The Role of Tools in Improving Embedded Software Security / Part 3: Mapping the Tools to Activities
In the previous posts in this series, Part 1: Automation is the Key and Part 2: Security Improvement and the Software Development Lifecycle, I talked about the connection between the typical embedded device development process and the 5+1 improvement framework for embedded security. Figure 1 is an illustration of this connection (and discussed in more detail in a previous post).
Figure 1: Mapping the security improvement framework and the device software lifecycle