Hardware best practices
But before getting into the nitty-gritty of the various things that can be done to secure the hardware, let's discuss shortly the approach that needs to be taken to secure embedded devices.
One of the things to keep in consideration while building embedded devices is that most of the hardware-based vulnerabilities can't be fixed once the product is out in the market. This means that you need to be extremely careful from the very start when working with hardware.
The other thing to note while building hardware devices for IoT solutions is to always think about the resources that an attacker would get access to if he is able to reach the hardware. This means that if an attacker is able to open up the IoT device what visible components would be seen by him if he looked at the PCB. Moreover, what could the attacker do if he went a step further and had access to the hardware interface via a shell.
These are some of the things that should be considered while building embedded...