Need of Secure Firmware
Manufacturers of embedded systems should ensure that their devices only start with original and unmodified firmware and that only authorized configuration files and updates can be used. The required key material must be stored in a highly protected environment and only authorized users should have access to it. If this is not implemented effectively, there is a high risk of manipulation and misuse.The original software may run on faked hardware or vice versa, faked or manipulated software may run on the original hardware.
Non-authorized third-party companies are thus enabled to offer for example low priced replacement materials for systems with exchangeable sensors, software upgrades or special software features. In this case manufacturers would miss important sources of income, and quality and liability risks might arise for the entire system. MTG Secure Firmware uses digital signatures to ensure the trustworthiness of the embedded system throughout the entire device lifecycle.
MTG Secure Firmware
MTG Secure Firmware is responsible for all crypto operations (encryption, signing, key generation…), which are needed for secure boot, configuration and update of embedded systems. The initial boot process will be secured with the customer encryption key. All required symmetric and asymmetric keys are securely stored in the KMS and HSM.
MTG Secure Firmware is delivered as RMP package or on request on a pre-installed and configured server with a compatible HSM. It can be quickly and easily put into operation at a central and secure location. The connection of the development and production environment can be implemented very flexibly. For the integration of the build, configuration and update software the standard KMIP interface is available. On request, we can develop the appropriate adapters for the connection to the production environment. The hardware security modules are preconfigured and provided in a fail-safe manner.