Our expertise in embedded product security.
Security requirements are an essential design objective in the development of networked products. They ensure reliable and trouble-free operation. It is essential for reputable manufacturers to ensure that their branded products are not misused as a gateway for malware. In the area of critical infrastructure, there are even legal measures that affect the utilities, healthcare and transport sectors, among others. We ensure both the safety and security of your products.
In addition to industrial automation, we also support these industries with tailor-made OT cybersecurity, which extends to the highest security level (SL 4) according to IEC 62443. As a leading development service provider for OT security, we offer a comprehensive portfolio: From the initial idea to the end of the product life cycle, including comprehensive services for PSIRT teams.
-
One development partner throughout the entire development process
-
Competent support for your project from highly specialised and certified experts
-
Customised cyber security measures
Development services.
To consistently implement the concept of security by design, embeX systematically follows a proven development process that is also available for customers to adopt. Our services cover all aspects of product development and the product life cycle:
Security risk analyses
In IT security, various models play a central role in systematically identifying threats and vulnerabilities and deriving appropriate measures. We work according to the following methods and models, among others:
We prefer to use the STRIDE model, which addresses specific threats such as spoofing (identity concealment), tampering (manipulation), repudiation (denial), information disclosure (data breaches), denial of service and elevation of privilege (extension of rights). This model provides us with a comprehensive basis for securing complex systems.
We use semi-automated risk analysis tools to model threat scenarios with pinpoint accuracy and reliably assess security gaps using standardised risk metrics. We automate data collection from a variety of sources and convert complex relationships into interactive diagrams and flow models that clearly highlight attack vectors.
We prioritise countermeasures according to risk probability and extent of damage so that decisions can be implemented quickly and effectively. Finally, detailed reports on audit documentation and compliance support are provided.
Cybersecurity concept
We develop tailor-made cybersecurity concepts to effectively protect your embedded devices against potential attacks. Our solutions include extensive protective measures for hardware and firmware/software, including secure boot processes, access controls and state-of-the-art encryption technologies. With a comprehensive approach, we tailor our concepts individually to your requirements, guided by proven safety standards. Our objective: To provide optimum protection for our customers' products against manipulation, data misuse and unauthorised access. Rely on our expertise to ensure the long-term security of your devices. Contact us to develop a cybersecurity concept for your products together.
Fuzzing test
Our fuzzing tests make your embedded devices more robust and secure. We specifically simulate unexpected or random inputs in order to detect vulnerabilities in software and hardware at an early stage. Thanks to modern testing methods and automation, we reliably uncover hidden security vulnerabilities – before they become a problem in real-world scenarios. Our experienced experts analyse interfaces, protocols and input/output behaviour to comprehensively test your systems. Talk to us to sustainably improve the quality and safety of your products.
Penetration test
With our penetration tests, we check the security of your embedded devices under realistic attack scenarios. Our team of experienced specialists will analyse your hardware, firmware and communication protocols in order to identify potential vulnerabilities. In the process, we simulate real cyber attacks and provide you with specific recommendations for action to keep your systems at the highest level of security. Our focus: Making your products resilient to modern threats. Contact us to strengthen your customers' confidence in your secure systems.
Secure development and secure coding
We make security an integral part of your development projects. Our expertise in secure development and secure coding ensures that vulnerabilities are avoided right from the development process. We rely on rigorous code analysis, input validation and memory access optimisation to protect your software against common security vulnerabilities. Our methods and the tools we use ensure that the development process produces systems that are not only functional but also highly secure. Trust in our experience and proven best practices to make your products sustainably secure. Contact us.
Services throughout the product life cycle
Our membership in the Alliance for Cyber Security – an initiative of the Federal Office for Information Security (BSI) – underscores our commitment to maximum security.
We live up to this claim both internally and externally: Our employees are fully certified according to recognised safety norms and standards. Among other things, they are qualified as CySec Specialists (TÜV Rheinland). Certified by the EC Council's Certified Ethical Hacker (CEHv11), they have specialised skills in ethical hacking methods for identifying and remedying security vulnerabilities.
Certified products from certified employees.
Our membership in the Alliance for Cyber Security – an initiative of the Federal Office for Information Security (BSI) – underscores our commitment to maximum security.
We live up to this claim both internally and externally: Our employees are fully certified according to recognised safety norms and standards. Among other things, they are qualified as CySec Specialists (TÜV Rheinland). Certified by the EC Council's Certified Ethical Hacker (CEHv11), they have specialised skills in ethical hacking methods for identifying and remedying security vulnerabilities.
We live up to this claim both internally and externally: our employees are comprehensively certified in accordance with recognised security norms and standards. Among other things, they are qualified as CySec Specialists (TÜV Rheinland). Certified by the EC Council's Certified Ethical Hacker (CEHv11), they have specialised skills in the field of ethical hacking methods for identifying and eliminating security vulnerabilities.
Guidelines & standards.
We work according to the following guidelines and standards, among others:
- ISO 31000 Risk management — Guidelines
- ISO 27033 Information technology — Security techniques — Network security
- ISO 27034 Information technology — Security techniques — Application security
- ISO/IEC 15408 Information technology — Security techniques — Evaluation criteria for IT security (Common Criteria)
- IEC 62443 Security for industrial automation and control systems
- NIST SP 800: „Cybersecurity framework”
- ETSI Cyber Security Technical Committee (ETSI TC)
- Bundesamt für Sicherheit in der Informationstechnologie (BSI): Standard 200-3: „Risk Analysis based on IT-Grundschutz”
- Bundesamt für Sicherheit in der Informationstechnologie (BSI): "ICS Security Compendium”
- Bundesamt für Sicherheit in der Informationstechnologie (BSI): „Requirements for network-capable industrial components v2.0”
- PNO: „PROFINET Security Class 1 Guideline”
- CLC/TS 50701 Railway applications - Cybersecurity