SlideShare a Scribd company logo
Cybersecurity and Software
Updates in Medical Devices
Justin Noel, ICS
Daniel Lang, Toradex
1
January 25, 2023
About ICS
Established in 1987, Integrated Computer
Solutions, Inc. (ICS) delivers innovative software
solutions with a full suite of services to accelerate
development of successful next-gen products.
ICS is headquartered outside Boston in Waltham,
Mass. with offices in California, Canada and
Europe. Currently 160 people.
Boston UX is ICS’ design studio, specializing in
intuitive touchscreen and multimodal interfaces
for high-impact embedded and connected
devices.
2
www.ics.com
Delivering a
Full Suite of
Medtech
Services
3
● Human Factors Engineering
● IEC 62366-UX/UI Design
● Custom Frontend and Backend Software
Development
● Development with IEC 62304-Compliant Platform
● Low-code Tools that Convert UX Prototype to
Product
● Medical Device Cybersecurity
● AWS and Azure Cloud Services and Analytics
● ISO 14971-Compliant Hazard Analysis
● Software Verification Testing
● Complimentary Software Technology Assessment
Toradex - What We Do
Make Embedded Computing Easy
Reliable Arm System-on-Modules
Torizon - Linux IoT Platform
Lowest Cost of Ownership
Industry-leading Support
4
Focus Verticals
• Industrial Automation
• Healthcare
• Transportation
• Test & Measurement
• Smart City
Typical Annual Volumes
100 to 50k Pcs Per Customer Project
Typical Applications
5
Toradex - Numbers
FOUNDED
2003
ACTIVE CUSTOMERS
3000+
EMPLOYEES
150+ 8
GLOBAL OFFICES
70+
PROVEN PARTNERS
6
Toradex Survey 2020
7
Toradex Survey 2020
8
PSA Certified 2022 Security Report
9
Global Trend In New Regulations
10
Europa Télécommunications Standards Institute (ETSI) EN 303 645
California State Law SB-327
Oregon IoT Law (House Bill 2395)
NIST 8259A
ISO/SAE 21434 – THE CYBERSECURITY STANDARD
IEC 62443
CYBERSECURITY MATURITY MODEL CERTIFICATION CMMC 2.0 – DoD
White House - Executive Order on Improving the Nation’s Cybersecurity
Many More………..
Global Trend In New Regulations
11
Global Trend In New Regulations
12
Some Common Requirements
• No Default Passwords
• Way to Timely Patch Vulnerability
• Log Access
• Software Bill of Material
Poll - How do you do Software Updates
13
• Remote Updates Regular
• Remote Updates When Needed
• Offline Updates Regular
• Offline Updates When Needed
• No Updates ?
Example: Electric Vehicles Charger
14
Example: Medical Devices for Hospitals
15
Poll - What drives your Security Requirements ?
16
• Company Policy / Best Practices
• Customers
• Government Regulations
• Other Regulations / Standards
• None of the above ?
• Example is a Swiss Company
• Medical Devices traditionally
avoided changes to SW or HW
• The Situation is changing
• Devices are connected
› Example: Control Centers in
Hospitals or even for Home
Care with Remote Monitoring
RWJBarnabas Health Community Medical Center
Example: Medical Devices for Hospitals
17
IT security requirements for third - party systems
Example: Medical Devices for Hospitals
18
Example: Medical Devices for Hospitals
19
Example: Medical Devices for Hospitals
20
Recent FDA Guidance Regarding Software Updates
Cybersecurity in Medical Devices (Latest Draft April 2022)
https://www.fda.gov/media/119933/download
FDA Guidance is a slow process, but PATCH Act 2022 may make this US law.
When to Submit a 510(k) for a Software Change to an Existing Device (2017)
https://www.fda.gov/media/99785/download
Clarification of 510(k) re-submission criteria
21
Reasons For New Guidance and Clarifications
Once upon a time system level updates for medical devices were rare
COTS processes and re-validation for OS/Library updates were burdensome
Resulted in base libraries and OS’s sometimes not being updated at all
Wait until next major device revision (next 510(k) submission)
Security issues were mitigated by air gapping and physical access
In a connected world, air gaps are no longer possible
Results were a cybersecurity nightmare
We have run into devices running ancient versions of WinCE wo/SP
22
Clarification on 510(k) Submissions
510(k) NOT Required
Strengthen cyber security wo / changes to app / controls SW (OS Patch)
Return device to specifications of cleared device (Bug Fixes)
510(k) Required
Updates change the safety or effectiveness of the device
Risk based assessment needs to be performed to determine significance of
