To Counter Increasingly Complex IoT Supply Chain Attacks
Many companies store signing private keys long-term on CI servers or engineers' environments, creating “inherent supply chain risks.” Ciot removes keys from CI/CD and centralizes governance via HSM + KMS, turning signing into a mandatory pipeline checkpoint (Policy Gate), while providing auditable, traceable, and rotatable governance.
Building a complete trust chain starting from the hardware (Chain of Trust), with each verification step relying on rigorously signed software images.
CHANGING assists clients in establishing a software trust foundation on MCUs, SoCs, and endpoint devices that can be validated and managed over the long term. During device boot, code is verified layer by layer starting from the Root of Trust (e.g., Boot ROM). Without a governable Code Signing mechanism, Secure Boot cannot be fully enforced.
Extending "Trust" to the production line, preventing the supply chain from becoming a security gap (Factory as a Trust Boundary)
CHANGING’s architecture supports production-line-oriented secure signing, deployable at the development stage or final assembly as needed. Keys are isolated and controlled via KMS and HSM, ensuring private keys are never exposed during production operations.
Distributed Production × Centralized Key Governance × Fully Auditable
The biggest advantage is seamless integration with existing CI/CD, moving private keys from the CI Server to the HSM, and centrally managing and auditing them via KMS so that the development process naturally meets compliance requirements
Security design for equipment with 10–20 year operational lifespan
Integrates CLM (Certificate Lifecycle Management) to handle renewals, revocations, and rotations, supporting long-term maintenance while reducing human risk.
CLM Certificate Lifecycle ManagementSupports smooth algorithm upgrades and provides a PQC (Post-Quantum Cryptography) migration path, ensuring long-term defense and compliance flexibility.
PQC SolutionProvides compatibility verification strategies for legacy firmware and existing devices, preventing unexpected industrial system downtime from security upgrades and maintaining operational stability.
Providing a secure foundation for various development, production, and operational scenarios
Integrate CI/CD, moving private keys from CI Server to HSM, governed and audited via KMS
Signed update packages with source verification and anti-tampering protection
Compliant with chip vendors’ Secure Boot specifications
Supports IEC and network security requirements
Helping enterprises address supply chain security and product cybersecurity requirements
| Standard / Regulation | Code Signing Correspondence | Implementation Goals & Benefits |
|---|---|---|
| IEC 62443-4-2 | Software Integrity & Authenticity | Ensure industrial control components’ software source is verifiable and intact, reducing unauthorized updates and tampering risks. |
| EU CRA (Reference Extension) | Secure Development / Update Integrity | Establish auditable signing and update governance processes, supporting long-term maintenance and supply chain risk control. |
| NIST FIPS 140-3 (HSM Optional) | Cryptographic Key Protection / Key Custody | Using compliant HSMs and governance design enhances key protection and satisfies audit requirements. |
| Secure SDLC / Supply Chain Governance (Extension) | CI/CD Signing Gate / Release Traceability | Integrate signing into the Pipeline as an enforced gate, ensuring releases are traceable and auditable, reducing inherent supply chain risks. |
Private keys remain within the HSM security boundary throughout the signing process, reducing leakage and misuse risks while ensuring key sovereignty and auditability.
Provides highly available API interfaces that can be directly embedded into existing CI/CD and production workflows, turning signing into an enforced Policy Gate while retaining full audit trails.
Offers governance-ready designs for mass production and long-term maintenance scenarios (audit, rotation, revocation, compatibility verification), helping solutions to be deployable and sustainably operational.
CHANGING consulting team will help you assess your current R&D and production workflows, planning a Code Signing governance framework (HSM / KMS / CLM) that aligns with international standards, and provide guidance for CI/CD integration and practical implementation