By AJ Shipley
As a security professional in the business of helping Wind River customers protect their systems from malicious intent I am frequently asked how they should approach security. Here are my thoughts on a tried and true approach to security.
At a very high level, you can approach security from one of two possible paths; you can secure the infrastructure that devices use to communicate with each other or you can secure the devices that are attaching to the infrastructure. Although great security requires addressing both the infrastructure and the devices, Wind River is specifically suited to securing the devices because of where Wind River products reside in the device stack.
A secure device is an orchestra of different security instruments including hardware security, application security, secure middleware, and secure communication stacks. The conductor of this orchestra is the operating system which can effectively weave all of these instruments together to create a security symphony.