changes both individual and cumulative changes.
23
510(k) Decision Flow Chart
24
Cybersecurity Communication and Patchability
Design software for patchability
Isolated software components are easier to test and manage risk
Patching Capability
Rate at which updates can be fielded.
Communication of software vulnerabilities and update availability
Ability to re-execute V&V Testing
If V&V takes several months your patching capability will be low.
25
Cybersecurity Considerations for Updates
FDA requires that updates are verified to be authentic and unadulterated
Signed
Update was created by the manufacturer for this medical device.
Secure chain of custody
Ensure that updates cannot be corrupted or compromised
Resilient to failure
Controlled combination of system components
Only allow software combinations that have been tested
26
Projects Over the Last 15 years
ICS developed many in house solutions for customers
OS Build (Yocto, BuildRoot, Windows Embedded)
Update packaging (Encryption, signing)
Secure bootloader (modified u-boot for applying updates)
Error resistant partitioning schemes (A/B Updates)
Portals / webservices / middleware for update notification and distributions
Off the shelf products, frameworks and hardware are now available
Much easier to write and maintain
27
Popular SW Update Solutions
● Torizon
● Mender
● Balena
● SwUpdate
● OSTree
● Aktualizr
● Uptane
● Torizon
28
A/B Upgrades
● Dual A/B identical rootfs partitions
● Data partition for storing any persistent data which is left unchanged during
the update process
● Typically a client application runs on the embedded device and periodically
connects to a server to check for updates
● If a new software update is available, the client downloads and installs it on
the other partition
● Fallback in case of update failure
29
Delta Updates
● Only the binary delta between the difference is sent to the embedded device
● Works in a Git-like model for filesystem trees
● Saves storage space and connection bandwidth
● Rollback of the system to a previous state
30
A/B vs Delta Updates
31
Update strategy Storage space Update size Rollback to a
previous stage
Fallback to a
back-up image
on a separate
partition
A/B
Updates
Large Large Yes Yes
Delta
Updates
Small Small Yes No
Container-based Updates
● Container technology has changed the way application developers interact
with the cloud and some of the good practices are nowadays applied to the
development workflow for embedded Linux devices and Internet of Things
● Containers make applications faster to deploy, easier to update and more
secure through isolation
● Yocto/OE layer meta-virtualization provides support for building Xen, KVM,
Libvirt, docker and associated packages necessary for constructing OE-based
virtualized solutions
32
Leveraging Hardware Encryption Support
HSM: Hardware Security Module.
TPM: Trusted Platform Module (also known as ISO/IEC 11889).
CAAM: Cryptographic Accelerator and Assurance Module (NXP i.MX processors).
33
CAAM (Cryptographic Accelerator and Assurance Module)
CAAM on the Freescale i.MX platform supports the following:
● Secure memory feature with hardware-enforced access control
● Cryptographic authentication
● Authenticated encryption algorithms
● Symmetric key block ciphers
● Symmetric key stream ciphers
● Random-number generation
34
Hosting Solutions
Microsoft Azure IoT
Excellent framework for general IoT and update distribution
ICS has written in house C++ wrappers around Azure IoT
Distribution of updates amount other things
Torizon OTA
Turnkey solution for fleet management
35
Torizon - Be Faster - Be Secure - Be Reliable
36
Torizon
37
Based on Uptane Framework
• Used by major Automotive OEM
• Designed with State Actors Attackers in mind
• JDF/Linux Foundation Project
• Independent Security Audits
• Expands on The Update Framework (TUF)
● Cloud Native Computing Foundation
Torizon
38
Key Technology: OSTree
OpenSource
Git - Like
Space savings
● Including automatic de-duplication
Minimal update size
● Diff updates of per-file changes
Integrity can be verified
Atomic updates
Immutability & Revision Control
Torizon - Supported Hardware
39
https://www.torizon.io/supported-hardware
Torizon
40
www.torizon.io
Questions?
41
www.toradex.com
developer.toradex.com
community.toradex.com
labs.toradex.com
www.ics.com.com
info@ics.com

