The Challenge
- Client wants to extract Bluetooth functionality currently implemented in their products to an external device
- Related risks must be analyzed and a concept for securing this device defined
The Approach
- Perform a cybersecurity risk analysis in conformity to IEC 62443 and identify relevant threats
- Define possible control measures for these threats and risks and consult on the selection of measures for implementation
- Provide guidance for the corresponding implementation
Result & Added Value
- Relevant threats and related possible vulnerabilities were documented
- Alternative concepts for the implementation of the external BT device incl. functional split and communication between BT device and product were defined
- A comparison of these concepts incl. information on necessary security mechanisms was presented
- The definition of security requirements and design for the chosen implementation was supported
Related Projects
Our Competencies
With INVENSITY by your side, you have access to our wide scope of competencies, in-depth knowledge, and our highly skilled and experienced team of consultants.





