According to International Data Corporation (IDC), there will be an estimated 42 billion connected devices by 2025. Each of these devices represents a point of entry that can be exploited by a cyberattack. For devices and systems with safety-critical functionality, a security breach can have catastrophic consequences.
Join Wind River® Principal Security Architect Arlen Baker for a fast-paced look at how to design cybersecurity into can’t-fail devices and systems at the edge.
The Cybersecurity Journey Through the Full Product Lifecycle
Architecting a secure device starts well before the first line of code is written and ends only when the device is taken out of service. Learn how and where security is applied at different stages of the journey.
Capturing Use Case Security Requirements
Planning for security requirements up front greatly reduces friction and cost throughout development and deployment. Learn how they will influence the direction your project takes, and what you will need to prove you’ve met them.
Building a Security Policy
Building your security policy starts with determining the device’s assets, identifying threats to those assets, and defining mitigations to those threats. Your policy has to factor in your risk tolerance as you determine which mitigations to implement.
Designing with a Trusted Foundation
Your device is only as secure as its weakest link, so you must build on top of a proven and trusted platform with hardware-based security features as well as trustworthy software vendors, code pedigree, and secure software development practices.
Hardening and Fortifying
You must anticipate that a breach will happen. Learn to model different threat scenarios and put in place mechanisms to protect your applications, data, IP, and the resiliency of the device. Your threat model should assume that an attacker will get root (admin) access.
Ongoing Threat Prevention
Securing your device or system is a complete lifecycle effort. Threats must be actively monitored and resolutions must be implemented. Learn why proactive endpoint integrity monitoring is a must in today’s interconnected world.
Putting It All Together
Baking security into your system is not easy, but it must be done. Learn where to go to get the help you need to build a secure and safe device.
Security Assessment
Walk through a brief set of questions to see where you stand.