Sovereignty and Security technologies, genuine issue for companies
No progress, no technology is viable without trust. This is even truer when it comes to information technologies, which are now at the heart of the economy, employment and even critical infrastructures. From chip to cloud; the real challenge of tomorrow is to control B2B data, its sovereignty and of course its security.
Tribune by Hassan Triqui, CEO of Secure-IC
No connected world without trust
Cloud, connected objects (or Internet of Things, IoT), networks…: today it is impossible to miss the “world of everything connected”. But while consumer uses and applications have never been so much in the media spotlight, the industrial and even societal challenges associated with them are often overlooked and far more strategic.
The 5G proposes to answer “technically” to these strategic issues of the future, much more than to satisfy individual uses, thanks to never equaled data rates and latency times. In other words, it is about tomorrow’s economic prosperity, future jobs and above all the sovereignty and security of nations.
But beyond technical capabilities, given the issues and risks involved, including for populations, the question of data security and integrity remains fundamental: without security, and therefore without trust, uses and their economic and regulatory contributions will remain limited.
Protecting sovereign territories
From the smallest sensor to the most complex production line, the integration of smart and connected electronics is inevitable.
Remote or even autonomous management, predictive (and sometimes corrective) maintenance, real-time feedback and alerts, etc. Few sectors escape the era of the Internet of Things and the mass of information it generates, exchanges and therefore needs to be processed and stored, particularly in the cloud or via more local relays of the Edge computing type (i.e. computing at the edge of the network).
In any case, it is important to keep control of these objects, whatever they are. No one leaves a bank card unattended: the same applies to connected objects. But this is far from sufficient: it is the entire information value chain that must be secured, from the component to the server. This is called “chip-to-cloud” security.
Security all along the life-cycle
In principle, the Internet of Things implies a very large dissemination of objects, whose life cycle must be taken into account in order not to add risk to the already inherent risk.
Therefore, from the design phase, to the manufacturing phase on the production line, to the de-procurement phase, including the entire operating phase, any object that is more or less intelligent and connected must be perfectly controlled, and maintained in its integrity and security, notably by regular checks and updates. If control is lost, the only solution is to deactivate the object and delete all the data it contains.
Faced with the major risks and challenges of connected objects, and even more so in industry and strategic or vital sectors, security is not just optional: it must be thought through from end to end and from the design of the object through a root of trust, in order to guarantee security and sovereignty for national economies, which are now and even more so in the future totally dependent on digital technology.
And if, in Europe, the battle of the B2C cloud seems to have already been lost to American players, the battle of the B2B cloud, of industry 4.0, of connected health and of vital operators (OIV) is still relevant: the technological and economic independence, the political sovereignty of European States for the next years and decades depend on the choices to come.
Do you have questions on this topic and on our protection solutions? We are here to help.