Skip to main content
purple hex pattern

Why Does Root of Trust Matter?

Root of Trust is becoming increasingly important as the use of Internet of Things (IoT) devices becomes increasingly common. To thwart hacking attempts, components of computing systems and connected mobile devices need a way to verify if the information they are receiving is authentic. The IoT Root of Trust helps build trust in the entire computing ecosystem by safeguarding the security of data and applications within it.

Root of Trust is also becoming increasingly important in evolving regulation and compliance mandates.

Root of Trust for Connected Mobile Devices

Root of Trust in mobile devices poses several challenges, including a greater risk of physical attacks, multiple semi-independent processors and interfaces, and power and space constraints. Bring Your Own Device (BYOD) policies pose additional challenges in assuring that personally owned devices comply with corporate policies.

root of trust illustration

Root of Trust and Public Key Infrastructure

Root of Trust is a critical component of public key infrastructure (PKI). Root of Trust is used to generate and protect root and certificate authority keys; code signing to ensure software remains secure, unaltered and authentic; and creating digital certificates and machine identities for credentialing and authenticating proprietary electronic devices for IoT applications and other network deployments.

Root of Trust for Key Management

Root of Trust is a critical part of key management. As multi-cloud deployments become more common, organizations struggle to maintain control over their critical keys. Dispersed keys lack clear ownership or a scalable management policy — both of which are made possible with Entrust KeyControl and Entrust nShield HSMs.

Root of Trust for IoT

Root of Trust is a building block for securing Internet of Things (IoT) security. Connecting IoT devices to your network creates limitless options for integration but can also create loopholes that can be exploited by hackers and other bad actors.

IoT devices can vary widely in terms of application and processor types, so there isn’t a standard method for implementing Root of Trust with IoT. Generally Root of Trust is secured with an HSM, but it can also be secured via software.