www.keyfactor.com Open in urlscan Pro
141.193.213.20  Public Scan

Submitted URL: https://c2c6d04.na1.hubspotlinks.com/Ctc/OK+113/c2C6D04/VVv0pC5pnkGTW1bnSLv4yLvZyW1n-N7355hZZLN5ZDtS-5n4LbW5BWr2F6lZ3mDN7xQqpT3K9s7VB...
Effective URL: https://www.keyfactor.com/resources/iot-security/eight-steps-to-iot-security?utm_campaign=2023-q4_oct_newsletter_thesource...
Submission: On November 02 via api from ES — Scanned from ES

Form analysis 0 forms found in the DOM

Text Content

This website stores cookies on your computer. These cookies are used to collect
information about how you interact with our website and allow us to remember
you. We use this information in order to improve and customize your browsing
experience and for analytics and metrics about our visitors both on this website
and other media. To find out more about the cookies we use, see our Privacy
Policy.

If you decline, your information won’t be tracked when you visit this website. A
single cookie will be used in your browser to remember your preference not to be
tracked.

Accept Decline
Thumbnails Document Outline Attachments Layers

Current Outline Item


Previous

Next
Highlight All Match Case
Match Diacritics Whole Words

Color
Size
Color
Thickness
Opacity
Presentation Mode Open Print Download Current View

Go to First Page Go to Last Page

Rotate Clockwise Rotate Counterclockwise

Text Selection Tool Hand Tool

Page Scrolling Vertical Scrolling Horizontal Scrolling Wrapped Scrolling

No Spreads Odd Spreads Even Spreads

Document Properties…
Toggle Sidebar

Find
Previous

Next
of 21
Presentation Mode Open Print Download Current View

FreeText Annotation Ink Annotation

Tools
Zoom Out

Zoom In
Automatic Zoom Actual Size Page Fit Page Width 50% 75% 100% 125% 150% 200% 300%
400%

Eight Steps
to IoT Security
EBOOK
A practical guide to implementing
security in IoT devices

2© 2023 Keyfactor, Inc. All Rights Reserved | www.keyfactor.com
Table of contents
Introduction 3
Eight steps to IoT security 4
1. Identify the standards and regulations 5
2. Choose your device Root of Trust 7
3. Selecting an MCU 9
4. Set up your PKI for initial device certificates 10
5. Initial device certificates in your production line 12
6. Set up a role-based code signing procedure 16
7. Implement a secure bootloader 18
8. Manufacturing code signing 19
Conclusion 20
How Keyfactor can help 21
About the author:
Guillaume Crinon
Director of IoT Business
Strategy, Keyfactor
Guillaume joined Keyfactor as Director of IoT
Business Strategy with the global IoT team in
2022.
Before transitioning to this role, he was the IoT
Strategy Manager for security and connectiv-
ity with the AVNET Global IoT team in charge
of Avnet-specific products, such as a family of
reprogrammable SIM cards (eUICC) and leading
the development of a management platform
focusing on delivering secure over-the-air provi-
sioning and upgrade services to IoT devices.
Guillaume graduated from SUPELEC in Paris
(MSc in EE) in 1994 and has co-authored 13
international patents in wireless systems and
IC architectures/security to date.
Guillaume has 28 years of experience in the
semiconductor and software industry, IoT security,
radio-frequency circuit design, project and team
management, and business-development. For the
past 8 years he has been focusing on IoT security
technologies and the way to bridge the security gap
between IT / enterprise platforms and low-power
connected devices.





















More Information Less Information
Close

Enter the password to open this PDF file.

Cancel OK
File name:

-

File size:

-


Title:

-

Author:

-

Subject:

-

Keywords:

-

Creation Date:

-

Modification Date:

-

Creator:

-


PDF Producer:

-

PDF Version:

-

Page Count:

-

Page Size:

-


Fast Web View:

-

Close
Preparing document for printing…
0%
Cancel

LinkedIn LinkTwitter LinkFacebook LinkLike ButtonDownload Link
Request a Demo
pdf:Digital Trust in a Connected World: Navigating the State of IoT Security
pdf:Keyfactor Command For IoT Datasheet
pdf:Keyfactor for Smart Home: Making Matter-Compliant Devices With Security by
Design
pdf:Five Guiding Tenets for IoT Security
pdf:Matter - A Cybersecurity Perspective
pdf:The Definitive Roadmap to Secure Code Signing
pdf:Eight Steps to IoT Security


// Pass Tracking Parameters to a Form on Another Page Using GTM //
http://zackphilipps.com/store-gclid-cookie-send-to-hubspot/ function
getCookie(name) { var value = '; ' + document.cookie; var parts = value.split(';
' + name + '='); if (parts.length == 2) return parts.pop().split(';').shift(); }
function setCookie(name, value, days) { var date = new Date();
date.setTime(date.getTime() + (days * 24 * 60 * 60 * 1000)); var expires = ';
expires=' + date.toGMTString(); document.cookie = name + '=' + value + expires +
';path=/'; } function getParam(p) { var match = RegExp('[?&]' + p +
'=([^&]*)').exec(window.location.search); return match &&
decodeURIComponent(match[1].replace(/\+/g, ' ')); } function
assignTrackingParameterToCookie(fieldParam, formType) { var field =
getParam(fieldParam), inputs; if(field) { setCookie(fieldParam, field, 365); }
if(formType == 'gform') { inputs = document.querySelectorAll('.' + fieldParam +
' input[type="text"]'); assignCookieValueToFormInput(fieldParam, inputs); } else
if(formType == 'hubspot') { inputs =
document.querySelectorAll('.hs-input[name="' + fieldParam + '"]');
assignCookieValueToFormInput(fieldParam, inputs); } } function
assignCookieValueToFormInput(fieldParam, inputs) { var field =
getCookie(fieldParam), length = inputs.length; if(field && length) { for(var i =
0; i < length; i++) { inputs[i].value = field; } } } window.onload = function()
{ assignTrackingParameterToCookie('gclid', 'hubspot');
assignTrackingParameterToCookie('utm_source', 'hubspot');
assignTrackingParameterToCookie('utm_medium', 'hubspot');
assignTrackingParameterToCookie('utm_campaign', 'hubspot');
assignTrackingParameterToCookie('utm_content', 'hubspot'); }