-
製品
製品
進化する IoT 脅威に対応する業界トップのセキュリティ
IoT をセキュアに保つことは困難です。また、それはミッションクリティカルでもあります。IoT セキュリティの脆弱性が頻繁に表面化することから、コネクテッドデバイスを保護するという課題は、製品ライフサイクル全体を通じてデバイスメーカーに課されます。顧客データや最新のオンラインビジネスモデルは、コストのかかるハッキングや企業ブランドへのダメージの標的になりつつあるため、接続された世界で製品を守ることは必要不可欠です。デバイスメーカーは、セキュリティを維持するために、ハードウェア、ソフトウェア、ネットワーク、クラウドに基盤となるセキュリティ・プラットフォームが必要です。私たちにお任せください。
Secure Vault
Secure Vault™ は、IoT の脅威の高まりに対応する、業界をリードする最先端のセキュリティ機能スイートです。エコシステムのセキュリティ侵害のリスクや、知的財産の侵害、偽造による収益の損失を低減します。具体的には、Secure Vaultテクノロジー:
- スケーラブルなローカルおよびリモートのソフトウェア攻撃から保護します
- ソフトウェア攻撃ほど一般的ではありませんが、急増する手ごろでアクセスしやすいツールによって増加しているローカルハードウェア攻撃に対する防御をおこないます
- 高度な機器で特定の時間、セキュリティ機能を侵害しようとする独立第三者機関の試験に合格しています
あなたにとって適切なレベルのセキュリティとは?
-
高
-
中
-
ベース
Secure Vault - High
通信チャネルとデバイス自体を論理攻撃ベクトルと物理攻撃ベクトルの両方から保護することで、デバイスの最大限のセキュリティを確保します。Vault-Mid 機能に加えて、鍵は物理的にクローン化できない機能(PUF)を使用してラップされ、各デバイスにはそれを一意に識別する秘密鍵があります。デバイスにはあらゆる物理形式の改ざんからデバイスを保護する高度な改ざん検出設定もあります。
Secure Vault - Mid
通信チャネルの保護と論理攻撃ベクトルに対する保護を確保する、高いレベルのセキュリティ。Vault-Base 機能だけでなく、信頼性と安全なローダー(RTSL)によるセキュアなブートシーケンスにより、デバイスはデバイス上で実行されている、ファームウェアを認証します。また、デバイスにはセキュアなデバッグ機能があり、正規の担当者のみがデバイスをデバッグできます。Secure Vault-Mid のパーツには、TrustZoneサポート*も含まれています。TrustZone サポートにより、鍵やその他のアプリケーションファームウェアの保護されたストレージが可能です。
*TrustZone サポートは現在、すべての BLE デバイスで利用可能で、
近い将来このサポートをその他すべてのスタックにリリースする予定です。
Secure Vault - Base
2 台のデバイス間の通信チャネルを保護し、その中を流れるデータを暗号化することで、デバイスに十分なセキュリティを提供します。この階層で顕著な機能には、安全なアプリケーションブート、実証済みの暗号化エンジン、真の乱数発生器(TRNG)機能が含まれます。
Silicon Labs IoT 製品セキュリティ
| 特徴 | シリーズ 3 Secure Vault™ |
高 | 中 | ベース |
| セキュリティ・フレームワーク | PSA レベル4 認証済み |
PSA レベル3 認証済み |
PSA レベル2 認証済み |
PSA レベル 1 認証済み |
| 真の乱数発生器 | ✔ | ✔ | ✔ | ✔ |
| 暗号エンジン | ✔ | ✔ | ✔ | ✔ |
| セキュアなアプリケーションブート | ✔ | ✔ | ✔ | ✔ |
| セキュアなエンジン | HSE | HSE | VSE/HSE | — |
| TrustZone | ✔ | ✔ | ✔ | — |
| RTSL 付きセキュア・ブート | ✔ | ✔ | ✔ | — |
| ロック/ロック解除機能でセキュアなデバッグ | ✔ | ✔ | ✔ | — |
| DPA 対策 | ✔ | ✔ | OPNを選択する | — |
| タンパー防止 | ✔ | ✔ | — | — |
| DFA 検出 | ✔ | — | — | — |
| 認証済み XiP(AXiP) | ✔ | — | — | — |
| 安全な認証 | — | ✔ | — | — |
| 安全な鍵管理 | ✔ | ✔ | — | — |
| 高度な暗号化 | ✔ | ✔ | — | — |
-
認証
認証
At Silicon Labs, security is foundational to how we design, build, and deliver wireless technology.
Information security is a top priority and an important component of our day-to-day operations. As the world becomes more connected, every device, network, and ecosystem depends on trust. We follow industry practices, pursue alignment with standards, and embed security at every layer to protect data, devices, and the people who rely on them. With deep engineering expertise, a culture of integrity, and a commitment to continuous improvement, we ensure that innovation and security advance together – so that every connection is both smart and secure.
Click here to learn how we uphold the highest standards through our certified Information Security Management System (ISMS) and company-wide commitment to security.
Silicon Labs ISO 27001:2022 Certificate
Our commitment to security is validated by our ISO 27001:2022 certification. This certification confirms that our security practices comply with one of the world's most rigorous international standards for information security managemnet. Siliocn Labs is ISO 27001:2022 certified with TÜV Rheinland of North America.
Commitment to Product Security
As evidenced by the scope of our ISO 27001:2022 certification, product security is at the heart of our innovation. We design, develop, and test our integrated circuits and solutions with security built in from the ground up, across the entire hardware and software lifecycle management. Through our secure development lifecycle practice, continuous testing, coordinated vulnerability disclosure, and trusted supply chain practices, we ensure our products meet the highest standards of resilience and integrity. Our goal is to enable secure, connected devices that protect data, safeguard users, and inspire confidence in every deployment.
Visit our product section to learn more.
For Quality and Environmental certifications visit this page.
-
CRA
CRA
CRA Readiness that is Built on Secure Product Design, Lifecycle Governance, and Coordinated Vulnerability Handling.
Silicon Labs is reviewing and updating our existing products, processes, and supporting documentation to ensure conformance with the European Union Cyber Resilience Act (CRA). Our approach combines secure-by-design development, product security governance, public vulnerability handling, and evidence-backed readiness activities across the product lifecycle.
Our Commitment to the Cyber Resilience Act
The CRA determines horizontal cybersecurity requirements for products with digital elements placed on the EU market. It raises expectations for secure development, vulnerability handling, user information, technical documentation, and lifecycle support.
Silicon Labs will ensure conformance to our applicable CRA obligations for secure product lifecycle controls, documentation, PSIRT operations with coordinated vulnerability handling, and internal practices. These practices have already been in place, based on other security standards, certifications, and/or frameworks.
This page is designed to communicate that readiness while linking visitors to the official regulation text, relevant certification pages, product security resources, and reporting channels.
Why This Matters
Product manufacturers need confidence that their silicon and software suppliers can support secure deployment, vulnerability response, software transparency, and lifecycle maintenance under tightening global regulations.
CRA Milestones
CRA Key Topics
Cyber Risk Assesment
Silicon Labs drives pro-active Risk Assessment activities.
General Requirements
Silicon Labs supports secure end-to-end product design and support.
Information and Instructions to the Users
Silicon Labs provides security guidance to customers.
技術資料
Silicon Labs provides helpful resources.
Reporting Requirements
Silicon Labs provides security vulnerability reports and patches.
See below for more on the CRA Key Topics as well as answers to FAQs.
Silicon Labs Assurance
Alignment with CRA Key Topics
Cyber Risk Assesment
- PSA レベル4 認証済み: Series 3 Secure Vault establishes a high-assurance hardware root of trust and demonstrates independently validated resistance to sophisticated physical and software attacks. Click here to learn more about this achievement.
- ISO 27001:2022 Certified: Our Information Security Management System supports secure validation and governance across the company, with product security embedded throughout the design, development, and testing processes. View our ISO 27001 Certificate here.
General Requirements
- Secure Design: Hardware Design with security in mind by creating innovative solutions such as Secure Vault™. Software Development that follows industry-recognized secure coding standards and internal guidelines emphasizing code safety
- Vulnerability Management: A centralized system that tracks potential vulnerabilities and ensures prompt triage, remediation, documentation, and a feedback system that strengthens product resilience.
- Continuous Improvement: Security Testing (threat modeling, fuzz testing, regression testing, and periodic penetration assessments) performed throughout the product lifecycle, not just before release.
Information and Instructions to the Users
- Developer Documentation and Answers to Security Vulnerability FAQs: We provide product security resources (powered with AskAI), user guidance, and training resources to help developers implement secure products and maintain them through deployment. Visit our software documentation site, docs.silabs.com and our Security Vulnerability FAQs.
- Training Resources and Developer Enablement: Silicon Labs provides a broad public training ecosystem to help customers implement secure and compliant products, including Tech Talks, Works With on-demand sessions, webinars, and structured curricula across wireless, security, software, and application domains. Click on each link above to learn more.
技術資料
- Technical Documentation for Series 3: The Series 3 wireless platform page connects customers to product information, technical resources, software documentation, hardware documentation, and development tools. We also offer information on SDK Support Policy, SEMS, and Hardware Longevity Commitment, helping support secure implementation and lifecycle adoption for next-generation IoT designs. Learn more about the Series 3 platform.
