Improving Embedded Security: Proper Runtime Selection
![Bill Graham Bill Graham](https://blogs.windriver.com/content/images/images-o/6a00d83451f5c369e20154365101ec970c-800wi.jpg)
Selection of secure components for an embedded system is key to a secure system. Leveraging a secure RTOS, middleware, virtualization and tools significantly reduces the effort and development costs. Moreover, there are additional benefits from using commercial-off-the-shelf (COTS) software components over Roll Your Own (RYO) code or self-ported and maintained open source code. Some of the COTS components worth considering include: