default banner

Security standardization schemes and regulations require that potential vulnerabilities and weaknesses threatening cybersecurity  systems be surveyed, monitored, communicated, and mitigated, across the supply chain and during the full life cycle of a product.  More and more regulations also deal with monitoring and mitigation, and updates of implementations.

Regarding Cybersecurity, a recognized process to discover, survey, monitor, communicate and mitigate vulnerabilities and weaknesses during the whole life cycle of a device is the establishment and operation of a Product Security Incident Response Team (PSIRT) as defined by the Forum of Incident Response and Security Teams: FIRST.

FIRST has split the typical Incident Response process flow in 4 phases:

PSIRT

 

  • Notification & Triage
  • Assessment & Coordination
  • Remediation & Release
  • Recovery & Closure

Secure-IC PSIRT Services is compliant with IEC 62443 and with ISO/SAE 21434 standards

 

 

  • Inspired by the principles listed by FIRST, Secure-IC has put in place a Cyber Security and Safety, in order to offer PSIRT services to the users of its cybersecurity solutions.

 

 

Deliverables

  • Access to the Secure-IC weaknesses and vulnerabilities information tool (including information on analysis status, severity, applicability, patch availability) for information relevant to customer’s products via Secure-IC Secuyzr™ Server platform
  • Delivery of reports on newly discovered and published relevant attacks, vulnerabilities, weaknesses, limited to Secure-IC domain of expertise with restitution during workshops
  • Dedicated support for Vulnerability identification, analysis and mitigation service for a defined number of vulnerability assessment requests per year
  • Proposal of mitigation / fix within specific time windows for critical, major and minor vulnerabilities*
  • Security assurance activities integrated into the Secure Development Lifecycle (SDL) as defined in IEC 62443 (if relevant to customer’s application) or  other compliance/certification scheme as defined with the Customer
  • Access to all relevant published software security updates

*Disclosure timelines on a case-by-case basis

Related Products

 

 

ONE DAY, SECURITY
WILL BE WORTH
MORE THAN DEVICES

Contact