The following is a list of security recommendations and ideas that have traditionally worked. Again, it is important to have a blanket of security:
- Use the most current operating system and libraries with all relevant patches
- Use hardware that incorporates security features like Trusted Execution. Environments, Trusted Platform Modules, and non-execute spaces.
- Obfuscating code in the hopes a hacker will not reverse engineer it is relatively useless. Sign, encrypt and protect your firmware and software images, especially those freely available on a company website.
- Randomize default passwords.
- Use a Root of Trust and secure boot to ensure you have a "golden" image of software running on a customer device.
- Eliminate hardcoded ...