Traditional PKI Was Built for a Different Problem. The three current approaches to OEM device provisioning are all the same architecture in different locations. Here's what an architecture designed for the problem actually looks like.
Four forces — regulation, industry standards, universal connectivity, and AI-assisted vulnerability discovery — have converged on a single irreversible shift: device security has crossed from being a product feature the OEM ships into long-term infrastructure the OEM operates. Every defensive mechanism a connected device has rests on the same load-bearing assumption: that each private key is, at every moment of its existence, only in the place it should be, and only used in the way it should be used.
Of all the places key security has to live, factory provisioning is where the difficulty concentrates — universal across OEMs shipping connected devices, structurally outside the OEM's perimeter, geographically distributed across multiple ODMs and countries. Three approaches exist today (cloud PKI, factory-deployed PKI+HSM, chip-vendor pre-provisioning); from a procurement perspective, three quite different conversations. From an architectural perspective, three variations on a single underlying pattern. This paper develops the case for a fourth answer — not another deployment location, but an architecture designed for factory provisioning from the ground up.
~30pp
Pages
9§
Chapters
4
Architectural Elements
8
Diagnostic Questions
10 Takeaways
Regulation has turned device cybersecurity from a one-time check at launch into a continuous obligation OEMs operate against for years. Industry standards — Matter at the front — have moved attestation from optional to gating. Universal connectivity has put every device into the same adversarial environment. And AI-assisted vulnerability discovery has collapsed the cost of finding exploitable bugs on a timescale most shipped devices were not designed against.
Each force on its own is sufficient to move device security from a one-time product property to a multi-year operational obligation. Acting together, they remove any remaining path on which the older posture could have continued to work.
The architectural decisions an OEM makes about device identity in the next eighteen months will determine what they can ship — credibly, auditably, at scale — for the ten years that follow. This is not a procurement timeline. It is an infrastructure timeline.
Who this paper is for
OEM security architects and decision-makers facing factory provisioning at multi-ODM, multi-silicon, multi-country production scale. It develops an architectural argument grounded in operational reality, not a vendor comparison.
Companion case study available — see related resources.