Safeguarding Digital Transformation with the Platform Security Architecture (PSA)
Businesses are transforming the way they work, introducing new technologies to innovate and discover new opportunities. Connected devices are driving this digital transformation, generating data and insights that influence key decisions.
The value of all this new data relies solely on its trustworthiness, making security one of the greatest threats to digital transformation.
Security is constantly changing and evolving. With regulations always on the horizon and new threats being identified, businesses need a strategy to protect against future security threats. The Platform Security Architecture (PSA) offers a framework for securing connected devices. It provides a step-by-step guide to building in the right level of device security, reducing risk around data reliability, and allowing businesses to innovate on new ideas to reap the benefits of digital transformation.
To find out more about PSA and how it can help your company achieve its own digital transformation, watch this webinar.
Four Steps To Ease Security Design
The PSA was created to help ensure security is designed into a device from the ground up. The four PSA stages guide security implementation for each specific use case:
- Analyze: the evaluation of assets and assessment of threats to define specific security requirements.
- Architect: the security design based on identified security requirements.
- Implement: an open source firmware implementation that complies with the specifications from the architect stage.
- Certify: assurance that products adhere to security requirements and PSA guidelines, through the PSA Certified scheme.
Download this white paper for an in-depth explanation and overview of the four stages of the PSA framework.
Growing Industry Momentum
Built on industry best practices, the Platform Security Architecture goes beyond outlining security rules and guidelines, providing practical implementation guides and tools.
Arm is working with the ecosystem to simplify and accelerate the path to secure systems, redefining security for connected devices. Many industry leaders have already pledged their support for PSA, and are using PSA Certified as a benchmark for measuring the security evaluation of their products.
PSA helps simplify secure software development by offering reusable components and APIs to test your implementation.
- Trusted Firmware-M (TF-M) provides a reference implementation of secure software that complies with architecture specifications and offers reusable components to cover fundamental security functions. This software can be reused to ensure easy porting to chips and platforms, and to create a trusted environment. Secure functions include the PSA Entity Attestation Token (PSA EAT), a revolutionary way for IoT devices to verify their security implementation which can be read by the entire ecosystem.
- PSA Developer APIs provide an interface to the underlying security functions implemented in a device. A consistent developer experience helps reduce time-to-market for security and lets developers focus on product functionality.
- TF-M works directly with Arm Keil MDK and CMSIS packs to simplify software configuration to custom hardware.
The PSA security framework offers a guide for deploying secure systems in a multitude of markets, including the infrastructure edge. This white paper reveals:
- How to build a secure infrastructure edge platform.
- What foundational specifications are needed for hardware and firmware?
- What standard security services are common with IoT endpoints?
- How isolation allows multiple vendors to run platform security services in the same device.
- How the TrustedFirmware.org OSS project offers a reference implementation for developers.
Download this white paper to learn how you can deploy PSA in the infrastructure edge.
Interested in learning more about how you can adopt the Platform Security Architecture? Talk with an Arm expert.