Overview of Security Features
This topic introduces you to the security-related features designed into RSL15, particularly those features which are used to ensure that the device itself is operating in a secure manner. This includes procedures such as verifying that the firmware being executed is valid and authentic, and ensuring that access to the device is restricted to authorized users only.
Overviews of the other security features are provided in the topics that follow. For full details of the hardware-centric features, refer to the RSL15 Hardware Reference. For firmware features, refer to the RSL15 Firmware Reference. For detailed information on the secure bootloader sample application, see the Secure Bootloader Usage group of topics.
For more information about this topic, see: