Audit and accountability

Delivering reporting functionality on compromised systems

Today, many Internet of Things systems do not include auditing capabilities. If an attack occurs, there is no way for administrators to know who committed the attack and how. An auditing function securely stores records of suspicious events. In the event of dubious circumstances, these audit records can be consulted to determine whether an attack actually took place or whether suspicious events are simply due to coincidence (such as a holiday rush of business). If it transpires that an attack took place, the audit trail can be used to work out how the attack was performed, establish accountability and possibly prosecute the criminals and prevent similar attacks in the future.

For successful auditing, all infrastructure components need to  generate  audit records documenting the success or failure of events such as system/device configurations, logins, plus authentications of signed or encrypted requests.

Infrastructure systems and components are required to  transmit all audit records and logs to a dedicated log management system, without compromising overall system performance.

Our security microcontrollers include a tamper-resistant protected memory area that can be used to securely log all control events for subsequent inspection.

Benefits at a glance

  • IoT devices can be manufactured with secure logging functionality
  • Service providers can detect attacks promptly and take appropriate countermeasures
  • End users can also detect attacks promptly and protect their devices accordingly


Application brochure


Videos: IoT security demonstrations

Experience our broad range of demonstrations including the embedded security solutions of our OPTIGA™ product family