Safeguarding Digital Transformation with the Platform Security Architecture (PSA)

Businesses are transforming the way they work, introducing new technologies to innovate and discover new opportunities. Connected devices are driving this digital transformation, generating data and insights that influence key decisions.

 

The value of all this new data relies solely on its trustworthiness, making security one of the greatest threats to digital transformation.

 

Security is constantly changing and evolving. With regulations always on the horizon and new threats being identified, businesses need a strategy to protect against future security threats. The Platform Security Architecture (PSA) offers a framework for securing connected devices. It provides a step-by-step guide to building in the right level of device security, reducing risk around data reliability, and allowing businesses to innovate on new ideas to reap the benefits of digital transformation.

 

To find out more about PSA and how it can help your company achieve its own digital transformation, watch this webinar.

Watch Webinar
PSA Benefits
Reduce Costs and Time

Accelerates the development of secure systems

Increase Confidence

Provides confidence in alignment with regulatory frameworks

Measurable Security

Offers an industry-standard measurement on security implementation, with PSA Certified

Four Steps To Ease Security Design

The PSA was created to help ensure security is designed into a device from the ground up. The four PSA stages guide security implementation for each specific use case:

  • Analyze: the evaluation of assets and assessment of threats to define specific security requirements.
  • Architect: the security design based on identified security requirements.
  • Implement: an open source firmware implementation that complies with the specifications from the architect stage.
  • Certify: assurance that products adhere to security requirements and PSA guidelines, through the PSA Certified scheme.

Download this white paper for an in-depth explanation and overview of the four stages of the PSA framework.

Download White Paper

Growing Industry Momentum

Built on industry best practices, the Platform Security Architecture goes beyond outlining security rules and guidelines, providing practical implementation guides and tools.

 

Arm is working with the ecosystem to simplify and accelerate the path to secure systems, redefining security for connected devices. Many industry leaders have already pledged their support for PSA, and are using PSA Certified as a benchmark for measuring the security evaluation of their products.

Simplifying the Journey for Software Developers

PSA helps simplify secure software development by offering reusable components and APIs to test your implementation.

  • Trusted Firmware-M (TF-M) provides a reference implementation of secure software that complies with architecture specifications and offers reusable components to cover fundamental security functions. This software can be reused to ensure easy porting to chips and platforms, and to create a trusted environment. Secure functions include the PSA Entity Attestation Token (PSA EAT), a revolutionary way for IoT devices to verify their security implementation which can be read by the entire ecosystem.  
  • PSA Developer APIs provide an interface to the underlying security functions implemented in a device. A consistent developer experience helps reduce time-to-market for security and lets developers focus on product functionality.
  • TF-M works directly with Arm Keil MDK and CMSIS packs to simplify software configuration to custom hardware.

Get Started with PSA Today

A range of resources are available to guide you through the four phases of PSA, making security implementation as simple and as cost-effective as possible.

Learn More
Talk with an Expert

Interested in learning more about how you can adopt the Platform Security Architecture? Talk with an Arm expert. 

Contact Us
Innovation
What We're Thinking

For the IoT to Deliver, We Need to Agree How We Secure It

Why You Should Care About Threat Modelling

Arm Security Manifesto - Learn Seven New Principles to Design Secure IoT Devices