More Related Content

PDF
Taiwan medical device registration and approval chart - EMERGO
PDF
Europe CE Marking for medical devices under new MDR
PDF
Secure Your Medical Devices From the Ground Up
 
PPTX
Medical device regulations in india
PPTX
Generative AI and law.pptx
PDF
How to Reduce the Attack Surface Created by Your Cyber-Tools
PDF
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
PDF
The Future is in Responsible Generative AI
Taiwan medical device registration and approval chart - EMERGO
Europe CE Marking for medical devices under new MDR
Secure Your Medical Devices From the Ground Up
 
Medical device regulations in india
Generative AI and law.pptx
How to Reduce the Attack Surface Created by Your Cyber-Tools
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
The Future is in Responsible Generative AI

What's hot (20)

PPTX
Unit 4 -IOT5.pptx
PDF
Enabling Technologies and Distributed System Models
PPTX
Wireless Body Area network
PPTX
Mobile Cloud Computing
PPTX
Software defined networking(sdn) vahid sadri
PPTX
Sandbox
PPTX
Linux v/s Windows
PDF
Data Center Security
PDF
Cyber securityppt
PPTX
What is Virtualization
PPTX
Model-based Automotive Software Development using Autosar, UML, and Domain-Sp...
PPTX
Pervasive Computing
PPT
Profissões Invisíveis: Coveiro
PDF
FIWARE Tech Summit - OpenMTC – OneM2M Middleware
PPTX
IoT Platforms and Architecture
PPTX
Small Business Backup & Disaster Recovery
DOCX
Virtualization Questions
PPT
Virtualization in cloud
PPTX
Rain technology
PPTX
Virtualization security threats in cloud computing
Unit 4 -IOT5.pptx
Enabling Technologies and Distributed System Models
Wireless Body Area network
Mobile Cloud Computing
Software defined networking(sdn) vahid sadri
Sandbox
Linux v/s Windows
Data Center Security
Cyber securityppt
What is Virtualization
Model-based Automotive Software Development using Autosar, UML, and Domain-Sp...
Pervasive Computing
Profissões Invisíveis: Coveiro
FIWARE Tech Summit - OpenMTC – OneM2M Middleware
IoT Platforms and Architecture
Small Business Backup & Disaster Recovery
Virtualization Questions
Virtualization in cloud
Rain technology
Virtualization security threats in cloud computing
Ad

Similar to Cybersecurity and Software Updates in Medical Devices.pdf (20)

PDF
5 Key Considerations at the Start of SaMD Development
 
PDF
Overcome Hardware And Software Challenges - Medical Device Case Study
 
PPTX
IoT and M2M Safety and Security
PPTX
Cruatech Services Intro
PDF
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
PDF
Maintaining Continuous Compliance with HCL BigFix
PPTX
Learn how to make your IoT pilot projects and POCs successful
PDF
internet-of-things-5.........................pdf
PDF
Safeguard Your Medical Devices from Cyber Threats
 
PPTX
Optimizing Healthcare with Sphere3D VDI and Containerization
PDF
Embedded Controls Development (1).pdf
PDF
[Webinar] Software: The Lifeblood of any Medical Device
 
PDF
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
PDF
Top IoT Software Development Challenges and How to Overcome Them
PDF
Trends and Challenges in the Field of Embedded Systems
PDF
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
PPTX
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
PPTX
What's new in System Recovery 22.pptx
PDF
VMworld 2014: Virtualization 101
PDF
2017-07-12 GovLoop: New Era of Digital Security
5 Key Considerations at the Start of SaMD Development
 
Overcome Hardware And Software Challenges - Medical Device Case Study
 
IoT and M2M Safety and Security
Cruatech Services Intro
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Maintaining Continuous Compliance with HCL BigFix
Learn how to make your IoT pilot projects and POCs successful
internet-of-things-5.........................pdf
Safeguard Your Medical Devices from Cyber Threats
 
Optimizing Healthcare with Sphere3D VDI and Containerization
Embedded Controls Development (1).pdf
[Webinar] Software: The Lifeblood of any Medical Device
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Top IoT Software Development Challenges and How to Overcome Them
Trends and Challenges in the Field of Embedded Systems
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
What's new in System Recovery 22.pptx
VMworld 2014: Virtualization 101
2017-07-12 GovLoop: New Era of Digital Security
Ad

