June 23, 2023
One of the most vulnerable stages of an IoT product is the manufacturing process. Ensuring that a device leaves the assembly line secured and ready to be connected requires some unique infrastructure and forethought. This article provides an overview of the primary security goals and best practices. The example is based on an ESP32 being provisioned to AWS, but the principles can be applied to any cloud infrastructure or hardware platform. SpinDance has developed patterns […]
August 1, 2022
Introduction This is Part Two of our series on Internet of Things (IoT) Security. In this second entry we continue our discussion of important security protections for IoT devices and systems. We are expanding our list to include five additional security must-haves, #6 through #10, which cover unique but equally important security protections for IoT. In our last security blog post we discussed must-haves #1 through #5 which include Secure Identity Secure Communication Secure Storage […]
March 29, 2022
Introduction The growth of the Internet of Things (IoT) products and services continues to boom. It’s become an expectation that most things are connected and taking advantage of cloud-based digital services. There are, of course, important security implications for all these connected devices. We’ve all heard of examples of IoT hacking. What makes matters worse is that the more successful your product is, the more attention you attract from would-be attackers. The revenue impact of […]