Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Building Secure Automotive IoT Applications

You're reading from   Building Secure Automotive IoT Applications Developing robust IoT solutions for next-gen automotive software

Arrow left icon
Product type Paperback
Published in Aug 2024
Publisher Packt
ISBN-13 9781835465509
Length 358 pages
Edition 1st Edition
Arrow right icon
Authors (4):
Arrow left icon
Dr. Dennis Kengo Oka Dr. Dennis Kengo Oka
Author Profile Icon Dr. Dennis Kengo Oka
Dr. Dennis Kengo Oka
Jeff Yost Jeff Yost
Author Profile Icon Jeff Yost
Jeff Yost
Sharanukumar Nadahalli Sharanukumar Nadahalli
Author Profile Icon Sharanukumar Nadahalli
Sharanukumar Nadahalli
Ram Prasad Bojanki Ram Prasad Bojanki
Author Profile Icon Ram Prasad Bojanki
Ram Prasad Bojanki
Arrow right icon
View More author details
Toc

Table of Contents (22) Chapters Close

Preface 1. Part 1: Introduction to Automotive IoT FREE CHAPTER
2. Chapter 1: Automotive Technology Trends 3. Chapter 2: Introducing Automotive IoT Use Cases 4. Part 2: Vehicle Architectures
5. Chapter 3: Vehicle Architecture and Frameworks 6. Chapter 4: Vehicle Diagnostics 7. Chapter 5: Next Wave of Vehicle Diagnostics 8. Part 3: Secure Development for Automotive IoT
9. Chapter 6: Exploring Secure Development Processes for Automotive IoT 10. Chapter 7: Establishing a Secure Software Development Platform 11. Chapter 8: Securing the Software Supply Chain 12. Part 4: Automotive IoT Application Life Cycle
13. Chapter 9: System Design of an Automotive IoT Application 14. Chapter 10: Developing an Automotive IoT Application 15. Chapter 11: Deploying and Maintaining an Automotive IoT Application 16. Part 5: Automotive Software Insights
17. Chapter 12: Processes and Practices 18. Chapter 13: Embedded Automotive IoT Development 19. Chapter 14: Final Thoughts 20. Index 21. Other Books You May Enjoy

Secure software supply chain risk management

With this understanding of RASIC, vendor security assessment, CIAD, the risks of OSS, and SBOMs, let’s put it all together to get a comprehensive view of secure software supply chain risk management (SSCRM).

Generally speaking, SSCRM focuses on identifying, assessing, and mitigating the risks associated with the software development life cycle (SDLC). These steps are briefly explained as follows.

Identifying the risks

The first step in SSCRM is identifying the risks in the software supply chain. An organization can start by creating a comprehensive inventory of all supply-chain-related software components used in their projects. Thus, this inventory includes all libraries, frameworks, OSS components, third-party-developed components, commercial components, external cloud services, and so on.

The organization then needs to analyze all these components in its inventory for potential weaknesses and vulnerabilities. This includes...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime