Skip to main content
  1. Blog
  2. Article

Sarah Dickinson
on 26 February 2019


Security remains the number one concern when designing and deploying IoT devices. High profile breaches continue to occur and concerns cease to subside. For any organisation, security needs to be front of mind and considered from the start – not as an afterthought. Having no mechanism in which to address security concerns can be as significant as threatening the survival of a business.

Many organisations have adopted Ubuntu Core to help manage the security and integrity of their IoT devices. Ubuntu Core features leading security credentials and protects against online threats. However, with many IoT devices deployed remotely, how can organisations ensure protection against physical access and the data on those devices?

This whitepaper gives a technical overview of how Ubuntu Core with full disk encryption and secure boot can be implemented to provide protection in such scenarios including a case study of this in practice.

Highlights of this whitepaper include –

  • The built in benefits of Ubuntu Core such as confinement and isolation to provide best in breed security.
  • Overview of how full disk encryption and secure boot was implemented on Ubuntu Core for a customer to provide tamper resistant access and data protection for remotely deployed devices.
  • Using the NXP i.MX6 application processor as a reference platform, explanation of how these features can be extended to other hardware platforms to provide similar security capabilities.

To download the whitepaper, click here or fill out the form below.

In submitting this form, I confirm that I have read and agree to Canonical’s Privacy Notice and Privacy Policy.

Related posts


Henry Coggill
17 February 2026

Announcing FIPS 140-3 for Ubuntu Core22

Hardening Article

FIPS compliance for IoT use cases in Federal space. In this article, we’ll explore what Ubuntu Core is, and how to use it with FIPS. ...


Lidia Luna Puerta
14 January 2026

How to build DORA-ready infrastructure with verifiable provenance and reliable support

Ubuntu Article

DORA requires organizations to know what they run, where it came from, and how it’s maintained. Learn how to build infrastructure with verifiable provenance. ...


Florencia Cabral Berenfus
17 December 2025

Extending ROS Noetic Support with ESM-Enabled Content Snaps

Robotics Article

Canonical has now extended its ESM (Expanded Security Maintenance) for ROS coverage to ROS Noetic content-sharing snaps. With ESM for ROS now available in both deb and snap formats, Ubuntu continues to be the trusted foundation for secure, long-term robotics innovation. ...