Security Basics#

This section introduces the basics of security in embedded processors.

With emerging connectivity and complexity of embedded processors through IoT, security vulnerabilities have become easily exploitable. This has led to a growing need to design security-centric embedded SoCs. With this in mind, TI considers security tablestakes in all processor families.

Specialized effort targeted towards security requires extra resources, but the upfront cost is inconsequential compared to the cost of compromised data confidentiality, integrity, authenticity, and accessibility. Additionally, embedded systems are often produced in great numbers, resulting in a lowered per-unit cost of the security subsystem.

Security systems are often architected in layers and take advantage of compartmentalization. The security pyramid below shows the layers of a comprehensive security system for TI embedded processors.

Example image

Security enablers in embedded systems.#