Securing IoT device data against physical access

Security remains the number one concern when designing and deploying IoT devices. High profile breaches continue to occur and concerns cease to subside. For any organisation, security needs to be front of mind and considered from the start – not as an afterthought. Having no mechanism in which to address security concerns can be as significant as threatening the survival of a business.

Many organisations have adopted Ubuntu Core to help manage the security and integrity of their IoT devices. Ubuntu Core features leading security credentials and protects against online threats. However, with many IoT devices deployed remotely, how can organisations ensure protection against physical access and the data on those devices?

This whitepaper gives a technical overview of how Ubuntu Core with full disk encryption and secure boot can be implemented to provide protection in such scenarios including a case study of this in practice.

Highlights of this whitepaper include –

  • The built in benefits of Ubuntu Core such as confinement and isolation to provide best in breed security.
  • Overview of how full disk encryption and secure boot was implemented on Ubuntu Core for a customer to provide tamper resistant access and data protection for remotely deployed devices.
  • Using the NXP i.MX6 application processor as a reference platform, explanation of how these features can be extended to other hardware platforms to provide similar security capabilities.

To download the whitepaper, click here or fill out the form below.

In submitting this form, I confirm that I have read and agree to Canonical’s Privacy Notice and Privacy Policy.

Internet of Things

From home control to drones, robots and industrial systems, Ubuntu Core and Snaps provide robust security, app stores and reliable updates for all your IoT devices.

Newsletter signup

Select topics you’re
interested in

In submitting this form, I confirm that I have read and agree to Canonical’s Privacy Notice and Privacy Policy.

Related posts

5 key steps to take your IoT device to market

IoT businesses are notoriously difficult to get off the ground. No matter how good your product is or how good your team is, some of the biggest problems you...

Kubernetes: a secure, flexible and automated edge for IoT developers

Cloud native software such as containers and Kubernetes and IoT/edge are playing a prominent role in the digital transformation of enterprise organisations....

How to launch IoT devices – Part 1: Why it takes so long

(This blog post is part of a 5 part series, titled “How to launch IoT devices”. It will cover the key choices and concerns when turning bright IoT ideas into...