More from ICS (20)

PDF
Understanding the EU Cyber Resilience Act
 
PDF
Porting Qt 5 QML Modules to Qt 6 Webinar
 
PDF
Medical Device Cybersecurity Threat & Risk Scoring
 
PDF
Exploring Wayland: A Modern Display Server for the Future
 
PDF
Threat Modeling & Risk Assessment Webinar: A Step-by-Step Example
 
PDF
8 Mandatory Security Control Categories for Successful Submissions
 
PDF
Future-Proofing Embedded Device Capabilities with the Qt 6 Plugin Mechanism.pdf
 
PDF
Choosing an Embedded GUI: Comparative Analysis of UI Frameworks
 
PDF
Medical Device Cyber Testing to Meet FDA Requirements
 
PDF
Threat Modeling and Risk Assessment Webinar.pdf
 
PDF
Secure-by-Design Using Hardware and Software Protection for FDA Compliance
 
PDF
Webinar On-Demand: Using Flutter for Embedded
 
PDF
A Deep Dive into Secure Product Development Frameworks.pdf
 
PDF
Practical Advice for FDA’s 510(k) Requirements.pdf
 
PDF
Accelerating Development of a Safety-Critical Cobot Welding System with Qt/QM...
 
PDF
Overcoming CMake Configuration Issues Webinar
 
PDF
Enhancing Quality and Test in Medical Device Design - Part 2.pdf
 
PDF
Designing and Managing IoT Devices for Rapid Deployment - Webinar.pdf
 
PDF
Quality and Test in Medical Device Design - Part 1.pdf
 
PDF
Creating Digital Twins Using Rapid Development Techniques.pdf
 
Understanding the EU Cyber Resilience Act
 
Porting Qt 5 QML Modules to Qt 6 Webinar
 
Medical Device Cybersecurity Threat & Risk Scoring
 
Exploring Wayland: A Modern Display Server for the Future
 
Threat Modeling & Risk Assessment Webinar: A Step-by-Step Example
 
8 Mandatory Security Control Categories for Successful Submissions
 
Future-Proofing Embedded Device Capabilities with the Qt 6 Plugin Mechanism.pdf
 
Choosing an Embedded GUI: Comparative Analysis of UI Frameworks
 
Medical Device Cyber Testing to Meet FDA Requirements
 
Threat Modeling and Risk Assessment Webinar.pdf
 
Secure-by-Design Using Hardware and Software Protection for FDA Compliance
 
Webinar On-Demand: Using Flutter for Embedded
 
A Deep Dive into Secure Product Development Frameworks.pdf
 
Practical Advice for FDA’s 510(k) Requirements.pdf
 
Accelerating Development of a Safety-Critical Cobot Welding System with Qt/QM...
 
Overcoming CMake Configuration Issues Webinar
 
Enhancing Quality and Test in Medical Device Design - Part 2.pdf
 
Designing and Managing IoT Devices for Rapid Deployment - Webinar.pdf
 
Quality and Test in Medical Device Design - Part 1.pdf
 
Creating Digital Twins Using Rapid Development Techniques.pdf
 

Recently uploaded (20)

PDF
Softaken Excel to vCard Converter Software.pdf
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPTX
CHAPTER 2 - PM Management and IT Context
PPTX
Introduction to Artificial Intelligence
PDF
Nekopoi APK 2025 free lastest update
PPTX
L1 - Introduction to python Backend.pptx
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PPTX
history of c programming in notes for students .pptx
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PPT
Introduction Database Management System for Course Database
PDF
How Creative Agencies Leverage Project Management Software.pdf
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Softaken Excel to vCard Converter Software.pdf
How to Choose the Right IT Partner for Your Business in Malaysia
PTS Company Brochure 2025 (1).pdf.......
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Upgrade and Innovation Strategies for SAP ERP Customers
Odoo Companies in India – Driving Business Transformation.pdf
CHAPTER 2 - PM Management and IT Context
Introduction to Artificial Intelligence
Nekopoi APK 2025 free lastest update
L1 - Introduction to python Backend.pptx
VVF-Customer-Presentation2025-Ver1.9.pptx
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
history of c programming in notes for students .pptx
Wondershare Filmora 15 Crack With Activation Key [2025
Introduction Database Management System for Course Database
How Creative Agencies Leverage Project Management Software.pdf
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...

