{"id":2616,"date":"2022-04-06T01:45:00","date_gmt":"2022-04-06T01:45:00","guid":{"rendered":"https:\/\/www.pufsecurity.com\/?post_type=dlp_document&p=2616"},"modified":"2022-07-04T07:54:23","modified_gmt":"2022-07-04T07:54:23","slug":"software-defined-everything-doesnt-mean-software-only-security","status":"publish","type":"dlp_document","link":"https:\/\/www.pufsecurity.com\/zh-hant\/document\/software-defined-everything-doesnt-mean-software-only-security\/","title":{"rendered":"Software-Defined Everything doesn\u2019t mean Software-Only Security"},"content":{"rendered":"\n

Computing power has reached the point where once \u201chardware-only\u201d functions can now be handled by the software layer running on top of the hardware, with negligible performance difference for users. Applications once only seen in science fiction are becoming present-day science reality, such as the rise of the Metaverse and smart cars that approach the ultimate goal of level 4 autonomous driving. Increased software control over the underlying hardware resources has also recently been responsible for the software-defined everything (SDx) revolution, allowing for agile and flexible repurposing of the traditional IT pillars of compute, network and storage (including the secure container in the cloud).<\/p>\n\n\n\n

Given the relative ease to reconfigure software code compared with modifying hardware, the \u201csoftware-defined\u201d trend continues to gain momentum as computing speed increases can cover most of the penalties as we move away from hardware-specific configurations and accelerators. In fact, the projected size of software-defined and virtualized network functions infrastructure market in 2023 is expected to be at $4.7 billion, according to a 2019 report from IDC.<\/p>\n\n\n\n

However, even as systems start relying more upon the software for hardware configuration such as virtual machines for SDx, on top of implementing the application layer, it becomes even more important that the basis of system security remains at the hardware layer. Those same easily changeable characteristics that make software appealing for software-defined configuration\/applications are a double-edged sword since the software is more easily hacked than hardware. In addition, more reliance on software means more attack surfaces for hackers to probe for system weaknesses. To take the advantage of software\u2019s flexibility and address the security concerns, software must be developed with an immutable secure anchor, in which can only be achieved by hardware design. For these reasons, a well-designed, secure system must implement a hardware root-of-trust (HRoT) at its lowest, most basic hardware layer.<\/p>\n\n\n\n

To establish trust in a system, there needs to be a most basic unit that is implicitly trusted; that is, this \u201croot\u201d of trust is the point from which system authentication can take place \u2013 the system uses this root-of-trust to attest that the rest of the system is genuine and trustworthy, including the other hardware components of the system as well as the firmware and software that runs upon said hardware. Beyond attestation, a root-of-trust may also offer the ability to store, or better yet, even generate a unique ID or hardware unique key (HUK) for the system that can only be created by that one individually implemented RoT. Every system may have its own RoT, but each RoT will instantiate its own HUK through TRNG key injection or be derived from an internal PUF that creates its own unique code based on an inherently random physical process. A unique ID (a.k.a. silicon \u201cfingerprint\u201d) is particularly useful, especially in an entirely virtual world, such as the Metaverse, where one\u2019s unclonable ID is the only way to differentiate between users, or when the day comes when the majority of data is stored in the cloud in secure containers, or when all of our vehicles can be fully connected and networked (V2x) \u2013 it is vitally important that Michael Smith knows his car is still parked in his garage, and isn\u2019t confused with Michael Brown\u2019s car currently getting off of the freeway.<\/p>\n\n\n\n

Click to learn more about how HRoT solves chip\u2019s fundamental security issue<\/a><\/p>\n\n\n\n

Present-day companies have already begun to see the importance of basing security in hardware, particularly using an HRoT. ARM\u2019s recently announced confidential compute architecture (CCA) in their latest V9 architecture requires a \u201cplatform root-of-trust\u201d for maximum security, in addition to specifying that a portion of it must be \u201cimmutable\u201d, which can only be implemented in hardware, again due to the much more malleable nature of software. In addition, the database giant Oracle has specified the use of an HRoT to ensure the security of firmware updates in their Oracle Cloud Infrastructure Security Architecture.<\/p>\n\n\n\n

So what happens when we know that security is a must for the future, but a company doesn\u2019t have the dedicated security resources like ARM or Oracle to develop their own solutions? This is where security IP vendors such as\u00a0PUFsecurity\u00a0can come into play. With a dedicated team of security experts focused solely on developing robust and easy-to-integrate IPs, PUFsecurity brings designs that can be dropped into existing designs, increasing security and upgrading systems to current standards. From the essential\u00a0PUFrt<\/a> HRoT\u00a0to the\u00a0cryptographic co-processor PUFcc<\/a>, PUFsecurity can provide customers with off-the-shelf PUF-based security solutions, or tailor an existing one to exactly fit each customer\u2019s individual needs.<\/p>\n\n\n\n

To sum up, we see that even as more and more tasks that have traditionally been shouldered by hardware are now moving towards software, the fundamental security of a system should still be placed in hardware. SDx, V2x, cloud storage, Metaverse, and all the other amazing future applications yet to come will heavily rely on software, but it won\u2019t change the fundamental nature of system security, in that it will always need to be rooted in a hardware basis of trust, in particular an HRoT.<\/p>\n","protected":false},"excerpt":{"rendered":"

Computing power has reached the point where once \u201chardw […]<\/p>\n","protected":false},"author":12,"featured_media":2617,"template":"","doc_tags":[204],"class_list":["post-2616","dlp_document","type-dlp_document","status-publish","has-post-thumbnail","hentry","doc_categories-article","doc_tags-hardware-security"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/dlp_document\/2616"}],"collection":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/dlp_document"}],"about":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/types\/dlp_document"}],"author":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/users\/12"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/media\/2617"}],"wp:attachment":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/media?parent=2616"}],"wp:term":[{"taxonomy":"doc_tags","embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/doc_tags?post=2616"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}