The device, after booting securely, must maintain the security that has been established. The secure boot, or configuration, of our products employ a Hardware Root of Trust with Authenticity, Confidentiality, and Integrity built in. An array of countermeasures are integrated into Silicon which aid in protecting against a myriad of attack vectors. Security is all about managing risk, and how much investment a customer wants to make to manage that risk.ĪMD employs world-class best practices to establish the trustworthiness of its Silicon, Software and Development Tools. It is also important to recognize that no system is completely immune to attack - with enough time, energy, resources and money, any system can be compromised. As can be seen from the pyramid, AMD and their customers have a shared responsibility to ensure the security of a system. As an example, developing fault tolerant application level security solutions deployed on a device that does not boot securely, is like building a mansion on a foundation of sand. Security must be considered throughout the entire product lifecycle in order to maximize the protection of a system. Looking holistically across all disciplines provides the best Defense in Depth approach. Our customers invest heavily in their products, and AMD devices must protect those investments from cloning, reverse engineering or other types of attacks that can extract the IP resident in AMD devices.Īs the Venn diagram accurately reflects, there are areas of uniqueness as well as significant areas of overlap between the disciplines. This effectively makes Cybersecurity a subset of Information Assurance in most applications.Īnti-Tamper (AT): Focused on protecting the customers’ intellectual property (IP) that is deployed in their product and contained within the device either as hardware or software. Fault tolerant design methods ensure that security is not compromised in the face of a fault.Ĭybersecurity: While Information Assurance assures all information in all forms of media, Cybersecurity is focused on the protection of information in the cyber domain. authentication and encryption) as well as fault tolerant design methods. This is done through standard cryptographic techniques (e.g. Information Assurance (IA): Information Assurance is focused on protecting the information, or data, the device is handling or processing. Supply chain security and risk management are key focus areas. Silicon, software, firmware and soft-IP must be "Trojan-free". Assurance: Focuses on the known pedigree and heritage of the system solution provided by AMD.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |