DH electronics GmbH
scroll Scroll Down down

Embedded Security

Protect your embedded systems with a customized security strategy

Embedded Security

What is Embedded Security?

Embedded systems are often used in safety-critical environments and must be protected; for example to ensure the safe operation of production facilities or critical infrastructure.

Embedded security includes measures to protect embedded systems against cyber threats, which are intended to ensure high availability of components and protection against manipulation and unauthorized information leakage.

Specialists and managers must therefore urgently gain an understanding of the criticality of cyber security in the context of embedded systems and react accordingly.
We are happy to provide support in the identification and assessment of risks as well as the design and implementation of suitable embedded security measures.

Who is embedded security relevant for?

With the introduction of the Cyber Resilience Act (CRA) at the latest, cyber security is on everyone's lips, as all products with digital elements are affected - and there are plenty of them.
This means that there will hardly be any current products that do not fall under the CRA, which is why managers, product managers and specialist departments should get to grips with it at an early stage.
In addition to the CRA, there are other security-relevant laws and standards that we would like to briefly introduce.

  1. Cyber Resilience Act: EU-weite Vorschriften für die Sicherheit vernetzter Produkte
  2. Produkthaftungsgesetze: Sicherheitsanforderungen an Hersteller und Anbieter
  3. Bundesdatenschutzgesetz (BDSG): Datenschutzanforderungen in Deutschland
  4. IT-Sicherheitsgesetz für kritische Infrastrukturen: Schutzmaßnahmen für kritische Infrastrukturen zur Gewährleistung der Systemsicherheit

The goal of DH electronics is to provide customers with comprehensive, long-term support in complying with important safety requirements and legal regulations.

Tailored Embedded Security

Tailored Embedded Security
There is no universal solution for embedded security. That's why DH electronics develops an individual security strategy for each customer - from selective consulting to holistic implementation.

~ Our philosophy

Our approach:

Risk analysis & scenario planning

Start with a joint workshop to determine the security requirements for the specific product.

Conformity & standards

Consulting on compliance with Cyber Resilience ACT (CRA), IEC 62443 and other regulations

Long-term support

We take care of cyber security during the product's service life with the help of maintenance contracts or flexible budgets.

Technological basis: security through open source

Mainline Linux as a basis for independent and fast security updates:

Regular updates

Proactive security updates keep your system up to date at all times.

Secure Boot Implementation

Protection against manipulation and unauthorized access.

Modular Yocto layer structure

Enables simple and continuous Linux upgrades.

Our offer: regular security updates & CVE reports

  • Mainline Kernel LTS release: Annually in Q4
  • DH: LTS kernel update: Every year in Q1
  • YOCTO LTS release: Every two years in Q2
  • Embedded Linux LTS update: Every two years in Q3
  • YOCTO LTS update: Every two years in Q3
  • Additional minor updates as required
  • Provision of YOCTO CVE reports and software bill of materials (SBOM) to identify and fix security vulnerabilities

Research & practice: cooperation with Augsburg University of Applied Sciences

Through close cooperation with Augsburg University of Applied Sciences, DH electronics brings the latest findings from research directly into practice - for maximum secure embedded systems.
Let's optimize your embedded security together! Contact us for an individual consultation or a security workshop.

Contact us
+