Securing Opportunity Wherever Computing Happens
Arm believes that 100% of the world's shared data will soon be processed on Arm, either at the endpoint, in the data networks, or the cloud. Our partners create opportunity from this disruption and rely on our security architectures, tools, and trusted ecosystem to usher in transformative, secure experiences wherever computing happens.
There are several ways we support a secure ecosystem, including by leading PSA Certified with like-minded partners. We also develop secure foundations and resources of our own to help protect against the many vulnerabilities detailed below.
Click on the map to see how Arm protects your innovation:
Threats and Counter Measures
Arm has developed a range of security to mitigate against increasingly sophisticated security threats. These architectures address vulnerabilities in devices across all market areas, from IoT connected devices to large screen mobile computing devices to cloud servers.
By incorporating security into the foundational layers of the architecture, devices are better protected against security threats.
A Considered Approach to Security
Arm takes a multilayered approach to security that bolsters defenses and promotes opportunity for our partners. It includes the following five tactics to help achieve an overarching security strategy that protects data wherever computing happens.
Click on the diagram to navigate Arm's approach:
With adoption across low-power and high-performance IoT, PSA Certified has transformed the IoT industry and is beginning to democratize security in other markets.
PSA Certified is simplifying security while making complex security functions accessible. Using standard components, PSA Certified silicon and PSA Functional APIs, security functions in the hardware Root of Trust (the PSA-RoT) can be leveraged to create a space for all trusted functions.
PSA Certified is now recognized by governments, insurance vendors, industry bodies and IoT leaders (AVS) as a direct response to the growing threat, cost, and resource requirements faced by organizations as new threats emerge
The Arm and PSA Certified 2024 Security Report offers an annual review of progress on connected security and what is needed to protect devices from malfeasance. The 2024 report focuses on the opportunities and challenges between security and AI, and covers:
- The importance of security for AI.
- How and why we need to correct the AI-security lag.
- The opportunity for businesses to safeguard their ecosystems and meet the demands of AI.
Committed to Securing Innovation
Arm’s long-term commitment to security offers the peace of mind that allows our ecosystem partners to focus on innovation and can be best mapped across three approaches:
Essential
The Arm architecture is at the heart of secure computing and digital transformation, forming the architecture of choice for secure computing.
Advanced
Armv9-A architecture is our latest response to a current range of use cases that stretch from edge to cloud, bolstering security while facilitating the specialized, scalable solutions required for artificial intelligence (AI).
Progressive
Arm continues to invest in architecture that addresses emerging threats in the years to come. The Armv9-A roadmap introduces Arm Confidential Compute Architecture (Arm CCA), which shields portions of code and data from access or modification while in-use, even from privileged software, by performing computation in a hardware-based secure environment.
Together with our partners across the industry, we are constantly striving to minimize the chances of the smallest weakness setting off a security domino effect through comprehensive solutions that address every aspect of risk.
Arm's Systematic Approach to Product Security
Securing the world’s data is one of the greatest technology challenges facing the next decade of compute. Security is a vital requirement for everything Arm does, and product security is one of the key quality metrics for products delivered to partners and the wider ecosystem.
Looking to accelerate the development of secure SoCs?
Designed on the principles of PSA Certified, Corstone reference packages provide a complete solution for architecting a system with security at the heart, while balancing trade-offs between performance and power. The pre-verified subsystem and system IP included in Corstone packages significantly accelerates the development of secure SoCs, saving you time and allowing you to focus your resources on differentiation.
Arm Tech Talks
This series of talks brings you best practices and the latest trends and technologies from across the Arm ecosystem. Covering
the latest cutting-edge research, real-world use cases, code examples, workshops, demos, and more for building secure applications.
Talk with an Expert
As long as there is value in controlling a device or accessing its data, there will be a constant battle against potential attackers. Talk with an Arm expert to learn more about security technologies that can be designed into devices.
Security Resources
News
- Pushing the boundaries of performance and security to unleash the power of 64-bit computing
- A Total Compute approach to delivering digital immersion under a common architecture
Infographics
Webinar
- Why silicon security may be crucial for your next IoT device
- How to Provide Confidence and Assurance at Scale
White Paper
Video
Blogs
- Delivering security 'defense in depth' through Total Compute
- Arm receives first high assurance Common Criteria security certification for soft processor IP
- Memory Tagging Extension: Enhancing memory safety through architecture
- The Security Arms Race on Devices
- Automotive security partner blog: Fast, secure file systems for autonomous vehicles from Tuxera
- New FIPS 140-2 certification provides time savings for Arm security partners
- Why you need a tailored secure foundation at the heart of your next IoT product
- 10 security goals for connected devices