There are significant differences between a root of trust and a secure enclave when protecting endpoints in IIoT environments. With device-level security being ultra-important, it all starts with a systemic approach to the security process. I have written much over the past few years about why it is incumbent on all players in the IoT design, development and production ecosystem to take responsibility for security. The article that follows does an excellent job of describing how to approach silicon-level efforts to stop attacks during the manufacturing part of the process
Most people we speak to about IoT security tell us two things: First, establish a root of trust (RoT) as a foundation for security, and second, don’t just focus on the endpoint device — think about the security throughout the ecosystem and product life cycle.
Nevertheless, there has to be a focus on endpoint devices, since they are an important part of the defense against cyberattacks. Whether we’re talking cloud servers or edge sensors, it’s ultimately the endpoint device on that node that must be secure in order to protect the entire system — or at least reduce vulnerability to attacks.
Hence, this article intentionally focuses on device security, while acknowledging that security must be considered more holistically: as a wider security framework for the entire factory or environment where connected devices play a part in enabling greater productivity and efficiency.