Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT

New Arm Certification Aims to Secure IoT Devices

A three-tier certification regimen shows adherence to the Platform Security Architecture.

Arm, which designs processors used in devices from smart doorbells to supercomputers, is partnering with five laboratories and consulting firms to develop a certification for adherence to the Platform Security Architecture (PSA). The PSA is a framework and set of resources designed to help improve the security of Internet of Things (IoT) devices starting with the processing chips themselves.

PSA Certified offers three levels of certification in an attempt to prove basic security principles have been embedded in IoT hardware.

"This will enable trust in individual devices, in their data, and in the deployment of these devices at scale in IoT services, as we drive towards a world of a trillion connected devices," said Paul Williamson, vice president and general manager of Arm's Emerging Businesses Group, in a statement announcing the certification.

Level 1 certification involves a questionnaire for the manufacturer seeking certification, with the precise contents of the form varying depending on whether the component is a chip, device, operating system, or something else. The questionnaire is based on the 10 security model goals of the PSA architecture and is used, along with a lab check at one of the PSA-certified lab partners, or ensure compliance.

According to Arm, a number of manufacturers have attained Level 1 certification. They include Cypress, Express Logic, Microchip, Nordic Semiconductor, Nuvoton, NXP, STMicroelectronics, and Silicon Labs. 

Levels 2 and 3 certification require lab tests against the PSA root of trust protection profile; Level 3 also includes additional tests involving side-channel attacks and other vulnerabilities. These levels are intended for CPU and chip vendors to prove that their devices can be trusted as the basis of secure systems. These tests will be provided by testing lab partners Brightsight, CAICT, Riscure, and UL, along with consultants Prove&Run.

For a growing number of consumers and businesses, IoT security is a critical component of personal and financial security. In the "Avast Smart Home Security Report 2019," released today, researchers note that more than 40% of homes worldwide — and 62% of homes in the US, have more than five connected smart devices.

"It only takes one weak device to let in a bad hacker, and once they are on the network, they can access other devices and the personal data they stream or store, including live videos and voice recordings," said Avast president Ondrej Vlcek, commenting on the report.

Related Content:

 

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
2/26/2019 | 11:03:59 PM
standards standards standards
ETSI just released a set of global consumer-IoT security standards themselves.

Many in the industry have been complaining about the lack of standards. I suspect that in two years' time the complaints will be about too many standards.
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Breaches Are Inevitable, So Embrace the Chaos
Ariel Zeitlin, Chief Technology Officer & Co-Founder, Guardicore,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-14345
PUBLISHED: 2019-11-15
TemaTres 3.0 allows remote unprivileged users to create an administrator account
CVE-2019-14343
PUBLISHED: 2019-11-15
TemaTres 3.0 has stored XSS via the value parameter to the vocab/admin.php?vocabulario_id=list URI.
CVE-2019-14869
PUBLISHED: 2019-11-15
A flaw was found in all versions of ghostscript 9.x before 9.28, where the `.charkeys` procedure, where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could esc...
CVE-2019-18987
PUBLISHED: 2019-11-15
An issue was discovered in the AbuseFilter extension through 1.34 for MediaWiki. Once a specific abuse filter has (accidentally or otherwise) been made public, its previous versions can be exposed, thus potentially disclosing private or sensitive information within the filter's definition.
CVE-2019-18986
PUBLISHED: 2019-11-15
Pimcore before 6.2.2 allow attackers to brute-force (guess) valid usernames by using the 'forgot password' functionality as it returns distinct messages for invalid password and non-existing users.