Registration has ended
Info
Training Description: Embedded & IoT Security - Full Lifecycle
How do you secure networked embedded devices against cyber threats?
In this training you will learn what it takes to secure connected embedded devices. Starting with the big picture, you will be introduced to security best practices as well as technical challenges like managing secrets or the integrity on an embedded platform on a productive scale.
Concepts such as security by design as well as security aspects for all phases of the product’s lifecycle (design, development, production, maintenance, decommissioning) are explained using lot’s of examples and best practices.
You will learn the essentials about commonly used cryptography – Why do you need which crypto primitives to reach your security goals.
We will focus specifically on aspects of embedded devices and derive answers to many questions such as:
- Where should I start with security in my project?
- What are current regulations demanding in respect of cybersecurity?
- What standards can be taken as reference?
- How to protect keys, IP, or firmware on an embedded device?
- What are attackers capable of?
- Why should anyone hack my YouNameIt®?
- How is key provisioning and onboarding done in practice?
- How to deal with post quantum cryptography issues?
- What are good ways to keep embedded systems updated?
Practice is very important for us and we are happy to answer questions during the training. Some aspects are discussed and explained using an embedded Linux device sending data to an IoT backend.
If requested, an additional workshop or training day with the focus on certain branches like Automotive, Agriculture, Industrial Automation, Energy (Solar Inverters, Batteries, Energy Management Systems) can be planned.
Target Group
product managers, embedded developers, system architects, connectivity architects, IoT system administrators
Prerequisites
No programming skills are needed, but a background in embedded systems or security topics is helpful.
No special tools are needed, but a notebook with network card is recommended to be used to interact with the practical demonstrators.
We recommend to take the e-learning courses on
- Information security https://embedded-academy.com/en/courses/information-security-en/ and
- Cryptography https://embedded-academy.com/en/courses/cryptography/ and for employees in Automotive we also recommend
- Automotive cybersecurity https://embedded-academy.com/en/courses/automotive-cybersecurity-en/ before the training.
Seminarinhalte: Cybersecurity Seminar für Embedded & IoT
How to secure any Thing?
- Security Introduction, Assets, Security Goals
- Hacker: Motivation, Classification, Tools, Real Life Examples
- Security Engineering – Security in the Product Lifecycle
- Introduction to Risk Assessment
- Security Best practices
Standards and Regulations
- Ongoing regulatory activities in the EU (e.g. RED, CRA, NIS2)
- Overview of available standards and regulations with a focus on embedded systems and IoT
- Practical deep dive into EN 3030645 Cybersecurity for Consumer IoT
- Deriving and explaining security requirements
Cryptographic Toolbox
- Module about WHY we need crypto, not how it works
- What security goals can be achieved with which cryptographic functions
- Security Hash Functions
- Symmetric cryptography
- Asymmetric cryptography
- Attack Options
- Certificates and PKIs
Trust and Crypto in Embedded Hardware
- Crypto Accelerators
- Trusted execution environment
- Secure key storage (SE, HSM, TPM, …)
- Secure Boot concept
Safe and Secure Software Update Concepts for Embedded devices
- Local, network and OTA (over the air)
- Update System Requirements
- Update types for embedded Linux devices
- Software Signing and validation
- Open Source Update System examples (RAUC, SWupdate, hawkBit)
Key and Device Provisioning and Onboarding
- Key Provisioning Challenges
- Provisioning Options (JITR, JITP, Batch Provisioning)
- Zero Touch – Automated device registration and onboarding
Application of the know-how in practice - example using an embedded Linux device
Various aspects are demonstrated and explained in practice. This is done using an embedded Linux device that communicates with an IoT backend.
Certificate of participation
You will receive a cerficate of participation to the training including content information.
Event location
Domplatz 793047 Regensburg
Deutschland
Coordinates (lat, long):
49.019356, 12.096939
Show mapRoute planner