Silicon Labs
  • ⟵ Back
    Products
    Tech Talks 2025 Webinar Series: Empowering IoT Innovation
    WirelessWireless
    Amazon Sidewalk
    Bluetooth
    Matter
    Multiprotocol
    Proprietary
    Thread
    Wi-Fi
    Wi-SUN
    Z-Wave
    Zigbee
    TechnologyTechnology
    Channel Sounding
    Energy Harvesting
    LPWAN
    Machine Learning
    Security
    Non-WirelessNon-Wireless
    MCUs
    Sensors
    USB Bridges
    Power Management
    ServicesServices
    Custom Part Manufacturing
    Developer Services
    SDK Extended Maintenance Service
  • ⟵ Back
    Applications
    Smart HomeSmart Home
    Appliances
    Entertainment Devices
    IoT Gateways
    LED Lighting
    Security Cameras
    Sensors
    Smart Locks
    Switches
    Industrial IoTIndustrial IoT
    Access Control
    Asset Tracking
    Battery-Powered Tools
    Circuit Breakers
    Commercial Lighting
    Electric Submetering
    Factory Automation
    Human Machine Interface
    Industrial Wearables
    Predictive Maintenance
    Process Automation
    Smart HVAC
    Smart CitiesSmart Cities
    Battery Storage
    EV Charging Stations
    Smart Agriculture
    Smart Buildings
    Smart Metering
    Smart Solar PV System
    Street Lighting
    Smart RetailSmart Retail
    Commercial Lighting
    Direction Finding
    Electronic Shelf Labels
    Loss Prevention
    Wi-Fi Access Points
    Connected HealthConnected Health
    Portable Medical Devices
    Smart Hospitals
    Smart Wearable Devices
  • ⟵ Back
    Ecosystems
    Tech Talks 2025 Webinar Series: Empowering IoT Innovation
    Ecosystem PartnersEcosystem Partners
    AI/ML Developer Journey
    Amazon Sidewalk
    Bluetooth Developer Journey
    Bluetooth Mesh Developer Journey
    Google Home
    Matter Developer Journey
    Wi-Fi Developer Journey
  • ⟵ Back
    Resources
    Simplicity Studio 5
    Fast track IoT development
    Developer ToolsDeveloper Tools
    Software Documentation
    Release Notes
    GitHub
    Technical Resource Library
    Simplicity Studio
    Mobile Apps
    Software Development Kits
    Hardware Development Kits
    Gateways
    RTOS
    Content and TrainingContent and Training
    Tech Talks 2025 Webinar Series
    Works With 2024 On-Demand
    IoT for Good Developer Stories
    Blog
    Case Studies
    Whitepapers
    Training Library
    Webinars
    SupportSupport
    Community
    Partner Network
    Channel & Distribution
    Quality and Packaging
    How to Buy
    Submit a Ticket
    Report a Security Issue
  • ⟵ Back
    Company
    Tech Talks 2025 Webinar Series: Empowering IoT Innovation
    CompanyCompany
    Careers
    Environmental, Social & Governance
    Community Commitment
    Diversity, Equity and Inclusion
    Environmental Sustainability
    Quality
    Management Team
    Supply Chain Responsibility
    News & EventsNews & Events
    Blog
    News Room
    Events
    Investor RelationsInvestor Relations
    Annual Report & Proxies
    Board of Directors
    Quarterly Results
    SEC Filings
    OfficesOffices
    Hyderabad
    Other Global Offices
    Contact Us
English
  • English
  • 简体中文
  • 日本語
Ask AI
AskAI
Ask AI
//
IoT Security

Security

  1. Product
  2. Training
  3. Services
  4. Resources
  5. Report Vulnerability
  1. Product

Industry-Leading Security for Evolving IoT Threats

Securing the IoT is challenging. It’s also mission-critical. The challenge of protecting connected devices against frequently surfacing IoT security vulnerabilities follows device makers throughout the entire product lifecycle. Protecting your product in a connected world is a necessity as customer data and modern online business models are increasingly targets for costly hacks and corporate brand damage. To stay secure, device makers need an underlying security platform in the hardware, software, network, and cloud. We’ve got you covered.

Secure Vault

Secure Vault™ is an industry-leading suite of state-of-the-art security features that address escalating Internet of Things (IoT) threats, greatly reducing the risk of IoT ecosystem security breaches and the compromise of intellectual property or revenue loss from counterfeiting. Specifically, Secure Vault technology:

  • Protects against scalable local and remote software attacks
  • Defends against local hardware attacks, which – although historically less common than software attacks – are on the rise due to the surge of affordable and easily accessible tools
  • Passes testing from independent, third-party laboratories that attempt to infringe security functions for a specified amount of time with sophisticated equipment

What Level of Security is Right for You?

