From Cybersecurity Goals to Development to Test
Once the risk assessment is completed, we will help with the setting of cybersecurity goals, defining the cybersecurity concept, and refining the requirements. At that point we will have the understanding needed to implement cybersecurity controls in software.
We have a focus on the implementation of cybersecurity in resource constrained embedded processors. The building blocks of cybersecurity include secure boot, secure software updates, secure passwords, authentication, and secure communications which we will implement utilizing secure features built into the microprocessor. Code written will be compliant to MISRA C guidelines.
We’ll also provide testing for the code we have written, including static code analysis, coverage testing, interface testing, and resource usage evaluation. To improve efficiency and coverage, an automated test environment is available.