www.keyfactor.com
Open in
urlscan Pro
141.193.213.20
Public Scan
Submitted URL: https://c2c6d04.na1.hubspotlinks.com/Ctc/OK+113/c2C6D04/VVv0pC5pnkGTW1bnSLv4yLvZyW1n-N7355hZZLN5ZDtS-5n4LbW5BWr2F6lZ3mDN7xQqpT3K9s7VB...
Effective URL: https://www.keyfactor.com/resources/iot-security/eight-steps-to-iot-security?utm_campaign=2023-q4_oct_newsletter_thesource...
Submission: On November 02 via api from ES — Scanned from ES
Effective URL: https://www.keyfactor.com/resources/iot-security/eight-steps-to-iot-security?utm_campaign=2023-q4_oct_newsletter_thesource...
Submission: On November 02 via api from ES — Scanned from ES
Form analysis
0 forms found in the DOMText Content
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media. To find out more about the cookies we use, see our Privacy Policy. If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked. Accept Decline Thumbnails Document Outline Attachments Layers Current Outline Item Previous Next Highlight All Match Case Match Diacritics Whole Words Color Size Color Thickness Opacity Presentation Mode Open Print Download Current View Go to First Page Go to Last Page Rotate Clockwise Rotate Counterclockwise Text Selection Tool Hand Tool Page Scrolling Vertical Scrolling Horizontal Scrolling Wrapped Scrolling No Spreads Odd Spreads Even Spreads Document Properties… Toggle Sidebar Find Previous Next of 21 Presentation Mode Open Print Download Current View FreeText Annotation Ink Annotation Tools Zoom Out Zoom In Automatic Zoom Actual Size Page Fit Page Width 50% 75% 100% 125% 150% 200% 300% 400% Eight Steps to IoT Security EBOOK A practical guide to implementing security in IoT devices 2© 2023 Keyfactor, Inc. All Rights Reserved | www.keyfactor.com Table of contents Introduction 3 Eight steps to IoT security 4 1. Identify the standards and regulations 5 2. Choose your device Root of Trust 7 3. Selecting an MCU 9 4. Set up your PKI for initial device certificates 10 5. Initial device certificates in your production line 12 6. Set up a role-based code signing procedure 16 7. Implement a secure bootloader 18 8. Manufacturing code signing 19 Conclusion 20 How Keyfactor can help 21 About the author: Guillaume Crinon Director of IoT Business Strategy, Keyfactor Guillaume joined Keyfactor as Director of IoT Business Strategy with the global IoT team in 2022. Before transitioning to this role, he was the IoT Strategy Manager for security and connectiv- ity with the AVNET Global IoT team in charge of Avnet-specific products, such as a family of reprogrammable SIM cards (eUICC) and leading the development of a management platform focusing on delivering secure over-the-air provi- sioning and upgrade services to IoT devices. Guillaume graduated from SUPELEC in Paris (MSc in EE) in 1994 and has co-authored 13 international patents in wireless systems and IC architectures/security to date. Guillaume has 28 years of experience in the semiconductor and software industry, IoT security, radio-frequency circuit design, project and team management, and business-development. For the past 8 years he has been focusing on IoT security technologies and the way to bridge the security gap between IT / enterprise platforms and low-power connected devices. More Information Less Information Close Enter the password to open this PDF file. Cancel OK File name: - File size: - Title: - Author: - Subject: - Keywords: - Creation Date: - Modification Date: - Creator: - PDF Producer: - PDF Version: - Page Count: - Page Size: - Fast Web View: - Close Preparing document for printing… 0% Cancel LinkedIn LinkTwitter LinkFacebook LinkLike ButtonDownload Link Request a Demo pdf:Digital Trust in a Connected World: Navigating the State of IoT Security pdf:Keyfactor Command For IoT Datasheet pdf:Keyfactor for Smart Home: Making Matter-Compliant Devices With Security by Design pdf:Five Guiding Tenets for IoT Security pdf:Matter - A Cybersecurity Perspective pdf:The Definitive Roadmap to Secure Code Signing pdf:Eight Steps to IoT Security // Pass Tracking Parameters to a Form on Another Page Using GTM // http://zackphilipps.com/store-gclid-cookie-send-to-hubspot/ function getCookie(name) { var value = '; ' + document.cookie; var parts = value.split('; ' + name + '='); if (parts.length == 2) return parts.pop().split(';').shift(); } function setCookie(name, value, days) { var date = new Date(); date.setTime(date.getTime() + (days * 24 * 60 * 60 * 1000)); var expires = '; expires=' + date.toGMTString(); document.cookie = name + '=' + value + expires + ';path=/'; } function getParam(p) { var match = RegExp('[?&]' + p + '=([^&]*)').exec(window.location.search); return match && decodeURIComponent(match[1].replace(/\+/g, ' ')); } function assignTrackingParameterToCookie(fieldParam, formType) { var field = getParam(fieldParam), inputs; if(field) { setCookie(fieldParam, field, 365); } if(formType == 'gform') { inputs = document.querySelectorAll('.' + fieldParam + ' input[type="text"]'); assignCookieValueToFormInput(fieldParam, inputs); } else if(formType == 'hubspot') { inputs = document.querySelectorAll('.hs-input[name="' + fieldParam + '"]'); assignCookieValueToFormInput(fieldParam, inputs); } } function assignCookieValueToFormInput(fieldParam, inputs) { var field = getCookie(fieldParam), length = inputs.length; if(field && length) { for(var i = 0; i < length; i++) { inputs[i].value = field; } } } window.onload = function() { assignTrackingParameterToCookie('gclid', 'hubspot'); assignTrackingParameterToCookie('utm_source', 'hubspot'); assignTrackingParameterToCookie('utm_medium', 'hubspot'); assignTrackingParameterToCookie('utm_campaign', 'hubspot'); assignTrackingParameterToCookie('utm_content', 'hubspot'); }