Building Security Into Your Product

A Comprehensive IoT Security Framework to Design-in Best Practice

Skip to content

Threat Models and Security Model

Security design should always start with analysis of the end use case. The PSA Certified Security Model combined with threat model and security analysis documents work together to guide the security ingredients your product needs. You can:

  • Identify security requirements through threat modeling
  • Ensure key security principles receive consideration from product inception
  • Get a comprehensive picture to better understand costs and timelines up-front

Specifications and Reference Implementations

The PSA Certified ecosystem contributes security specifications that outline the recipe for security. With this information you can:

  • Guide security architecture
  • Speed time-to-security
  • Access firmware reference implementations of the PSA Root of Trust alongside the PSA Functional APIs