Basic Needs in My Build Chain
Security begins at the design table. True. Yet it is enhanced and comes alive in the build chain. It is here where we will implement and validate our security policies, test, scan our prototypes, and leverage all the informational sources at our disposal to ensure that our product is as secure and robust as it possibly can be, long before it sees its first customer.
Here is truly where all the magic happens (or sadly, it doesn’t if you choose to ignore it). In the previous chapters, we have addressed countless design factors that have led up to your conceptual initial design criteria. From here and forward, we will be working hands-on to ensure those embedded systems’ best practices are adhered to along with the application of security measures.
Here’s a non-exhaustive sample of what may be in your company’s build environment. These tools should be accessible only to those working directly on this product or supporting...