Read CEO Ron Black’s ‘An open letter regarding Cyber Resilience of the UK’s Critical National Infrastructure’

Glossary

Security features

What are security features?

Security features, in the context of processors, refer to the built-in mechanisms and functionalities designed to enhance the security and protection of the software applications that run on it, the data it processes, and the system that it operates within.

Some common security features include:

  • Memory protection: Memory protection mechanisms help prevent unauthorized access and tampering with memory. Such features include memory access permissions and memory encryption/decryption.
  • Secure boot: Secure boot ensures that the firmware, OS, and other software components loaded during the boot process are authentic and have not been tampered with.
  • Secure enclaves: Secure enclaves or trusted execution environments (TEEs) create isolated and protected execution environments within the processor. These enclaves enable the secure execution of sensitive code and the isolation of critical data from other parts of the system.
  • Secure key management: Security features may include hardware-based key storage, secure key generation, and management mechanisms to protect cryptographic keys from unauthorized access or extraction.

 

Why use security features?

The purpose of security features is to reduce the risk of damage to items of value by malicious attackers. These items could include sensitive data, valuable IP, safe operation of the system, and even the reputation of the manufacturing brand. It does this by protecting the confidentiality, integrity, and availability of data, as well as preventing unauthorized access or tampering, and mitigating various security threats and attacks.

The specific security features available in a processor vary depending on the processor architecture and intended use cases. With integrated security features, processors provide a foundation for building secure systems and help mitigate various security risks and vulnerabilities.

Getting started with Codasip