure life cycle whilst abstracting away complexity.

    Important Information for this Arm website

    This site uses cookies to store information on your computer. By continuing to use our site, you consent to our cookies. If you are not happy with the use of these cookies, please review our Cookie Policy to learn how they can be disabled. By disabling cookies, some features of the site will not work.