CHAPTER 10
Hardware Assurance Best Practices
In this chapter you will learn:
• How hardware can be used to create a root of trust
• How to use and update firmware securely
• How to protect data using hardware-based security
• Anti-tamper techniques for hardware
Every successful hardware has a software behind.
—Thiru Voonna
We began this second part of the book by discussing security solutions for infrastructure management. In the last chapter, we covered software assurance best practices. We now wrap up our discussion of software and systems security by addressing hardware assurance. It has been said that, if attackers can get their hands on your devices, they will eventually own anything in them. This may be true in some extreme cases ...
Get CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Second Edition (Exam CS0-002), 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.