Product Security Features
A robust security implementation requires a combination of hardware and software to achieve the desired level of security on a given product. Nordic provides a secure platform and all the necessary enablers to make this process easy for our customers
Features | nRF52840 | nRF5340 | nRF9160 |
True Random Number Generator (TRNG) |
Yes | Yes |
Yes |
Crypto Acceleration Hardware acceleration of symmetric and asymmetric encryption and hashing operations. |
CryptoCell 310 | CryptoCell 312 | CryptoCell 310 |
Secure Storage Hardware enforced protection of data at rest. |
Yes | Yes | Yes |
Secure Key Usage Hardware enforced protection of key material at runtime. |
Yes | Yes | Yes |
Secure Boot Immutable boot partition verifying authenticity of application with anti-rollback prevention. |
Yes | Yes | Yes |
Secure Update Verify authenticity and integrity of firmware update. |
Yes | Yes | Yes |
Secure Attestation Proving device identity to establish a trusted interaction with the outside world. |
- | Yes | Yes |
Isolation Security by separation of trusted and non-trusted services. Protecting data, code, and peripherals. |
- | Yes | Yes |
Erase all protection Prevent externally triggered erase all operation |
- | Yes | Yes |
PSA Certified Level | Level 1 | Level 2 | Level 2 |
True Random Number Generator (TRNG)
Random numbers are at the center of cryptography and key generation
Crypto Acceleration
Hardware acceleration of symmetric and asymmetric encryption and hashing operations
Secure storage
Hardware enforced protection of critical data at rest
Secure key usage
Hardware enforced protection of key material at runtime
Cryptographic primitives that provides confidentiality, integrity, and authenticity can provide these security properties only if the secret and private keys stays protected and secure. If a key value gets compromised then the cryptographic primitive can no longer guarantee any security.
Secure Boot
Immutable boot partition verifying authenticity of application with anti-rollback protection
To ensure only authorized software is executed on the device, secure boot and loading processes are necessary. Any attempt to boot with unauthorized code should be detected and prevented, although exceptions may be made for software that poses no threat to the device.
Ensuring that previous software versions can't be reinstated is crucial, and this is achieved by preventing rollback. However, in recovery situations, rollback may be permitted if authorized.
Secure Update
Verify authenticity and integrity of firmware update
Secure Attestation
Each device must be uniquely identifiable
Isolation
Security by separation of secure and non-secure application, protecting data, code, and peripherals
The purpose of isolation is to safeguard services from being impacted by others, so that potential breaches don't comprise your entire device. This is achieved through separating trusted, less trusted, and untrusted services from each other.
Read more about security by separation in our Trusted Firmware-M DevZone blog.
Erase all protection
Protect against device repurposing
Preventing unauthorized access or use of the device is an important security feature. When erase all protection is configured the erase all operation cannot be triggered externally (e.g. with a debug probe).