The Challenge

  • Client wants to extract Bluetooth functionality currently implemented in their products to an external device
  • Related risks must be analyzed and a concept for securing this device defined

The Approach

  • Perform a cybersecurity risk analysis in conformity to IEC 62443 and identify relevant threats
  • Define possible control measures for these threats and risks and consult on the selection of measures for implementation
  • Provide guidance for the corresponding implementation

Result & Added Value

  • Relevant threats and related possible vulnerabilities were documented
  • Alternative concepts for the implementation of the external BT device incl. functional split and communication between BT device and product were defined
  • A comparison of these concepts incl. information on necessary security mechanisms was presented
  • The definition of security requirements and design for the chosen implementation was supported
Gabriel Krämer
Head of Cybersecurity
We are here to help

Connect with us

Need support in developing your technology solutions? Let’s have a conversation about your projects and explore how we can create value together.