The Role of Tools in Improving Embedded Software Security / Part 3: Mapping the Tools to Activities
![Bill Graham Bill Graham](https://blogs.windriver.com/content/images/images-o/6a00d83451f5c369e2017c32f25039970b-800wi.jpg)
In the previous posts in this series, Part 1: Automation is the Key and Part 2: Security Improvement and the Software Development Lifecycle, I talked about the connection between the typical embedded device development process and the 5+1 improvement framework for embedded security. Figure 1 is an illustration of this connection (and discussed in more detail in a previous post).
![Tools image 1 Tools image 1](https://blogs.windriver.com/content/images/images-o/6a00d83451f5c369e2017ee49686f2970d-800wi.png)
Figure 1: Mapping the security improvement framework and the device software lifecycle