SWRA780A September   2023  – February 2024 CC3300 , CC3301

 

  1.   1
  2.   Abstract
  3.   Trademarks
  4. 1Introduction
    1. 1.1 Terminology and Abbreviations
  5. 2Internet of Things (IoT) Products and Security
    1. 2.1 Physical Access
    2. 2.2 Local Network Connectivity
  6. 3Main Features
    1. 3.1 Secured Boot
      1. 3.1.1 Secured Boot Container
      2. 3.1.2 Secured Boot Flow
    2. 3.2 Wi-Fi Network Security
    3. 3.3 Rollback Protection
    4. 3.4 JTAG Protection
    5. 3.5 Secured Host Interface
  7. 4Revision History

Internet of Things (IoT) Products and Security

An IoT device is by nature a network-connected device, and therefore can serve as a gateway to malicious access to sensitive data, such as surveillance videos, or control over actuators, such as door locks. To achieve good security for an internet-enabled product, a security assessment must be performed on the specific product and the system-level requirements. This assessment identifies the involved assets, analyzes the environment as well as intended and unintended potential usages of the product, and thereby detects potential vulnerabilities of the product.

This assessment helps the developer define the best protection scheme using the available security capabilities.

The environment, the assets, and the processes are different from one product to another, but generally for IoT devices there are some common exposure points:

  • Physical access (with or without the ability to manipulate hardware interfaces)
  • Local network connectivity
  • Internet (or intranet) network connectivity – not covered in this document

Figure 2-1 illustrates the common exposure points of an IoT-connected product.

GUID-20230606-SS0I-TTSD-DPNJ-2WC9HJPTNSKN-low.png Figure 2-1 IoT Device Exposure Points