Technology Protection

TrustedCOTS Embedded Processor Cards
Technology Protection

TrustedCOTS™ Embedded Processor Cards

Enhance security with TrustedCOTS solutions

The threats facing today’s defense and aerospace applications are more varied and sophisticated than ever. Embedded electronics require enhanced trusted computing protections to defend mission success from compromise from physical and remote attacks and hardware and software failures.


Curtiss-Wright builds trusted computing technologies and techniques into every aspect of our security solution development, from design and testing to supply chain and manufacturing. This comprehensive, end-to-end approach creates an effective mesh of protection layers that integrate to ensure the reliability of Curtiss-Wright products in the face of attempted compromise. Our Trusted Commercial-off-the-Shelf (TrustedCOTS™) and Enhanced TrustedCOTS portfolio of embedded security products and capabilities are aligned to give you the flexibility, control, and options you need to build the right assurance level into your program. 

 

Read the TrustedCOTS and Enhanced TrustedCOTS for Trusted Computing Brochure

Download the Brochure

Deploy Defense-Grade Security with Enhanced TrustedCOTS

TrustedCOTS and Enhanced TrustedCOTS leverage the commercial domain’s extensive secure state-of-the-art R&D investments, which we integrate into rugged, reliable, and reusable technology blocks. Our modular open system approach (MOSA) to security uses no custom hardware, facilitating rapid and easy integration into host systems. Indeed, this approach is so adaptable it can be retrofitted to existing systems. Traditionally, defense-grade security solutions require custom hardware somewhere in the system to protect Critical Program Information (CPI). This was an expensive and time-consuming effort that could cause significant program schedule delays. Our enhanced TrustedCOTS approach provides the necessary infrastructure on select processor modules to allow the hosting of IP from Raytheon Intelligence & Space, Idaho Scientific, and Wind River.

TrustedCOTS Embedded Processor Cards

TrustedCOTS

Our approach to embedded security design deploys defense-in-depth and defense-in-breadth strategies to take advantage of the security technologies inherent in commercial components and employ defense-grade security technologies. Our TrustedCOTS framework is a baseline security framework that fully enables the security capabilities of commercial hardware and software technologies to protect your application from compromise. This framework includes protection mechanisms for the boot chain, access control for configuration menus,
software authentication mechanisms, encryption, and sanitization routines for onboard memory. Additional software capability can be added for data in transit encryption and firewalls. Designed primarily to assist in meeting risk management framework (RMF), cyber, and secure boot requirements, this level of security applies to systems deployed worldwide.

 

Enhanced TrustedCOTS

The Enhanced TrustedCOTS framework builds upon TrustedCOTS by allowing the use of specialized security capabilities to be added to provide higher levels of protection with a secure state-of-the-art FPGA. Through technology partnerships, Curtiss-Wright can add additional capabilities to meet more demanding security requirements. Using a modular open systems approach to embedded security, industry-leading security IP is easily hosted on our security-enabled hardware to deliver personalized program protection to the customer.

  • XMC-529 AMD Zynq UltraScale+ MPSoC plug-in security enabled module
  • XMC-528 AMD Zynq UltraScale+ MPSoC plug-in security enabled module

Trusted Boot

This paper focuses on establishing initial trust in the boot process and the various means to do that, although many of these same techniques are also useful for extending trust to the operating system and application code.

Data Protection Domains

Data-at-Rest-Encryption  
Data-at-Rest-Encryption

Curtiss-Wright offers proven and certified COTS storage solutions that match data security requirements, including NSA Type 1, CSfC, CC and FIPS 140-2.

Data-In-Motion Encryption  
Data-In-Motion Encryption

Data-in-motion, also called data-in-transit, refers to digital information when transferring between network system nodes.

Trusted Supply Chain  
Trusted Supply Chain

We go the extra mile to protect our supply chain and manufacturing processes.