Documents
Documents
Cybersecurity across the Product Life Cycle
Security begins at the earliest development stages and continues until a product is retired. This ensures robust security protection at every step.
-
- Concept & Design: Identify critical assets and possible risks before development begins.
- Development: Embed cybersecurity into software, and hardware architecture. Validate security repeatedly as the project evolves.
- Production: Apply secure processes in manufacturing to protect device and software.
- Operation & Maintenance: Monitor for vulnerabilities, fix the issues quickly through patch, and update security features as threats change.
- Decommissioning: Securely remove sensitive data and components when device or its components reach end-of-life.
TARA & PEN Testing:
Proactive risk management by Identifying and mitigating the risk is at the heart of ISO/SAE 21434. As part of the Telematics product development, we do the TARA & PEN test.
-
- TARA (Threat Analysis & Risk Assessment): Identification and evaluation of threats to prioritize what needs protection and how to protect them.
- Penetration Testing (PEN test): Simulated cyberattacks to the telematics device to find vulnerabilities and recommend fixes.
Findings from TARA are mapped to risk ratings & ISO/SAE 21434 compliance checklists and used to derive the cybersecurity specifications. iWave could provide audit ready reports for customers.
iWave offers ready to integrate Cybersecurity software modules, designed to meet ISO/SAE 21434. Below are these modules.
- Secure Boot
- Secure Storage
- Security modules
- Authentication
- Access Control
- Secure Communication
- Key and Certificate management
- Logging and monitoring



