
CommScope, a global leader in industrial networking solution, has released a new device security solution for Texas Instruments' (TI) Arm-based AM6x processor family. This solution is made to secure the bootloader, a crucial element in ensuring that a device’s firmware is trusted before implementing.
Built on CommScope’s PRiSM™ (Permission Rights Signing Manager) platform, the solution is easy to integrate with the TI image build process. It provides strong key protection using a FIPS-certified Hardware Security Module (HSM) and offers centralized key lifecycle management.
The new bootloader signing solution is production-ready and supports continuous integration and delivery (CI/CD) processes. It also aids manufacturers in catering to important cybersecurity mandates without the need to make as well as manage their own cryptographic infrastructure. This is particularly beneficial as bootloader security is an important aspect of device connectivity. If the private signing majorly utilized for authenticating firmware is compromised, even secure boot mechanisms can be bypassed, making the device vulnerable to attacks.
CommScope’s solution ensures that these keys are protected with hardware-backed security, giving controlled access as well as a clear, auditable path for compliance with emerging regulations, including the European Union’s Cyber Resilience Act (CRA) and other region-specific standards. By offering a ready-to-deploy security solution, CommScope simplifies the process for manufacturers to adopt secure boot systems as well as reduce the risk of cyber threats in their devices.
Executive Statement
According to Sonia Ghelani, Product Line Manager, Sitara™ Processors, Texas Instruments, secure boot is a cornerstone of system integrity and robust protection against software tampering. With CommScope’s production-grade infrastructure and HSM-protected signing keys, they are enabling customers to fully leverage TI’s security capabilities, which help simplify secure boot adoption and defend against today’s sophisticated cyberattacks