- SBOM Generation in Simplicity Studio: Simplicity Studio can automatically generate SBOM artifacts in SPDX and CycloneDX formats for supported SLC projects, helping customers manage dependency visibility and software transparency. Learn more about SBOM Generation.
Reporting Requirements
- PSIRT and Vulnerability Disclosure Program: Silicon Labs operates a public vulnerability reporting channel, disclosure policy, and response targets to support coordinated vulnerability handling throughout the product lifecycle. Read our Vulnerability Disclosure Policy.
- CVE Numbering Authority (CNA) with MITRE: Silicon Labs has been a CNA with MITRE since 11 月 20 日21. To date, only 201 organizations from 32 countries participate in the CVE Program as CNAs. Browse the list of CVEs issued by Silicon Labs. Silicon Labs will be following the security reporting requirements directed by the EU, when its Single Reporting Platform becomes available in 9 月 20 日26.
- Addressing Security Vulnerabilities: Silicon Labs maintains updates to software including for fixes to security vulnerabilities. See SDK Release and Maintenance Policy for more information.
FAQ
This FAQ addresses practical questions about CRA readiness, product lifecycle alignment, documentation, and vulnerability handling.
The CRA is a European Union regulation that establishes cybersecurity requirements for products with digital elements placed on the EU market. It covers areas such as secure development, vulnerability handling, technical documentation, user information, and lifecycle support.
Yes. The CRA applies to several products, including those with digital elements, and/or process digital data, and can connect directly or indirectly to another device or network. For many customers, that means the silicon platform, firmware, SDK, and supporting software ecosystem all matter in the overall compliance picture. For more information, visit Cyber Resilience Act - Questions and Answers.
Our current approach includes secure development lifecycle controls, risk and threat analysis, vulnerability handling, security testing, update management, and supporting documentation. For more information, see the Information Security Management System Overview.
Current references include PSA Certified Level 4 for Series 3 Secure Vault, ISO 27001:2022 certification, the public vulnerability disclosure policy and reporting channel, SBOM generation support in Simplicity Studio, Series 3 technical resources, product security pages, and public training content, including Tech Talks, Works With, webinars, and curriculum materials.
The main CRA obligations apply to products placed on the EU market from 2027 年 12 月 11 日, onward. However, there are earlier reporting obligations beginning on 2026 年 9 月 11 日. See the European Commission’s CRA summary for definitions of “placing on the market” and “making available on the market,” as well as the CRA application dates.
Vulnerability handling is a core part of the readiness story. Silicon Labs operates PSIRT processes and public vulnerability disclosure mechanisms, and we are maturing coordinated vulnerability handling, advisory generation, and reporting readiness to support the stricter operational timelines introduced by the CRA.
Silicon Labs currently provides SBOM generation capability in Simplicity Studio for supported projects. SBOMs are an important transparency mechanism under CRA-related discussions because they help identify software components and dependencies used in product builds.
Silicon Labs’ public Product Longevity Commitment and SDK Release and Maintenance Policy help customers understand baseline hardware lifecycle expectations, software maintenance timing, and where extended maintenance options may be available.
-
トレーニング
トレーニング
IoTセキュリティトレーニング:Works With 2022
当社の IoT セキュリティ・トレーニングでは、規制やトレンド、ハードウェア、ソフトウェアなど、IoT デバイスのあらゆる側面を安全に保護する方法をレビューします。
IoT セキュリティ・セッション:
- SIOT-101: IoT セキュリティ規制とそのイノベーションの推進方法
- SIOT-102: 規制により、IoT デバイスに対するセキュリティ保証が要求される
- SIOT-104: TrustZone および Secure Vault とワイヤレススタックとの統合
- SIOT-201: IoT 製品の真正性を検証するためのセキュリティの適用
- SIOT-203: IoT デバイスとセキュリティ管理のオンボーディング
-
サービス
サービス
カスタム部品製造サービス(CPMS)
高度なセキュリティと独自の証明書で、ワイヤレス・ハードウェアと MCU をカスタマイズします。
IoT デバイスの構築は、かつては、コードを開発し、それをチップ上に照射し、製造するという簡単なものでした。今日、IoT デバイスメーカーにとって、セキュリティは究極の課題となっています。IoT デバイスは、アウトソーシングされた初期の製造プロセスから始まり、サプライチェーン全体を通じて深刻なセキュリティの脅威に直面しています。
大容量コネクテッドデバイス用 CPMS
-
リソース
リソース
注目の IoT セキュリティリソース
ホワイト・ペーパー
Silicon Labs ブログ
ホワイト・ペーパー
ホワイト・ペーパー
Silicon Labs ブログ
Silicon Labs ブログ
Silicon Labs ブログ
-
脆弱性を報告する
