Layered Security for Your Next SoC
Arm provides a range of security IP products designed to protect against a variety of different attacks, even physical attacks. Arm security IP extends across the system with processors and subsystem protection (both hardware and software), as well as acceleration and offloading.
When considering how to secure your SoC or device, it's essential to start thinking about security implementation at the very beginning. If you're new to security, the wide variety of vulnerabilities and mitigations can feel a little daunting, which is why our security products support the Platform Security Architecture (PSA). PSA is an architecture-agnostic framework to help you secure your devices from the ground up and is available completely free of charge. The four-phase approach helps you analyze your use case, architect systems, implement the solution, and then certify that everything is working as expected.
Arm provides an expanding portfolio of secure IP, firmware and software, collaborating with the ecosystem to provide the right counter-measures for the variety of threats now facing devices.
Arm CryptoCell Family
Arm CryptoCell enables the protection of assets (code and data) belonging to different stakeholders in an ecosystem (for example, silicon vendor, OEM, service provider, user). CryptoCell enables SoC designers to trade off area, power, performance or robustness in a very flexible manner so that SoC designs can be optimized to achieve the most appropriate security level for the target market.
Arm CryptoIsland Family
The CryptoIsland family of products provides Arm partners with a highly integrated security subsystem. With security services similar to the CryptoCell family, CryptoIsland provides a fully isolated subsystem for those who need the additional security, with the addition of greater scope for programmability and reuse.
Physical Security Solutions
Arm's suite of physical security solutions empowers designers to build in the necessary physical protection at the heart of the device. The suite includes both processor IP equipped with tamper resistance, plus a range of IP specifically created to mitigate side-channel attacks.
Arm’s security portfolio is designed to protect against a broad spectrum of attacks, allowing partners to deploy the security level that best matches their application needs. Achieving layered security involves implementing technologies, processes and measures designed to protect systems, networks, and data from a range of attacks.
- Arm Security Survey – We asked 1,200 tech sector workers what they thought about security
- IoT Security Manifesto 2018
- Arm IoT security handbook