Layered Security for Your Next SoC
Arm provides a range of security IP products designed to protect against a variety of different attacks, even physical attacks. Arm security IP extends across the system with processors and subsystem protection (both hardware and software), as well as acceleration and offloading.
When considering how to secure your SoC or device, it's essential to start thinking about security implementation at the very beginning. If you're new to security, the wide variety of vulnerabilities and mitigations can feel a little daunting, which is why our security products support the Platform Security Architecture (PSA). PSA is an architecture-agnostic framework to help you secure your devices from the ground up and is available completely free of charge. The four-phase approach helps you analyze your use case, architect systems, implement the solution, and then certify that everything is working as expected.
Features and Benefits
More than 1,000 software, tools and service partners to support and enable the use of our technology.
The Arm Platform Security Architecture (PSA) is the framework for a common security best practice.
Our IP extends across the system with protection for processors, subsystems, acceleration, and offloading—all fitting together seamlessly for layered protection.
Arm continues to build on its history in mobile security, addressing new market requirements for developer-friendly, deterministic, real-time embedded and IoT applications.
Arm provides an expanding portfolio of secure IP, firmware and software, collaborating with the ecosystem to provide the right counter-measures for the variety of threats now facing devices.
Physical Security Solutions
Arm's suite of physical security solutions empowers designers to build in the necessary physical protection at the heart of the device. The suite includes both processor IP equipped with tamper resistance, plus a range of IP specifically created to mitigate side-channel attacks.
Arm's Systematic Approach to Product Security
Arm takes product security very seriously, making it central to everything we do. Security forms an integral part of our dedication to delivering quality to partners and the wider ecosystem.
Arm-based chips are already in more than 270 billion devices, and as the Internet of Things (IoT) rapidly expands, we expect that number to grow to a global network of one trillion connected devices. Security cannot be an afterthought. It must considered at inception, and each threat addressed with the appropriate countermeasure. Arm has been helping the ecosystem secure devices from chip to cloud for many years, and remains committed to an end-to-end approach to security.
Build a Secure IoT System-on-Chip
Designing a secure system-on-chip (SoC) is challenging and time-consuming. It involves defining a system architecture, acquiring the right IP and integrating many pieces of IP together to build a system that perfectly matches your requirements.
Arm Corstone helps SoC designers build secure systems faster and is the perfect starting point for your SoC, with reference packages that include a pre-verified subsystem that can be tailored to your specific needs.