The security of IoT devices relies on secure updates and cyber resiliency, says TCG

Date Published: November, 09, 2021

Beaverton, OR, USA, November 9, 2021 – To increase the resiliency of IoT devices from cyber-attacks, IoT manufacturers need to have a security-first approach and combine the latest updates and techniques, Sunil Cheruvu, Co-Chair of Trusted Computing Group’s (TCG) Internet of Things Work Group, said today.

Speaking at the IoT Device Security Conference, Cheruvu stressed the importance of preparing the best response to inevitable cyberattacks. With the growth in the frequency and complexity of attacks, it is essential that devices are safe and uncompromised. Security must be a priority for all, not just when a disaster happens.

“A system is only as secure as its weakest link. To maintain the security and secure state of a device throughout its lifecycle, it is critical that the firmware and software on the device are updated to the latest version,” said Cheruvu. “With the sophistication of cyberattacks, threats are not always so easy to spot. Post update verification and attestation are essential for determining a reliable attestation from the device and ensuring all information is secure.”

As the number of IoT devices is set to reach 50 million by 2030, it is also important that security capabilities have an automatic way to recover a device to a trusted state, without requiring manual steps and interference. Ensuring cyber resiliency is essential to detect any compromise and provide reliable recovery to a trusted state for better protection.

To provide reliable attestations of devices, Cheruvu emphasised the importance of using the Trusted Platform Module (TPM) and Device Identifier Composition Engine (DICE). The TPM provides a standardized hardware Root of Trust (RoT) to help measure integrity and provide health checks and authentication services. For smaller devices, DICE provides device identity, integrity reporting, and data protection capabilities.

“As the deployment of IoT heightens in popularity, it is crucial that system developers deploy and adopt a variety of measures to ensure devices remain safe and secure throughout their lifetime. Cyberthreats are growing in frequency and complexity, the industry needs to be assured that there is a safe, secure future for all, where information remains protected, and systems remain online.”

For more information on the standardized approaches to security, please visit the TCG website.

About TCG
TCG is a not-for-profit organization formed to develop, define and promote open, vendor-neutral, global industry specifications and standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms.  More information is available at the TCG website, Follow TCG on Twitter and on LinkedIn. The organization offers a number of resources for developers and designers at

Twitter: @TrustedComputin


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More