Securing IoT device data against physical access

Security remains the number one concern when designing and deploying IoT devices. High profile breaches continue to occur and concerns cease to subside. For any organisation, security needs to be front of mind and considered from the start – not as an afterthought. Having no mechanism in which to address security concerns can be as significant as threatening the survival of a business.

Many organisations have adopted Ubuntu Core to help manage the security and integrity of their IoT devices. Ubuntu Core features leading security credentials and protects against online threats. However, with many IoT devices deployed remotely, how can organisations ensure protection against physical access and the data on those devices?

This whitepaper gives a technical overview of how Ubuntu Core with full disk encryption and secure boot can be implemented to provide protection in such scenarios including a case study of this in practice.

Highlights of this whitepaper include –

  • The built in benefits of Ubuntu Core such as confinement and isolation to provide best in breed security.
  • Overview of how full disk encryption and secure boot was implemented on Ubuntu Core for a customer to provide tamper resistant access and data protection for remotely deployed devices.
  • Using the NXP i.MX6 application processor as a reference platform, explanation of how these features can be extended to other hardware platforms to provide similar security capabilities.

To download the whitepaper, click here or fill out the form below.

In submitting this form, I confirm that I have read and agree to Canonical’s Privacy Notice and Privacy Policy.

Internet of Things

From home control to drones, robots and industrial systems, Ubuntu Core and Snaps provide robust security, app stores and reliable updates for all your IoT devices.

Newsletter signup

Select topics you’re
interested in

In submitting this form, I confirm that I have read and agree to Canonical’s Privacy Notice and Privacy Policy.

Related posts

A snap confined shell based on Mir: Mircade

Mircade: An example snap confined user shell There are various scenarios and reasons for packaging a Snap confined shell and a selection of applications...

Encryption at rest with Ceph

Do you have a big data center? Do you have terabytes of confidential data stored in that data center? Are you worried that your data might be exposed to...

MAAS 2.8 – new features

What’s new? This new release of MAAS brings three key new benefits: Virtual machines with LXD (Beta) Tighter, more responsive UX External/remote PostgreSQL...