From the course: IoT Product Security

Unlock this course with a free trial

Join today to access over 23,100 courses taught by industry experts.

IOTSF Secure Design Best Practice Guides

IOTSF Secure Design Best Practice Guides

From the course: IoT Product Security

IOTSF Secure Design Best Practice Guides

I'm Matthew Clark, and this is Lesson 6.8: IoTSF Secure Design Best Practice Guides. In this lesson, we're going to cover the secure design best practice guides. We're going to briefly go over specific entries in this guide for various sections such as physical security, side channel attacks, device security boot, secure operating systems, credential management, encryption, and so forth. So let's get started. The IoTSF Secure Design Best Practice Guide is just one of many guides from the IoT Security Foundation, and I would recommend you to take a look at their guides and download them. They are full of really good information. We're going to use this particular one. When I'm going to look at everything that's in this guide, we're going to select some and hopefully, none of this information should be absolutely new. It'll be a good checkpoint for our learning as we kind of review everything up to this point, all the modules that we reviewed as we go through this information, we should…

Contents