Jun 07, 2012 device security

Simplifying the Security Approach

By AJ Shipley

AJ Shipley Blog Photo

As a security professional in the business of helping Wind River customers protect their systems from malicious intent I am frequently asked how they should approach security.   Here are my thoughts on a tried and true approach to security.

At a very high level, you can approach security from one of two possible paths; you can secure the infrastructure that devices use to communicate with each other or you can secure the devices that are attaching to the infrastructure.  Although great security requires addressing both the infrastructure and the devices, Wind River is specifically suited to securing the devices because of where Wind River products reside in the device stack.

A secure device is an orchestra of different security instruments including hardware security, application security, secure middleware, and secure communication stacks.  The conductor of this orchestra is the operating system which can effectively weave all of these instruments together to create a security symphony.

Continue reading >>

Previous The GENIVI Universe
Next Open source in Medical Devices: Part of the Cure or Part of the Disease?