Explaining the nuances and security considerations one must be mindful of when deploying software updates to connected devices, to ensure the security and integrity of devices deployed in the wild.
A key requirement for connected devices/IoT is the ability to deploy software updates. Data breaches are occurring on a regular basis and extending devices outside the firewall perimeter increases the attack surface. There are on average 1-25 bugs/defects per 1,000 lines of code. The good news is that security breaches are largely preventable. The Center of Internet Security estimates that 80-90% can be prevented through swift software updates and patching, which are necessary in order to:
- Deploy bug fixes
- Patch security vulnerabilities
- Deliver new features
In this video, Northern.tech's Eystein Stenberg presents a talk for the Linux Foundation on key considerations when deploying software updates for connected devices.
Tags:
OTA
Related resources
Some similar resources you may also be interested in
Over-the-air (OTA) update best practices for industrial IoT and embedded devices
Secure and robust OTA updates are the staple of modern IoT. Read on to see how you can leverage an OTA update mechanism to increase you product's efficiency, value, and time to market.
Complying with the European Union' Cyber Resilience Act (CRA): Four-part guide
Read this comprehensive guide to learn about EU CRA requirements, and why OTA is an essential requirement for CRA compliance
|
Security
IoT Show: Get robust IoT devices OTA updates with Mender & 1NCE
Eystein Stenberg and Fabian Kochem introduce a seamless integration for secure, scalable IoT device updates and connectivity on the IoT Show.
|
OTA