Silicon Labs
  • ⟵ Back
    Products
    Meet me at works with poster
    Works With 2025: Where Innovation Meets Implementation
    WirelessWireless
    Amazon Sidewalk
    Bluetooth
    LPWAN
    Matter
    Multiprotocol
    Proprietary
    Thread
    Wi-Fi
    Wi-SUN
    Z-Wave
    Zigbee
    Non-WirelessNon-Wireless
    MCUs
    Power Management
    Sensors
    USB Bridges
    IoT TechnologiesIoT Technologies
    Channel Sounding
    Energy Harvesting
    Machine Learning
    Security
    ServicesServices
    Custom Part Manufacturing
    Developer Services
    SDK Extended Maintenance Service
  • ⟵ Back
    Applications
    Smart HomeSmart Home
    Appliances
    Connected Outdoor
    Entertainment Devices
    IoT Gateways
    LED Lighting
    Security Cameras
    Sensors
    Smart Locks
    Switches
    Industrial IoTIndustrial IoT
    Access Control
    Asset Tracking
    Battery-Powered Tools
    Circuit Breakers
    Commercial Lighting
    Electric Submetering
    Factory Automation
    Human Machine Interface
    Industrial Wearables
    Predictive Maintenance
    Process Automation
    Smart HVAC
    Smart CitiesSmart Cities
    Battery Storage
    EV Charging Stations
    Smart Agriculture
    Smart Buildings
    Smart Metering
    Smart Solar PV System
    Street Lighting
    Smart RetailSmart Retail
    Commercial Lighting
    Direction Finding
    Electronic Shelf Labels
    Loss Prevention
    Wi-Fi Access Points
    Connected HealthConnected Health
    Portable Medical Devices
    Smart Hospitals
    Smart Wearable Devices
  • ⟵ Back
    Software & Tools
    Simplicity studio poster
    Simplicity Studio 5
    Fast track IoT development
    Software & ToolsSoftware & Tools
    Software Development Kits (SDKs)
    Software Reference Documentation
    Hardware Development Tools
    Hardware Documentation
    GitHub Resources
    Developer JourneysDeveloper Journeys
    AI/ML
    Amazon Sidewalk
    Bluetooth
    Bluetooth Mesh
    Google Home
    Matter
    Wi-Fi
    ServicesServices
    Custom Part Manufacturing
    Developer Services
    SDK Extended Maintenance Service
  • ⟵ Back
    Resources
    DocumentationDocumentation
    Blog
    Case Studies
    Software Documentation
    Technical Library
    Whitepapers
    TrainingTraining
    Works With Developer Conference 2025
    Tech Talks 2025 On-Demand
    Webinars
    Curriculum
    PartnersPartners
    Channel & Distribution
    Ecosystem Partners
    Partner Network
    ServicesServices
    Custom Part Manufacturing
    Developer Services
    SDK Extended Maintenance Service
    SupportSupport
    Community
    Submit a Ticket
    Quality and Packaging
    How to Buy
    Report a Security Issue
    Contact Us
  • ⟵ Back
    Company
    About our CompanyAbout our Company
    Community Commitment
    Inclusion at Silicon Labs
    Management Team
    SustainabilitySustainability
    Environmental, Social & Governance
    Quality
    Supply Chain Responsibility
    News & EventsNews & Events
    Blog
    News Room
    Events
    Investor RelationsInvestor Relations
    Annual Report & Proxies
    Board of Directors
    Corporate Governance
    Quarterly Results
    SEC Filings
    CareersCareers
    Hyderabad Office
    Other Global Offices
    Contact Us
English
  • English
  • 简体中文
  • 日本語
  • Log In
  • Register
Ask AI
AskAI
Clear
SearchLoading
Ask AI
//
IoT Security

Security

  1. Product
  2. Training
  3. Services
  4. Resources
  5. Report Vulnerability
  1. Product

Industry-Leading Security for Evolving IoT Threats

Securing the IoT is challenging. It’s also mission-critical. The challenge of protecting connected devices against frequently surfacing IoT security vulnerabilities follows device makers throughout the entire product lifecycle. Protecting your product in a connected world is a necessity as customer data and modern online business models are increasingly targets for costly hacks and corporate brand damage. To stay secure, device makers need an underlying security platform in the hardware, software, network, and cloud. We’ve got you covered.

Secure Vault

Secure Vault™ is an industry-leading suite of state-of-the-art security features that address escalating Internet of Things (IoT) threats, greatly reducing the risk of IoT ecosystem security breaches and the compromise of intellectual property or revenue loss from counterfeiting. Specifically, Secure Vault technology:

  • Protects against scalable local and remote software attacks
  • Defends against local hardware attacks, which – although historically less common than software attacks – are on the rise due to the surge of affordable and easily accessible tools
  • Passes testing from independent, third-party laboratories that attempt to infringe security functions for a specified amount of time with sophisticated equipment

What Level of Security is Right for You?

