From the course: IoT Product Security

Unlock this course with a free trial

Join today to access over 23,100 courses taught by industry experts.

Module 14 review

Module 14 review

Hi, I'm Matthew Clark. And this Lesson 4.14: Module 4 Review. We've gone through a lot of technical details in the last several lessons, so I think a review is important. In this lesson, we will review foundations of trust, the trusted execution environment, the trusted platform module, the hardware security module, and the device identity, and device attestation. So let's get started. In our foundations of trust section, we reviewed Microsoft seven properties of highly secure devices, which included starting with a hardware root of trust, having a small trusted computing base, using defense in depth and compartmentalization, using certificate-based authentication and planning for renewable security and using failure reporting. We also learned that it's vital to maintain trust throughout the device lifecycle, and that identification is a requirement for authentication. And enablers of trust included cryptography, secure storage, keeping trusted from untrusted, and using immutable…

Contents