Security Concepts for Your IoT Products

Looking for help sucuring your IoT applications against cyberattacks?

We are your part­ner for the secu­ri­ty of IoT devices and are hap­py to help you with the deve­lo­p­ment of secu­ri­ty con­cepts adap­ted to your pro­ducts and services.

From Concept to Implementation – Our Service Overview

Workshops

A work­shop can be used to assess the sta­tus quo, iden­ti­fy poten­ti­al and lay the ground­work for fur­ther con­sul­ting services.

Over­view:

  • Dis­cus­sion of the most important issu­es for the imple­men­ta­ti­on of a secu­re IoT solu­ti­on in your company
  • Exis­ting initi­al approa­ches, ide­as and con­cepts can be taken up as a basis for discussion
  • Iden­ti­fi­ca­ti­on of opti­miz­a­ti­on poten­ti­als for exis­ting solutions
  • Initi­al non-bin­ding secu­ri­ty assess­ment of the sta­tus quo
  • Defi­ni­ti­on of necessa­ry steps for fur­ther development

Development of a concept

Tog­e­ther with you, we deve­lop an indi­vi­du­al secu­ri­ty con­cept for your com­pa­ny that covers pos­si­ble risk scenarios.

Over­view:

  • Deve­lo­p­ment of a sui­ta­ble safe­ty concept
  • Taking up approa­ches deve­lo­ped in the work­shop
  • Clo­se coope­ra­ti­on with PHYSEC experts to com­bi­ne domain know­ledge, tech­ni­cal exper­ti­se and IT secu­ri­ty expertise.

Specification

Pre­cise iden­ti­fi­ca­ti­on of the requi­re­ments for the secu­ri­ty solu­ti­on is fun­da­men­tal in order to ensu­re an opti­mal fit with the indi­vi­du­al app­li­ca­ti­on context.

Over­view

  • Collec­tion of rele­vant requi­re­ments for the sys­tem as well as for the indi­vi­du­al IT-rele­vant com­pon­ents and interfaces
  • Lis­ting and descrip­ti­on of func­tio­n­al and non-func­tio­n­al requi­re­ments as well as bounda­ry con­di­ti­ons in a docu­ment (simi­lar to a requi­re­ments specification)
  • Defi­ni­ti­on of inter­ac­ti­ve func­tions in the form of use case diagrams
  • Soft­ware design, con­sis­ting of archi­tec­tu­re, design pat­terns, data struc­tures and algorithms

Implementation

As part of the imple­men­ta­ti­on work, we sup­port you in embed­ding the secu­ri­ty con­cept in your cor­po­ra­te environment.

Over­view:

  • Che­cking whe­ther indi­vi­du­al com­pon­ents of exis­ting solu­ti­ons can be used in order to avoid redundancies
  • Acti­ve sup­port in the deve­lo­p­ment and deploy­ment of safe­ty com­pon­ents by the PHYSEC Team

Our phi­lo­so­phy is that the team that accom­pa­nied the imple­men­ta­ti­on work should not be the same team that per­forms the secu­ri­ty assess­ments in the end. The­re­fo­re, we sup­port you in the best case eit­her pri­or to the imple­men­ta­ti­on pha­se or alter­na­tively during the ana­ly­sis pha­se in order to be able to achie­ve the hig­hest pos­si­ble level of protection.

← home­page