Cybersecurity and Software Updates in Medical Devices.pdf

  • 1. Cybersecurity and Software Updates in Medical Devices Justin Noel, ICS Daniel Lang, Toradex 1 January 25, 2023
  • 2. About ICS Established in 1987, Integrated Computer Solutions, Inc. (ICS) delivers innovative software solutions with a full suite of services to accelerate development of successful next-gen products. ICS is headquartered outside Boston in Waltham, Mass. with offices in California, Canada and Europe. Currently 160 people. Boston UX is ICS’ design studio, specializing in intuitive touchscreen and multimodal interfaces for high-impact embedded and connected devices. 2
  • 3. www.ics.com Delivering a Full Suite of Medtech Services 3 ● Human Factors Engineering ● IEC 62366-UX/UI Design ● Custom Frontend and Backend Software Development ● Development with IEC 62304-Compliant Platform ● Low-code Tools that Convert UX Prototype to Product ● Medical Device Cybersecurity ● AWS and Azure Cloud Services and Analytics ● ISO 14971-Compliant Hazard Analysis ● Software Verification Testing ● Complimentary Software Technology Assessment
  • 4. Toradex - What We Do Make Embedded Computing Easy Reliable Arm System-on-Modules Torizon - Linux IoT Platform Lowest Cost of Ownership Industry-leading Support 4
  • 5. Focus Verticals • Industrial Automation • Healthcare • Transportation • Test & Measurement • Smart City Typical Annual Volumes 100 to 50k Pcs Per Customer Project Typical Applications 5
  • 6. Toradex - Numbers FOUNDED 2003 ACTIVE CUSTOMERS 3000+ EMPLOYEES 150+ 8 GLOBAL OFFICES 70+ PROVEN PARTNERS 6
  • 9. PSA Certified 2022 Security Report 9
  • 10. Global Trend In New Regulations 10
  • 11. Europa Télécommunications Standards Institute (ETSI) EN 303 645 California State Law SB-327 Oregon IoT Law (House Bill 2395) NIST 8259A ISO/SAE 21434 – THE CYBERSECURITY STANDARD IEC 62443 CYBERSECURITY MATURITY MODEL CERTIFICATION CMMC 2.0 – DoD White House - Executive Order on Improving the Nation’s Cybersecurity Many More……….. Global Trend In New Regulations 11
  • 12. Global Trend In New Regulations 12 Some Common Requirements • No Default Passwords • Way to Timely Patch Vulnerability • Log Access • Software Bill of Material
  • 13. Poll - How do you do Software Updates 13 • Remote Updates Regular • Remote Updates When Needed • Offline Updates Regular • Offline Updates When Needed • No Updates ?
  • 15. Example: Medical Devices for Hospitals 15
  • 16. Poll - What drives your Security Requirements ? 16 • Company Policy / Best Practices • Customers • Government Regulations • Other Regulations / Standards • None of the above ?
  • 17. • Example is a Swiss Company • Medical Devices traditionally avoided changes to SW or HW • The Situation is changing • Devices are connected › Example: Control Centers in Hospitals or even for Home Care with Remote Monitoring RWJBarnabas Health Community Medical Center Example: Medical Devices for Hospitals 17
  • 18. IT security requirements for third - party systems Example: Medical Devices for Hospitals 18
  • 19. Example: Medical Devices for Hospitals 19
  • 20. Example: Medical Devices for Hospitals 20
  • 21. Recent FDA Guidance Regarding Software Updates Cybersecurity in Medical Devices (Latest Draft April 2022) https://www.fda.gov/media/119933/download FDA Guidance is a slow process, but PATCH Act 2022 may make this US law. When to Submit a 510(k) for a Software Change to an Existing Device (2017) https://www.fda.gov/media/99785/download Clarification of 510(k) re-submission criteria 21
  • 22. Reasons For New Guidance and Clarifications Once upon a time system level updates for medical devices were rare COTS processes and re-validation for OS/Library updates were burdensome Resulted in base libraries and OS’s sometimes not being updated at all Wait until next major device revision (next 510(k) submission) Security issues were mitigated by air gapping and physical access In a connected world, air gaps are no longer possible Results were a cybersecurity nightmare We have run into devices running ancient versions of WinCE wo/SP 22
  • 23. Clarification on 510(k) Submissions 510(k) NOT Required Strengthen cyber security wo / changes to app / controls SW (OS Patch) Return device to specifications of cleared device (Bug Fixes) 510(k) Required Updates change the safety or effectiveness of the device Risk based assessment needs to be performed to determine significance of changes both individual and cumulative changes. 23
