Securing IoT device data against physical access
Sarah Dickinson
on 26 February 2019
Tags: Internet of things , IoT , iot security , Security , Ubuntu Core
Security remains the number one concern when designing and deploying IoT devices. High profile breaches continue to occur and concerns cease to subside. For any organisation, security needs to be front of mind and considered from the start – not as an afterthought. Having no mechanism in which to address security concerns can be as significant as threatening the survival of a business.
Many organisations have adopted Ubuntu Core to help manage the security and integrity of their IoT devices. Ubuntu Core features leading security credentials and protects against online threats. However, with many IoT devices deployed remotely, how can organisations ensure protection against physical access and the data on those devices?
This whitepaper gives a technical overview of how Ubuntu Core with full disk encryption and secure boot can be implemented to provide protection in such scenarios including a case study of this in practice.
Highlights of this whitepaper include –
- The built in benefits of Ubuntu Core such as confinement and isolation to provide best in breed security.
- Overview of how full disk encryption and secure boot was implemented on Ubuntu Core for a customer to provide tamper resistant access and data protection for remotely deployed devices.
- Using the NXP i.MX6 application processor as a reference platform, explanation of how these features can be extended to other hardware platforms to provide similar security capabilities.
To download the whitepaper, click here or fill out the form below.
IoT as a service
Bring an IoT device to market fast. Focus on your apps, we handle the rest. Canonical offers hardware bring up, app integration, knowledge transfer and engineering support to get your first device to market. App store and security updates guaranteed.
IoT app store
Build a platform ecosystem for connected devices to unlock new avenues for revenue generation. Get a secure, hosted and managed multi-tenant app store for your IoT devices.
Newsletter signup
Related posts
AI Inference on the Edge with TensorFlow Lite
This blog post dives into the world of AI on the edge, and how to deploy TensorFlow Lite models on edge devices. We’ll explore the challenges of managing...
Space pioneers: Lonestar gears up to create a data centre on the Moon
Why establish a data centre on the Moon? Find out in our blog.
A look into Ubuntu Core 24: Your first Linux-powered Matter device
Welcome to this blog series which explores innovative uses of Ubuntu Core. Throughout this series, Canonical’s Engineers will show what you can build with...