thumbnail image
  • Login
GET IN TOUCH
  • HOME
  • ABOUT US 
    • Who we are
    • They trust us
    • Careers
    • Contact
  • WHAT WE DO 
    • Training
    • IoT Security Analysis
    • IoT Security Profile
    • Certification Evidence
    • Pentesting & Certification
    • Solutions By Industry
  • BLOG
  • KNOWLEDGE 
    • Brochures
    • News | Social Feed
    • Videos | Webinars
  • …  
    • HOME
    • ABOUT US 
      • Who we are
      • They trust us
      • Careers
      • Contact
    • WHAT WE DO 
      • Training
      • IoT Security Analysis
      • IoT Security Profile
      • Certification Evidence
      • Pentesting & Certification
      • Solutions By Industry
    • BLOG
    • KNOWLEDGE 
      • Brochures
      • News | Social Feed
      • Videos | Webinars
  • Login
GET IN TOUCH
  • HOME
  • ABOUT US 
    • Who we are
    • They trust us
    • Careers
    • Contact
  • WHAT WE DO 
    • Training
    • IoT Security Analysis
    • IoT Security Profile
    • Certification Evidence
    • Pentesting & Certification
    • Solutions By Industry
  • BLOG
  • KNOWLEDGE 
    • Brochures
    • News | Social Feed
    • Videos | Webinars
  • …  
    • HOME
    • ABOUT US 
      • Who we are
      • They trust us
      • Careers
      • Contact
    • WHAT WE DO 
      • Training
      • IoT Security Analysis
      • IoT Security Profile
      • Certification Evidence
      • Pentesting & Certification
      • Solutions By Industry
    • BLOG
    • KNOWLEDGE 
      • Brochures
      • News | Social Feed
      • Videos | Webinars
  • Security By Design

    Are you unsure of how to properly secure your product or environment? We can assist you in determining the potential risks and constructing a security plan that is tailored to your business's needs.

    GET STARTED
  • IoT Security Assurance Framework

     

    What's our IoT Security Assurance Framework about ?

    Our IoT Security Assurance Framework covers the whole IoT solution from Chip to Cloud and could be integrated at any stage or your IoT solution life-cycle.

     

    It consists of a set of strategic and technical guidelines, security profiles, tools, catalogues of security requirements, a risk-based evaluation methodology for each type of IoT devices, based on standards when they exist.

     

    For more info on our IoT Security Assurance Framework, get your brochure here

     

    CONSUMER (Electronic connected devices, Smart Home, etc.)

    Protection against remote scalable attacks through external interfaces, Data Confidentiality, IP Protection, etc.

    ENTERPRISE (Companies, Education, Finance, Retail, etc.)

    Secure Firmware updates / Reprogramming and Remote Access Authentication, etc.

    INDUSTRIAL (Manufacturing, Oil & Gas,Predictive Maintenance, etc.)

    Local Internal Interface Access Enforced Authentication, Assets Availability, Communication Integrity, etc.

    CRITICAL (Healthcare, Transportation, Military, etc.)

    Firmware Integrity, Secure Booting and Physical Access Authentication, etc.

    IoTsTrust Platform
    Get your Security Profile
    GET IN TOUCH
    Learn More (Q&A)
    Read Our Blog
  • Assurance Framework Process

    Our assurance framework process is designed to provide you with a structured and systematic approach to improving the quality and reliability of your products, services, and systems.

    Red Alert Labs - IoT Security Assurance Framework

     

     

     

  • What is a Security Profile & How is it used ?

    A security profile is a collection of security settings and configurations that determine the level of access to a device or network and define the security measures used to protect data and resources. It is used to enforce security policies, manage access to resources, and control the behavior of users or applications.

    Security profiles can be used to define access controls, set up firewalls, configure encryption, and enforce password policies. They are applied to devices, users, and applications to ensure that security policies are consistently enforced and to simplify the management of security configurations.

    REQUEST YOUR SECURITY PROFILE
    IoT Security Profile
  • With our IoT RAL Questionnaire, decide which Framework you want to implement and at what level !

    BASIC SECURITY

    • Security Awareness Training
    • Security Risk Analysis and Best Practices
    • Compiler Warnings
    • Set of tests covering Basic Security Requirements

    SUBSTANTIAL SECURITY

    + Basic Security

    • Secure Coding Guidelines
    • Design Security Principles and Requirements
    • Static Code Analysis
    • Set of tests covering Enhanced Security Requirements
    • End-of-development Vulnerability Assessment and Penetration Testing
    • Fuzz Testing

    HIGH SECURITY

    + Enhanced Security

    • Ad-hoc security training
    • Source Code review
    • Dynamic Security Program Analysis
    • Set of tests covering Advanced Security Requirements
    • In-development Agile Vulnerability Assessment and security testing
    • Final Security Review
  • Want your questionnaire, or set up a workshop or just more information?

    Got a question ? Get in touch with our team...or schedule a time with us by clicking here

    3 Rue Parmentier, 94140 Alfortville, Paris Area - FRANCE
    Red Alert Labs S.A.S
    827 677 303 R.C.S. Créteil
    +33 9 51 79 07 87
    +33 9 51 79 07 87
    contact@redalertlabs.com
    Get started

© 2023 Red Alert Labs. All rights reserved.

Terms & Conditions
Privacy Policy
    Appelez
    Retrouvez
    Contact
Cookie Use
We use cookies to ensure a smooth browsing experience. By continuing we assume you accept the use of cookies.
Learn More