Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Building Secure Automotive IoT Applications

You're reading from   Building Secure Automotive IoT Applications Developing robust IoT solutions for next-gen automotive software

Arrow left icon
Product type Paperback
Published in Aug 2024
Publisher Packt
ISBN-13 9781835465509
Length 358 pages
Edition 1st Edition
Arrow right icon
Authors (4):
Arrow left icon
Dr. Dennis Kengo Oka Dr. Dennis Kengo Oka
Author Profile Icon Dr. Dennis Kengo Oka
Dr. Dennis Kengo Oka
Jeff Yost Jeff Yost
Author Profile Icon Jeff Yost
Jeff Yost
Sharanukumar Nadahalli Sharanukumar Nadahalli
Author Profile Icon Sharanukumar Nadahalli
Sharanukumar Nadahalli
Ram Prasad Bojanki Ram Prasad Bojanki
Author Profile Icon Ram Prasad Bojanki
Ram Prasad Bojanki
Arrow right icon
View More author details
Toc

Table of Contents (22) Chapters Close

Preface 1. Part 1: Introduction to Automotive IoT FREE CHAPTER
2. Chapter 1: Automotive Technology Trends 3. Chapter 2: Introducing Automotive IoT Use Cases 4. Part 2: Vehicle Architectures
5. Chapter 3: Vehicle Architecture and Frameworks 6. Chapter 4: Vehicle Diagnostics 7. Chapter 5: Next Wave of Vehicle Diagnostics 8. Part 3: Secure Development for Automotive IoT
9. Chapter 6: Exploring Secure Development Processes for Automotive IoT 10. Chapter 7: Establishing a Secure Software Development Platform 11. Chapter 8: Securing the Software Supply Chain 12. Part 4: Automotive IoT Application Life Cycle
13. Chapter 9: System Design of an Automotive IoT Application 14. Chapter 10: Developing an Automotive IoT Application 15. Chapter 11: Deploying and Maintaining an Automotive IoT Application 16. Part 5: Automotive Software Insights
17. Chapter 12: Processes and Practices 18. Chapter 13: Embedded Automotive IoT Development 19. Chapter 14: Final Thoughts 20. Index 21. Other Books You May Enjoy

Summary

This chapter provided the foundation for establishing a secure software development platform in any organization.

First, we reviewed the various activities to perform in the SSDLC, such as the TARA/threat model, requirements review, design review, code review, SAST, vulnerability scanning, fuzz testing, DAST, IAST, and penetration testing.

Then, we discussed how to create a project inventory as this helps an organization better understand the security posture and plan, manage, and track cybersecurity activities for each project based on the risk level.

This chapter also provided a step-by-step practical guide on how to establish a secure software development platform. Specifically, we described the workflow where different project development teams can run a set of automated AppSec tooling in a CI pipeline. The different project development teams can define specific requirements and criteria for when which types of tools should be executed. Examples of AppSec tooling...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime