SECURE-BY-DESIGN IOT OPERATION WITH SUPPLY CHAIN CONTROL
DOSS elaborates a secure-by-design methodology and implements related technology for complex IoT architectures, based on supply chain monitoring, component testing and architecture modelling. The project establishes a “Supply Trus...
DOSS elaborates a secure-by-design methodology and implements related technology for complex IoT architectures, based on supply chain monitoring, component testing and architecture modelling. The project establishes a “Supply Trust Chain” with integrating key stages of the IoT supply chain into a digital communication loop to facilitate security related information exchange. The technology includes security verification of all hardware and software components of the modelled architecture. A new “Device Security Passport” will be defined for 3rd party hardware and its components. 3rd party software, open-source applications, as well as in-house developments will be tested and assessed. The centrepiece of the proposed solution is a flexibly configurable Digital Cybersecurity Twin, able to simulate diverse IoT architectures. It will employ AI for modelling complex attack scenarios, discovering attack surfaces, and elaborating the necessary protective measures. The digital twin will provide input for a configurable, automated Architecture Security Validator module which will assess and provide pre-certification for the modelled IoT architecture in respect of relevant, selectable security standards and KPIs. To also ensure adequate coverage for the back end of the supply chain the operation of the architecture will also be protected by secure device onboarding, diverse security and monitoring technologies and a feedback loop to the digital twin and actors of the supply chain, sharing security relevant information. The procedures and technology will be validated in three IoT domains: automotive, energy and smart home.This new secure-by-design approach for complex IoT operations will be an early implementation of the concept and requirements of the proposed European Cyber Resilience Act and will provide an operational reference model. Based on our learnings and experiences we will make policy recommendations and will contribute to standardisation.ver más
Seleccionando "Aceptar todas las cookies" acepta el uso de cookies para ayudarnos a brindarle una mejor experiencia de usuario y para analizar el uso del sitio web. Al hacer clic en "Ajustar tus preferencias" puede elegir qué cookies permitir. Solo las cookies esenciales son necesarias para el correcto funcionamiento de nuestro sitio web y no se pueden rechazar.
Cookie settings
Nuestro sitio web almacena cuatro tipos de cookies. En cualquier momento puede elegir qué cookies acepta y cuáles rechaza. Puede obtener más información sobre qué son las cookies y qué tipos de cookies almacenamos en nuestra Política de cookies.
Son necesarias por razones técnicas. Sin ellas, este sitio web podría no funcionar correctamente.
Son necesarias para una funcionalidad específica en el sitio web. Sin ellos, algunas características pueden estar deshabilitadas.
Nos permite analizar el uso del sitio web y mejorar la experiencia del visitante.
Nos permite personalizar su experiencia y enviarle contenido y ofertas relevantes, en este sitio web y en otros sitios web.