KontronOS

The Secure, Hardened Linux®-Based Operating System for Edge Devices

Faster to Market with Certainty – Your Advantages at a Glance

Cybersecurity: Complies with current requirements such as CRA, EN 18031 and NIS-2 – for maximum protection throughout the entire product lifecycle.

Fast time-to-market: Shortened development times thanks to preconfigured, tested components and integrated toolchains.

KontronOS as a service: Pay as you go – no NRE costs for standard versions. Flexible basis as a bridge to the Build-or-Buy decision.

Secure platform from a single source: Combination of Hardware + Operationg System = optimal basis for customer-specific applications – reliable, scalable and integrated.

Security & Timeliness

KontronOS secures embedded hardware devices in the field – throughout the entire product lifecycle.

The requirements for networked embedded devices go far beyond simple security updates. Fail-safe operation, flexible software adaptability, efficient delta updates, and low data consumption are crucial for reliable operation. With KontronOS, you get a hardened, Linux®-based operating system that meets all these requirements and provides your customer applications with a stable, secure, and future-proof platform – even in the most demanding industrial environments.

Platform for Secure Operation of Customer Applications

KontronOS was developed with a clear focus on security and provides a robust foundation for the reliable operation of customer applications. The hardened system design and integrated security mechanisms significantly reduce the effort required for certification according to the Cyber Resilience Act (CRA), EN 18031, NIS-2, and IEC 62443. Companies benefit from a verifiably secure platform that meets regulatory requirements at the operating system level. This shortens time-to-market while increasing confidence in the entire solution. KontronOS makes security a key USP—from development to productive use.

Standard to Flexibly Customizable

KontronOS adapts to your requirements—from standardized functions to tailor-made solutions.

The operating system has a modular structure and can be flexibly adapted to specific hardware or customer applications. Our comprehensive development and customer support accompanies you from integration to productive use, including customization, troubleshooting, and updates. This means you not only benefit from a stable, secure platform, but also from efficient development support that saves time and resources and accelerates the implementation of new features.

KontronOS Features

Compliance

Compliance

Security

Security

Hardware Flexibility

Hardware Flexibility

Adaptability

Adaptability

Robustness

Robustness

Versatility

Versatility

Manageability

Manageability

Updateabilty

Updateabilty

Secure Boot / HAB on Kontron Hardware

Maximum security right from the start: Secure Boot and HAB (Hardware-Assisted Boot) on Kontron hardware guarantee that only approved and digitally signed software is executed. This protects your embedded devices from unauthorized changes from the very first second. Other providers are usually unable to offer this from a single source, as the necessary keys and factory settings are only provided by Kontron for KontronOS. The result: fast, secure commissioning of a complete solution in which software, hardware, and security mechanisms are perfectly coordinated—without any additional configuration effort.

AL i.MX8M Mini / LTE

AL i.MX8M Mini / LTE

K-Box A-251-AML/ADN

K-Box A-251-AML/ADN

K-Box A-151-TGL

K-Box A-151-TGL

K-Box A-151-EKL

K-Box A-151-EKL

IoT Bundle with KontronGrid and Kontron Hardware

KontronOS in a Complete Package: Software, Hardware, and IoT Expertise From a Single Source.

We deliver the system ready for operation and take care of maintenance throughout its entire life cycle. Cyclical updates for KontronOS and the system ensure that your devices always remain up to date and secure. Thanks to the close coordination of software and hardware, everything works together seamlessly – with optional hardware consulting included. Devices can be delivered ready to use “from the factory” with the OS pre-installed, while KontronGrid is already onboarded and enables zero-touch provisioning. This saves time, reduces integration effort, and guarantees smooth operation of your embedded devices, which is a huge advantage, especially for large-volume deployments.

Download Our Provided Documents

PDF

Factsheet KontronOS

Contact Our Expert

Marc Roeder

Marc Roeder

Product Manager KontronOS

FAQ KontronOS

What are the potential risks of a network-based cyberattack?

At the heart of KontronOS is a read-only sector that cannot be changed. Access to the operating system is managed by assigning user and user rights. Each application is assigned specific user rights, which are very limited and restricted to only the necessary functions. In the production version, the bootloader and the operating system are hardened and reduced to the essentials.

Are there means and measures that prevent the user from accessing the underlying operating system from accessing the underlying operating system?

The KontronOS core is a read only sector that cannot be changed. Access to the operatingsystem is managed by assigning user user and user rights. Each application is assigned specific user rights, which are very limited and restricted to only the necessary functions. In the production version, the bootloader and the operating system are hardened and reduced to the essentials.

What are the risks if the web panel software is not maintained?

We maintain and service the. Webpanel software and KontronOS in general by releasing newupdates with corrections, security updates and functional improvements four times a year. If our customer does not use this updated software, he cannot benefit from the security updatesand other improvements. The risk is that security vulnerabilities are exploited and devices are compromised. Also, future regulations such as CRA (Cyber Resilience Act) may not becomplied with.

Are security patches recommended and provided? How are they installed? Support until when? What are the costs?

We strongly recommend that you install the security updates. Updates with integrated security patches are released published four times a year and provided as delta updates to reduce the data volume for LTE connections. The updates can be installed from the cloud or locally using a USB stick, for example. The update of our standard image runs via a service fee. Customer-specific adaptations or developments are offered separately.

Does the device have protection against network-based cyber attacks?

Yes, a firewall prevents uncontrolled access to the system. In addition, the system is protected by regular penetration tests against external attacks. These tests reveal possible security gaps in the system. We assess the risks and eliminate the critical security security problems in our KontronOS.

What are the potential risks of a network-based cyberattack?

If attackers gain access to the corporate network through devices, they can either encrypt corporate data and hold it for ransom, steal data, or perform negative actions such as disabling systems.

Get the latest news straight to your inbox

Kontron logo