No specific details are publicly available, probably for security reasons, but I believe some general practices are involved, such as:
Firmware updates are usually signed with a digital signature to verify their authenticity and integrity. This ensures that the firmware has not been tampered with and is from a trusted source.
Devices may use secure boot processes that only allow firmware with a valid digital signature to be loaded and executed.
Before applying the firmware update, the system may calculate and verify the hash of the firmware file to ensure that it matches the expected value.
You might want to contact Meraki to see if they have any detailed information or even documentation.
I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.
Please, if this post was useful, leave your kudos and mark it as solved.