Improving Embedded Operating System Security Part 2: Enable a More Secure Configuration
Despite the hype surrounding the state of embedded security, many of the runtime platforms that these systems are based on can be made more secure through proper configuration. Moreover, it’s important to keep the platform updated since the RTOS likely has many security vulnerabilities fixed that were present in older versions. Default configurations for embedded operating systems are often tuned for performance and memory footprint and have various features off by default.