Security Features

Protection mechanisms for secure embedded systems

In safety-critical applications, protecting hard- and software as well as firmware, and communication paths is essential. Security functions safeguard embedded systems against tampering, data theft, and unauthorized access. iesy integrates security features that ensure protection at all levels – from the boot phase to ongoing operation.

Our standards at a glance

  • Chain of Trust, Secure Boot – protection against unsigned code at system startup
  • TPM modules – trust anchors for data and platform integrity
  • Hardware encryption – real-time protection for sensitive data
  • Firmware integrity protection – secure against manipulation
  • Physical tamper protection – safeguards through design and sensors

iesy Expertise

  • Our manufacturing processes are supported by the use of a full chain of trust and a public key infrastructure.
  • iesy implements Trusted Boot, Secure Boot, and integrity checks to reliably detect and prevent tampering.
  • We secure software and update processes with cryptographic methods such as update signing, rollback protection, and dm-verity.
  • We use read-only RootFS and OverlayFS to ensure system integrity is permanently maintained during operation.

Additional context – concise and to the point.

INFO
BOX

iesy & friends Newsletter

Sign up now and stay up to date