CYMOTIVE’s Security Engineering Lifecycle Model
1
Risk Analysis
Risk Analysis
The Risk Analysis provides clear visibility on the cyber threats and attack vectors to the vehicle’s Electrical Control Units (ECUs), Systems, and Architecture. For every identified risk, mitigations and controls are proposed while taking into account the context of automotive constraints.
2
Security Architecture
Security Architecture
Based on the identified risks, CYMOTIVE’s security architects formulate the desired security specification for the implicated components, functions, and systems. The security specification is then presented to the relevant supplier(s) to ensure implementation criteria are cut clear.
3
Design &
Implementation
Review
Design &
Implementation
Review
Continuous technical review of the supplier’s implementation of agreed security specifications. The process ensures no gap is present as a result of a human error or an implementation fault.
4
Security Testing
Security Testing
Security testing is conducted on selected samples to validate that the functionality and functions meet the security requirements defined in the security specifications.
5
Pen Testing
Pen Testing
A broad range of Hardware and Software Penetration Testing. Whether Black, Gray or White box hacking, the goal is always the same: to identify missing requirements, faulty implementation, incomplete testing, etc.
CYMOTIVE’s Pen Testing methodology combines hardware hacking techniques with a unique Purple approach, giving us a distinct edge in the Penetration Testing domain.
Interested in one or more of our services?
Contact us for more information.
Call us at:
+972.79.572.9960
Email us:
marketing@cymotive.com