  1. High
  2. Mid
  3. Base

Secure Vault - High

Maximum security of the device is made available by protecting the communication channel and the device itself, both against logical and physical attack vectors. In addition to Vault-Mid capabilities, keys are wrapped using a Physically Unclonable Function (PUF), each device has a private key that uniquely identifies it, and the device also has advanced tamper detection settings that protect the device from any physical form of tamper.

Secure Vault - Mid

High level of security provided by ensuring protection of the communication channel and protection against logical attack vectors. In addition to Vault-Base capabilities, devices have authenticated firmware running on them thanks to a secure booting sequence with a Root of Trust and Secure Loader (RTSL). Devices also have secure debug capabilities to ensure only authentic personnel have the capability to debug the device. Secure Vault-Mid parts also include TrustZone support*. TrustZone support will enable protected storage of keys and other application firmware.

*TrustZone support is currently available on all BLE device, with a plan to release this support to
all other stacks in the near future.

Secure Vault - Base

Good level of security provided on the devices to by protecting the communication channel between two devices and encrypting the data that flows within it. Salient features of this tier include a secure application boot, proven cryptographic engines, and a True Random Number Generator (TRNG) function.

Silicon Labs IoT Product Security

Feature High Mid Base
True Random Number Generator ✔ ✔ ✔
Crypto Engine ✔ ✔ ✔
Secure Application Boot ✔ ✔ ✔
Secure Engine HSE VSE/HSE —
Secure Boot with RTSL ✔ ✔ —
Secure Debug with Lock/Unlock ✔ ✔ —
DPA Countermeasures ✔ Optional —
Anti-Tamper ✔ — —
DFA Detection Series 3 — —
Authenticated XiP (AXiP) Series 3 — —
Secure Attestation ✔ — —
Secure Key Management ✔ TrustZone —
Advanced Crypto ✔ — —

Security accreditiations poster

Third Party Accreditation

Secure Vault has gathered third party accreditations & validations since its original launch in early 2020.

Learn More
  1. Training

IoT Security Training: Works With 2022

Our IoT security training reviews regulations and trends and how you can keep all facets of your IoT devices secure, including hardware, software, and more.

IoT Security Sessions:

  1. SIOT-101: IoT Security Regulation and How it Drives Innovation
  2. SIOT-102: Regulations Will Demand Security Warranties in IoT Devices
  3. SIOT-104: Wireless Stack Integration with TrustZone and Secure Vault
  4. SIOT-201: Applying Security to Verify the Authenticity of IoT Products
  5. SIOT-203: Onboarding IoT Devices and Security Management
View Works With 2022 Security Training
Security in the IoT On-Demand - Works With 2022
  1. Services

Custom Part Manufacturing Service (CPMS)

Customize Your Wireless Hardware and MCUs with Advanced Security and Unique Certificates.

Building an IoT device was easy in the past: developing code, flashing it on a chip, and manufacturing. Today, security is the ultimate challenge for IoT device makers. Your IoT device faces severe security threats throughout its entire supply chain, starting at the beginning of the outsourced manufacturing process.

Explore CPMS
Cpms promotion poster
  1. Resources
Featured Documentation View All Documentation
icon image
AN1218: Series 2 Secure Boot with RTSL
Resource Type: Application Notes
icon image
AN1271 Secure Key Storage
Resource Type: Application Notes
icon image
UG519: Custom Part Manufacturing Service User's Guide
Resource Type: User’s Guides

Featured IoT Security White Papers

Next gen cyber attacks resource poster
White Paper

Preparing for Next-Gen Cyber Attacks on IoT

Matter security applying privacy fundamentals poster
White Paper

Matter Security: Applying Privacy Fundamentals

  1. Report Vulnerability

Have you Discovered a Vulnerability?

Our Product Security Incident Response Team (PSIRT) is responsible for ensuring the vulnerabilities discovered in our products are mitigated and communicated responsibly. If you detect a security threat, let us know.

Information on how to subscribe to security notices can be found here.

Read our Security Vulnerability Disclosure Policy Here

Bug Bounty Program

Silicon Labs partners with HackerOne to reward ethical hackers for stress testing our infrastructure and products.

Hackerone logo

Our Bug Bounty program is managed by Hacker One. Anyone may submit vulnerability reports using the directions on the Report Product Security Vulnerabilities page. Rewards are provided for reports on certain targets as described on the page.  Any interested hacker may contact the HackerOne support team.


Submission Form

Please submit your bug via our Submission Page.

Submit Bug Here

Thanks for helping keep Silicon Labs and our users safe! 

Silicon Labs

Stay Connected With Us

Plug into the latest on Silicon Labs products, including product releases and resources, documentation updates, PCN notification, upcoming events, and more.

  • About Us
  • Careers
  • Community
  • Contact Us
  • Corporate Responsibility
  • Investor Relations
  • Press Room
  • Privacy and Terms
  • Site Feedback

Connect With Us:

Silicon Labs
Copyright 2025 Silicon Laboratories. All rights reserved.
Close
Loading Results
Close

Please select at least one column.

Your File Will Start Downloading Shortly

Thank you for downloading .

If you have any issues downloading, please contact sales support or product technical support.