Secure by Design: Where Should Your Workloads Run?|Sasken

  Apr 28, 2025 4:29:59 PM

The Trade-Offs Are Real

Security isn’t an add-on anymore. It’s part of how products are evaluated, certified, and trusted in today’s world. But integrating security into system architecture often comes with tough questions. As product leaders, engineering architects, and compliance owners, you face this dilemma regularly:

  • How do we secure sensitive operations without slowing down the system?
  • Which workloads need full OS capabilities, and which should be isolated in a secure environment?
  • How do we protect high-value AI/ML models from reverse engineering or tampering?
  • Where should threat detection systems live to ensure the data they analyze isn’t compromised?

These aren’t hypothetical concerns. In sectors like automotive, telecom, industrial, and IoT, the wrong architectural decisions can lead to data leaks, regulatory violations, or costly product recalls.

A descriptive caption of the image

Understanding the Core Design Options

Rich Operating System (Rich OS)

This is the standard Linux or Android environment used in most connected devices. It provides full functionality, supports third-party software, and is easy to update. But it also brings baggage – large attack surfaces, dependency vulnerabilities, and risks of privilege escalation.

Secure Enclave (Trusted Execution Environment / TEE)

A Secure Enclave is a hardware-isolated section of the processor that runs code independently of the main OS. Even if the Rich OS is compromised, the workloads inside the enclave stay protected. It could be considered a vault inside your device, ideal for sensitive data and operations.

The question becomes: what goes where?

Key Scenarios Where This Matters

1. Protecting AI/ML Models

ML models, especially ones embedded in edge devices, carry high intellectual property (IP) value. Hosting them in a Rich OS makes them vulnerable to extraction, reverse engineering, or adversarial attacks. Using a Secure Enclave adds a layer of confidentiality, protecting model weights, decision logic, and runtime data.

2. Handling IDS/IPS & Threat Telemetry

Security telemetry is only as good as its integrity. If an attacker tampers with logs or detection modules running in the Rich OS, your threat response may be blind. Isolating key threat monitoring components in a TEE ensures logs and analytics stay trustworthy.

3. System Integrity & Secure Boot

Secure boot mechanisms verify the integrity of firmware and OS at startup. These roots of trust should never be exposed. Keeping boot keys and validation logic in a secure enclave hardens the system against malware injected at the bootloader or kernel level.

4. Compliance-Driven Architecture

Regulations like UNECE WP.29, ISO/SAE 21434, and the EU’s Cyber Resilience Act require demonstrable controls around data confidentiality, secure software updates, and auditability. A secure-by-design approach that uses isolated execution environments supports this by design.

How Sasken Helps

We understand that getting secure architecture right is about balancing trade-offs — security, performance, cost, and compliance. At Sasken, we help customers navigate these decisions with:

  • Architecture Consulting: We work with your product teams to map workloads based on risk, sensitivity, and performance needs. We help decide what stays in the Rich OS, and what gets isolated.
  • Secure ML Model Protection: From quantization to runtime encryption, we help secure AI/ML pipelines deployed on edge or embedded devices.
  • Security for Telemetry & IDS/IPS: We help design and deploy resilient threat monitoring frameworks with protected data channels and secure event handling.
  • Integration with Secure Boot & Crypto Modules: We assist in implementing secure boot flows, firmware signing, and cryptographic protection aligned with hardware features.
  • Compliance Alignment: Whether you're targeting automotive, telco, or industrial standards, we ensure your architecture decisions meet current and emerging mandates.

Conclusion

Security is about making smart architectural choices early in the design process. As attack vectors grow and compliance becomes stricter, knowing where your workloads run is as important as knowing what they do.

The best systems are built to resist them by design.

Are your products architected for compliance, resilience, and security-by-design?

Posted by:
Rahul Bagchi
Associate Vice President-Product Engineering Services, Sasken

Want To Know More About This Topic?

You might also like