Attacking the booting image on an embedded device is a frequently exploited path for malicious actors in the embedded industry. Guaranteeing the authenticity and the integrity of the image at boot time is paramount for a secure product. For security-minded companies and regulatory compliance, many designs now require these checks at boot time to ensure the image has not been tampered with. This feature is commonly called Secure Boot, High Assurance Boot, Trusted Boot or Verified Boot and it is now integrated into Toradex offerings!
In this webinar, we explain what Secure Boot is, why it’s needed, and how it’s implemented. We also present a live demo, illustrating how Toradex makes it easy to enable Secure Boot using the Yocto-based Linux Torizon OS. Finally, we show you how to deliver Linux OS Images (and Bootloaders!) in a secure and reliable way via Remote OTA updates to Secure Boot-enabled devices.
- Learn about why Secure Boot is necessary, and how it simplifies compliance with cyber security regulations such as the EU Cyber Resilience Act (CRA)
- Dive into what Secure Boot even is, and how it can be implemented
- Understand how Toradex makes it easy to start securing your devices
- Learn how to reliably and securely update the bootloader and the OS even in a Secure Boot-enabled device