  • 25. Cybersecurity Communication and Patchability Design software for patchability Isolated software components are easier to test and manage risk Patching Capability Rate at which updates can be fielded. Communication of software vulnerabilities and update availability Ability to re-execute V&V Testing If V&V takes several months your patching capability will be low. 25
  • 26. Cybersecurity Considerations for Updates FDA requires that updates are verified to be authentic and unadulterated Signed Update was created by the manufacturer for this medical device. Secure chain of custody Ensure that updates cannot be corrupted or compromised Resilient to failure Controlled combination of system components Only allow software combinations that have been tested 26
  • 27. Projects Over the Last 15 years ICS developed many in house solutions for customers OS Build (Yocto, BuildRoot, Windows Embedded) Update packaging (Encryption, signing) Secure bootloader (modified u-boot for applying updates) Error resistant partitioning schemes (A/B Updates) Portals / webservices / middleware for update notification and distributions Off the shelf products, frameworks and hardware are now available Much easier to write and maintain 27
  • 28. Popular SW Update Solutions ● Torizon ● Mender ● Balena ● SwUpdate ● OSTree ● Aktualizr ● Uptane ● Torizon 28
  • 29. A/B Upgrades ● Dual A/B identical rootfs partitions ● Data partition for storing any persistent data which is left unchanged during the update process ● Typically a client application runs on the embedded device and periodically connects to a server to check for updates ● If a new software update is available, the client downloads and installs it on the other partition ● Fallback in case of update failure 29
  • 30. Delta Updates ● Only the binary delta between the difference is sent to the embedded device ● Works in a Git-like model for filesystem trees ● Saves storage space and connection bandwidth ● Rollback of the system to a previous state 30
  • 31. A/B vs Delta Updates 31 Update strategy Storage space Update size Rollback to a previous stage Fallback to a back-up image on a separate partition A/B Updates Large Large Yes Yes Delta Updates Small Small Yes No
  • 32. Container-based Updates ● Container technology has changed the way application developers interact with the cloud and some of the good practices are nowadays applied to the development workflow for embedded Linux devices and Internet of Things ● Containers make applications faster to deploy, easier to update and more secure through isolation ● Yocto/OE layer meta-virtualization provides support for building Xen, KVM, Libvirt, docker and associated packages necessary for constructing OE-based virtualized solutions 32
  • 33. Leveraging Hardware Encryption Support HSM: Hardware Security Module. TPM: Trusted Platform Module (also known as ISO/IEC 11889). CAAM: Cryptographic Accelerator and Assurance Module (NXP i.MX processors). 33
  • 34. CAAM (Cryptographic Accelerator and Assurance Module) CAAM on the Freescale i.MX platform supports the following: ● Secure memory feature with hardware-enforced access control ● Cryptographic authentication ● Authenticated encryption algorithms ● Symmetric key block ciphers ● Symmetric key stream ciphers ● Random-number generation 34
  • 35. Hosting Solutions Microsoft Azure IoT Excellent framework for general IoT and update distribution ICS has written in house C++ wrappers around Azure IoT Distribution of updates amount other things Torizon OTA Turnkey solution for fleet management 35
  • 36. Torizon - Be Faster - Be Secure - Be Reliable 36
  • 37. Torizon 37 Based on Uptane Framework • Used by major Automotive OEM • Designed with State Actors Attackers in mind • JDF/Linux Foundation Project • Independent Security Audits • Expands on The Update Framework (TUF) ● Cloud Native Computing Foundation
  • 38. Torizon 38 Key Technology: OSTree OpenSource Git - Like Space savings ● Including automatic de-duplication Minimal update size ● Diff updates of per-file changes Integrity can be verified Atomic updates Immutability & Revision Control
  • 39. Torizon - Supported Hardware 39 https://www.torizon.io/supported-hardware