Security Context Framework

With C-Trust for IAR Embedded Workbench, we provide a number of pre-defined Security Context Profiles for you to get started developing secure applications.

The Security Context defines the configuration of the trusted execution environment. It is a description of the security environment that is required to protect your application. The properties of the pre-defined Security Context Profile include:

  • Cryptographic keys and certificates
  • Secure Boot configuration
  • Device security
  • Application update process
  • Update policy
  • Device memory layout

Reducing Your Time-To-Security

The security context is a framework that defines how devices are identified, managed and secured. For some users this context may apply to just to a single product, and for others the context will apply to their entire range of solutions, defining a standard approach to managing devices, driving patching strategy, and ultimately enabling the transition of ownership to end users.

To deliver "security out of the box" Secure Thingz offer two Security Context frameworks for developers to download and rapidly prototype applications. The frameworks are available as a Base Security Context for simple applications and resource-limited devices, and as an Advance Security Context which extends the frameworks with a feature rich Secure Boot Manager.

The Base and Advanced Security Contexts are available as worked examples within Embedded Trust, enabling organizations to rapidly modify the frameworks to meet the specific needs of their organizations, ensuring truly unique certificates and keys, providing flexibility in certificate hierarchies, and delivering a flexible yet powerful Secure Boot Manager. Secure Contexts created within Embedded Trust are manufacturing ready, enabling developers to exchange development certificates with productions certificate, accelerating them towards seamless secure provisioning.

Intellectual Property Protection Security Context

Description

The  IP Protect Security Context has been designed to enable developers to rapidly protect the high value and critical IP that organizations create, and to provide reassurance that only authorised and authenticated IP can be installed on devices.

Features

  • Secure application and credential provisioning                 
  • Integrated Secure Boot Manager                                               
  • Device Security Management                                                    
  • Authorised & authenticated software install                       
  • Malware injection countermeasures                                       
  • Automatic encryption and signature of code                       
  • Update Policy Management                                                       
  • Integrated version provisioning management                   
  • Developer defined software key infrastructure                 
  • Application updates with Anti-rollback protection           
  • Device level Trace & debug management                            

 

© IAR Systems 1995-2019 - All rights reserved.

We use cookies on this website to provide you with a better experience. You need to accept cookies to continue using this site. Cookies