From the course: IoT Product Security

Unlock this course with a free trial

Join today to access over 23,100 courses taught by industry experts.

Foundations of trust: Part 4

Foundations of trust: Part 4

From the course: IoT Product Security

Foundations of trust: Part 4

Hi, I'm Matthew Clark. And this is Lesson 4.4: Foundations of Trust, Part 4. In this lesson, we'll look at the threat profile matrix. We'll discuss physical security and how to abuse a root of trust. And we'll conclude with the case study. So let's get started. Let's start with the quiz question. Which of the following are elements of a root of trust? Cryptographic functions, secure boot, isolated environments, or immutable code? Trick question because they're all elements of a root of trust. Can you name the elements that are missing? Secure processor and secure storage. Yeah, absolutely. So let's take a look at a threat profile matrix. When the OEM is designing the architecture, the CPSO will perform a threat analysis as part of that risk assessment. She will look at the logical and physical vulnerabilities and identify any local and remote threats which could exploit those vulnerabilities. So logical vulnerabilities could be threats in this code, secure implementation of…

Contents