Aerospace & Defense OEM Employs Edge Encryption to Protect Software from Manufacture to Mission

Table of Contents

A leading A&D prime contractor supporting the U.S. Missile Defense Agency (MDA) was developing next-generation defense capabilities. The customer faced the critical challenge of securely delivering cryptographic key material and mission-critical firmware directly to deployed devices – while eliminating human touchpoints, reducing risk of compromise, and aligning with STIG compliance mandates. Traditional models depended on manual processes, air gaps, and on-prem security protocols that could no longer scale to the desired automation, assurance, and operational tempo.

 

ISS Solution

ISS deployed its Secure Platform for Aerospace & Defense (SPAD) – a hardened cryptographic distribution solution combining its Digital Lifecycle Management (DLM) appliances that generate, deliver, and secure cryptographic materials. This enabled end-to-end integrity across a secure software supply chain. Key highlights:

  • Integration of DLM signing and distribution appliances into a SCIF-compliant architecture.
  • Development of an embedded communication layer for direct key and firmware retrieval from the device.
  • Implementation of SPAD capabilities:
    • Authenticates sites, users, and devices
    • Validates and transports software packages securely
    • Automates delivery of mission-critical updates to FPGA-based systems (e.g., UltraScale MPSoC).
  • STIG-hardening to government standards with remote update mechanisms, enabling the system to operate in fully airgapped environments without ISS access.

Results

  • Eliminated human-in-the-loop steps for cryptographic provisioning and firmware delivery
  • Delivered proof-of-concept enabling secure software signing and deployment to embedded missile subsystems
  • Delivered edge encryption to protect mission software from factory to target system in the field.
  • Demonstrated ability to operate in a SCIF with no external connection or vendor presence
  • Positioned the contractor to meet emerging MDA standards for lifecycle cryptographic integrity

Lorem ipsum dolor sit amet consectetur. Nulla id nisi pretium potenti dolor eget. In consectetur est sem ac hendrerit. Lobortis et nunc lectus lectus elit. Lacus scelerisque lorem non sagittis eu ipsum. Aliquam diam arcu placerat malesuada. Facilisis consequat eu gravida proin ornare quisque gravida orci. Tellus laoreet ornare sed nunc nascetur vulputate. Ultricies tristique blandit elit quisque vestibulum.

Popular Case Studies

Smart Cities & Infrastructure

A global electric vehicle manufacturer needed to support ISO 15118-compliant Plug & Charge across its growing network of vehicles, charge points, and service providers. As EV adoption accelerated, the company required a unified trust infrastructure that could authenticate vehicles, chargers, and mobility service providers automatically — eliminating user friction while maintaining cryptographic control and compliance with international standards.

Smart Cities & Infrastructure

Smart infrastructure operators face escalating risks as PLCs, SCADA systems, elevators, building management systems (BMS), and connected city services converge on digital networks. These assets are long-lived, safetycritical, and regulated under IEC 62443, SIL 3/4, and NIST SP 800-82. Challenges include legacy assets with expired credentials, PLC-driven elevators integrated into fire and BMS systems, and emergency phone lines converted to IP/VoIP, creating new attack surfaces. SCADA/DCS controllers managing power, water, and city services are also exposed to cyber and compliance risks, compounded by fragmented visibility across suppliers and infrastructure. To meet safety and regulatory demands, operators require a resilient, audit-ready trust foundation ensuring compliance and uptime.

Power, Energy & Utilities

A leading U.S. power utility needed to secure and modernize its digital trust infrastructure across IT and OT networks. With thousands of certificates, keys, and secrets spread across enterprise applications, SCADA devices, and mobile endpoints, the risk of outage, cyberattack, and compliance gaps was rising sharply. At the same time, the organization faced increasing regulatory pressure and had committed to a full digital transformation by 2030, requiring a more resilient, unified trust foundation.

Resource Library

Post-Quantum Cryptography Implementation Guide

Deep dive into post-quantum crypto deployment strategies for embedded systems

Post-Quantum Cryptography Implementation Guide

Deep dive into post-quantum crypto deployment strategies for embedded systems
Ready to Secure Your Trust Lifecycle?

Let's secure your entire trust lifecycle from the physical edge to the cloud, the sea, and beyond.