“In our experience, the organizations and individuals building and deploying IoT devices largely underestimate the critical need for the highest levels of cybersecurity in every network-connected device.” – Microsoft Whitepaper
Hardware of Trust
For example: Device identity and integrity are protected by hardware. Physical countermeasures resist side-channel attacks.
To test, ask yourself: Does the device have a unique, unforgeable identity that is inseparable from the hardware? Is the integrity of the device software secured by hardware?
For example: Hardware-enforced barriers between software components prevent a breach in one from propagating to others.
To test, ask yourself: Is a failure in one component of the device contained to that component? Can new compartments be added in field to address new security threats?
Don't stop there
To test your devices against the remaining properties, download the seven properties of highly secured devices - by the Microsoft Azure Sphere Team.Read Whitepaper