  1. High
  2. Mid
  3. Base

Secure Vault - High

Maximum security of the device is made available by protecting the communication channel and the device itself, both against logical and physical attack vectors. In addition to Vault-Mid capabilities, keys are wrapped using a Physically Unclonable Function (PUF), each device has a private key that uniquely identifies it, and the device also has advanced tamper detection settings that protect the device from any physical form of tamper.

Secure Vault - Mid

High level of security provided by ensuring protection of the communication channel and protection against logical attack vectors. In addition to Vault-Base capabilities, devices have authenticated firmware running on them thanks to a secure booting sequence with a Root of Trust and Secure Loader (RTSL). Devices also have secure debug capabilities to ensure only authentic personnel have the capability to debug the device. Secure Vault-Mid parts also include TrustZone support*. TrustZone support will enable protected storage of keys and other application firmware.

*TrustZone support is currently available on all BLE device, with a plan to release this support to
all other stacks in the near future.

Secure Vault - Base

Good level of security provided on the devices to by protecting the communication channel between two devices and encrypting the data that flows within it. Salient features of this tier include a secure application boot, proven cryptographic engines, and a True Random Number Generator (TRNG) function.

Silicon Labs IoT Product Security

Feature High Mid Base
True Random Number Generator ✔ ✔ ✔
Crypto Engine ✔ ✔ ✔
Secure Application Boot ✔ ✔ ✔
Secure Engine HSE VSE/HSE —
Secure Boot with RTSL ✔ ✔ —
Secure Debug with Lock/Unlock ✔ ✔ —
DPA Countermeasures ✔ Optional —
Anti-Tamper ✔ — —
Secure Attestation ✔ — —
Secure Key Management ✔ TrustZone —
Advanced Crypto ✔ — —

Third Party Accreditation

Secure Vault has gathered third party accreditations & validations since its original launch in early 2020.

Learn More
  1. Training

IoT Security Training: Works With 2022

Our IoT security training reviews regulations and trends and how you can keep all facets of your IoT devices secure, including hardware, software, and more.

IoT Security Sessions:

  1. SIOT-101: IoT Security Regulation and How it Drives Innovation
  2. SIOT-102: Regulations Will Demand Security Warranties in IoT Devices
  3. SIOT-104: Wireless Stack Integration with TrustZone and Secure Vault
  4. SIOT-201: Applying Security to Verify the Authenticity of IoT Products
  5. SIOT-203: Onboarding IoT Devices and Security Management
View Works With 2022 Security Training
Security in the IoT On-Demand - Works With 2022
  1. Services

Custom Part Manufacturing Service (CPMS)

Customize Your Wireless Hardware and MCUs with Advanced Security and Unique Certificates.

Building an IoT device was easy in the past: developing code, flashing it on a chip, and manufacturing. Today, security is the ultimate challenge for IoT device makers. Your IoT device faces severe security threats throughout its entire supply chain, starting at the beginning of the outsourced manufacturing process.

Explore CPMS
  1. Resources
Featured Documentation View All Documentation
icon image
AN1218: Series 2 Secure Boot with RTSL
Resource Type: Application Notes
icon image
AN1271 Secure Key Storage
Resource Type: Application Notes
icon image
UG519: Custom Part Manufacturing Service User's Guide
Resource Type: User’s Guides

Featured IoT Security White Papers

White Paper

Preparing for Next-Gen Cyber Attacks on IoT

White Paper

Matter Security: Applying Privacy Fundamentals

  1. Report Vulnerability

Have you Discovered a Vulnerability?

Our Product Security Incident Response Team (PSIRT) is responsible for ensuring the vulnerabilities discovered in our products are mitigated and communicated responsibly. If you detect a security threat, let us know.

Information on how to subscribe to security notices can be found here.

Read our Security Vulnerability Disclosure Policy Here

Bug Bounty Program

Silicon Labs partners with HackerOne to reward ethical hackers for stress testing our infrastructure and products.

Our Bug Bounty program is managed by Hacker One. Anyone may submit vulnerability reports using the directions on the Report Product Security Vulnerabilities page. Rewards are provided for reports on certain targets as described on the page.  Any interested hacker may contact the HackerOne support team.


Submission Form

Please submit your bug via our Submission Page.

Submit Bug Here

Thanks for helping keep Silicon Labs and our users safe! 

Silicon Labs

Stay Connected With Us

Plug into the latest on Silicon Labs products, including product releases and resources, documentation updates, PCN notifications, upcoming events, and more.
  • About Us
  • Careers
  • Community
  • Contact Us
  • Cookies
  • Corporate Responsibility
  • Investor Relations
  • Press Room
  • Privacy and Terms
  • Site Feedback
Copyright © Silicon Laboratories. All rights reserved.
Also of Interest:
  • Security in IoT: Introducing Secure Vault
  • Navigate the New IoT Labeling Program
  • Security in IoT Devices: Challenges and Solutions

Your File Will Start Downloading Shortly

Thank you for downloading .

If you have any issues downloading, please contact sales support or product technical support.

Close
Loading Results
Close

Please select at least one column.

OSZAR »