Skip to content

Setting up a Chain of Trust

schielimicrochip edited this page Aug 4, 2016 · 24 revisions

The development kit is equipped with a pre-configured ECC508A device which assists the end node microcontroller in establishing a secure session with AWS IoT (TLS session). The ECC508A is a CryptoAuthentication(tm) device which provides to the system

  • Keys and certificates stored securely
  • Hardware cryptographic accelerators
  • Tamper protections and hardware security mechanisms

In order to be "trusted" the identity of the ECC508A must be part of a bigger "chain of trust" that can be verified by AWS IoT

(*) The signer resides in Microchip secure manufacturing zone, but a "portable" signer has been included with the kit to simplify the initial setup.

If you wonder why a Chain of Trust is needed in the first place, have a look at this section: [Why do we need a Chain of Trust?](Why do we need a Chain of Trust?)

Kit Signer vs. Production Signer

The provisioning steps of the ECC508A - i.e. generating keys and programming the associated certificates - typically take place during the last manufacturing steps before leaving Microchip factory. Each device contains the necessary certificate uniquely related to the customer.

In the context of the development kit, the ECC508A are pre-configured for AWS IoT operations, but customer specific certificates are unknown to Microchip at the time of shipment.

To that effect, is included along with the kit, tools that mimic the steps taking place on the ECC508A manufacturing line to personalize - or "provision"- the specific identity.

This provisioning step is only needed in the context of the kit and is entirely eliminated once in production.

Steps to create the Chain of Trust with the Kit

Clone this wiki locally