SWRA780A September   2023  – February 2024 CC3300 , CC3301

 

  1.   1
  2.   Abstract
  3.   Trademarks
  4. 1Introduction
    1. 1.1 Terminology and Abbreviations
  5. 2Internet of Things (IoT) Products and Security
    1. 2.1 Physical Access
    2. 2.2 Local Network Connectivity
  6. 3Main Features
    1. 3.1 Secured Boot
      1. 3.1.1 Secured Boot Container
      2. 3.1.2 Secured Boot Flow
    2. 3.2 Wi-Fi Network Security
    3. 3.3 Rollback Protection
    4. 3.4 JTAG Protection
    5. 3.5 Secured Host Interface
  7. 4Revision History

Introduction

Internet of Things (IoT) products and systems hold information that can be sensitive and private, thus stressing the importance of securing the data. This data can include passwords, keys, credentials, configurations, personal information, vendor intellectual property (IP), and more. The growing number of published exploited weaknesses in security and the requirements that keep coming from governments and standards organizations, mandate building robust cybersecurity measures for every new IoT device.

This document describes these security related features, which are made available to vendors through an ecosystem that incorporates simple and concise APIs, tools, and documentation. This document does not address the security related features on network layers or application layers and cover only the features that resides in the Wi-Fi and Bluetooth Low Energy peripherals.