Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT

New Arm Certification Aims to Secure IoT Devices

A three-tier certification regimen shows adherence to the Platform Security Architecture.

Arm, which designs processors used in devices from smart doorbells to supercomputers, is partnering with five laboratories and consulting firms to develop a certification for adherence to the Platform Security Architecture (PSA). The PSA is a framework and set of resources designed to help improve the security of Internet of Things (IoT) devices starting with the processing chips themselves.

PSA Certified offers three levels of certification in an attempt to prove basic security principles have been embedded in IoT hardware.

"This will enable trust in individual devices, in their data, and in the deployment of these devices at scale in IoT services, as we drive towards a world of a trillion connected devices," said Paul Williamson, vice president and general manager of Arm's Emerging Businesses Group, in a statement announcing the certification.

Level 1 certification involves a questionnaire for the manufacturer seeking certification, with the precise contents of the form varying depending on whether the component is a chip, device, operating system, or something else. The questionnaire is based on the 10 security model goals of the PSA architecture and is used, along with a lab check at one of the PSA-certified lab partners, or ensure compliance.

According to Arm, a number of manufacturers have attained Level 1 certification. They include Cypress, Express Logic, Microchip, Nordic Semiconductor, Nuvoton, NXP, STMicroelectronics, and Silicon Labs. 

Levels 2 and 3 certification require lab tests against the PSA root of trust protection profile; Level 3 also includes additional tests involving side-channel attacks and other vulnerabilities. These levels are intended for CPU and chip vendors to prove that their devices can be trusted as the basis of secure systems. These tests will be provided by testing lab partners Brightsight, CAICT, Riscure, and UL, along with consultants Prove&Run.

For a growing number of consumers and businesses, IoT security is a critical component of personal and financial security. In the "Avast Smart Home Security Report 2019," released today, researchers note that more than 40% of homes worldwide — and 62% of homes in the US, have more than five connected smart devices.

"It only takes one weak device to let in a bad hacker, and once they are on the network, they can access other devices and the personal data they stream or store, including live videos and voice recordings," said Avast president Ondrej Vlcek, commenting on the report.

Related Content:

 

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
2/26/2019 | 11:03:59 PM
standards standards standards
ETSI just released a set of global consumer-IoT security standards themselves.

Many in the industry have been complaining about the lack of standards. I suspect that in two years' time the complaints will be about too many standards.
AI Is Everywhere, but Don't Ignore the Basics
Howie Xu, Vice President of AI and Machine Learning at Zscaler,  9/10/2019
Fed Kaspersky Ban Made Permanent by New Rules
Dark Reading Staff 9/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16319
PUBLISHED: 2019-09-15
In Wireshark 3.0.0 to 3.0.3 and 2.6.0 to 2.6.10, the Gryphon dissector could go into an infinite loop. This was addressed in plugins/epan/gryphon/packet-gryphon.c by checking for a message length of zero.
CVE-2019-16320
PUBLISHED: 2019-09-15
Cobham Sea Tel v170 224521 through v194 225444 devices allow attackers to obtain potentially sensitive information, such as a vessel's latitude and longitude, via the public SNMP community.
CVE-2019-16321
PUBLISHED: 2019-09-15
ScadaBR 1.0CE, and 1.1.x through 1.1.0-RC, has XSS via a request for a nonexistent resource, as demonstrated by the dwr/test/ PATH_INFO.
CVE-2019-16317
PUBLISHED: 2019-09-14
In Pimcore before 5.7.1, an attacker with limited privileges can trigger execution of a .phar file via a phar:// URL in a filename parameter, because PHAR uploads are not blocked and are reachable within the phar://../../../../../../../../var/www/html/web/var/assets/ directory, a different vulnerabi...
CVE-2019-16318
PUBLISHED: 2019-09-14
In Pimcore before 5.7.1, an attacker with limited privileges can bypass file-extension restrictions via a 256-character filename, as demonstrated by the failure of automatic renaming of .php to .php.txt for long filenames, a different vulnerability than CVE-2019-10867 and CVE-2019-16317.