SEC.311 Secure Development Process for OT and (I)IoT

 2.025,00

If you don‘t want to leave security, and therefore the quality of your products, to chance, you need to take a proactive approach. Only the integration of security into development processes and an organization that knows how to deal with this topic in a professional way will result in high-quality products that meet market requirements. The „Secure Development Process for OT and (I)IoT“ training course teaches participants how security can be integrated into product development in order to make their products sustainably secure.

Description

Duration

3 days

Costs/participants
€ 2025,- plus VAT
Minimum number of participants
8 persons
Prerequisite & Completion

No prior knowledge required & certificate of completion

What you can expect from
SEC.311 Secure development processes for OT and (I)IoT

Gain an overview of security standards and regulations

  • Understand how you as a product developer are affected by the NIS 2 directive.
  • Learn about the requirements of the new Machinery Regulation and the Cyber Resilience Act with regard to security in order to obtain CE marking for your product.
  • Get to know the relevant norms and standards that can support you.

Creating a framework for secure product development

  • Learn what secure product development means and how you can ensure the necessary processes in your company.
  • Find out what requirements must be placed on suppliers and how you can ensure the secure handling of third-party components.
  • Get to know the roles and responsibilities in connection with security and which teams and contact points are necessary for this.

Integrating security into the product development process

  • Understand the connection between safety and security.
  • Understand the concept and steps to create a threat model to identify the specific risks to your product and take appropriate action.
  • Discover tools for monitoring and improving product security (e.g. security testing, SBOM).
  • Get to know methods (e.g. secure coding, secure design) for integrating security into your development process.

What you will learn during this training course

Day 1

Overview of regulations

  • Machinery Regulation
  • Radio Equipment Directive (RED)
  • Cyber Resilience Act (CRA)

Overview of standards

  • IEC 62443 General series of standards
  • IEC 62443-4-1 Principles and requirements

Security management

  • Product classification
  • Security Organization
  • Security training
  • Integrity protection
  • Securing the development environment
  • Selection of secure components

Day 2

Specification of security requirements

  • Product security environment
  • Safety & Security
  • Threat analysis

Secure design & development

Security verification & validation testing

Day 3

Vulnerability Management

Security Update Management

Security Documentation

After the training, participants will:

  • understand the connection between safety and security.
  • know and implement regulatory and normative requirements.
  • understand what secure product development entails and what is required in the organization.
  • understand what a threat model is and what is needed to develop one.
  • know suitable methods and appropriate measures for integrating security into the product development process.
  • know useful tools for checking and improving product security.
  • be able to counter challenges such as dealing with legacy code, updating third-party components or communicating vulnerabilities.

More than just training: your journey to secure product development starts here.

Find out how Limes Security can support you not only with training, but also with customized consulting, workshops and standards-compliant support for the secure development of your products.

What others say

Varied training and clearly presented. Pleasant atmosphere and helpful documents.

Awareness & Compliance Training

Relaxed atmosphere in the seminar and high competence of the trainers. Participants were well involved, which led to active discussions. The hands-on exercises worked smoothly and were well described. I will recommend Limes to others.

OT-Security Training

Topic was mega interesting and very informative. The presentation, overview, outline, lecture and speaker were very good and gave me a lot of insight into the topic. Clear delimitation of the topics and not focused on everything.

Product Security Training

Great presentation and speaker who conveyed the topic in a way that was easy to understand. The connection between MR/NIS2/CRA/IEC62443 is now clear to me. For me the walk through of IEC62443 was helpful so I don't have to read it myself but know which bullet points to look at. Good time management.

Product Security Training

The practical part included helpful case studies. Pleasant lecture style, good for following and listening as well as collaborating.

Awareness & Compliance Training

Sympathetic trainers who were helpful with questions, explained a lot using practical examples and gave pleasant explanations.

OT-Security Training

Overview of security requirements according to IEC 62443 was informative and the list of tools to find vulnerabilities in products with Ethernet interfaces was helpful. Good presentation of the topics and many questions were answered quickly.

Product Security Training

Training highlights of the
SEC.311 Secure development processes for OT and (I)IoT

This training goes beyond theory and includes a series of practical exercises where you can apply your knowledge in real-life scenarios. Active participation helps you to really understand the security principles, reinforces key concepts and prepares you for real security challenges in your work.

Each exercise focuses on security management, secure development and threat analysis so that you can acquire comprehensive know-how. Here is a brief overview of the exercises:

1

RACI matrix: Defining roles and responsibilities

Learn to assign and clarify security-related roles and responsibilities within your organization using the RACI framework.
2

Threat modeling in 3 rounds

Identify, analyze and refine potential security threats through an iterative threat modeling process.
3

The operator's perspective: What information do you need?

Take on the role of a system operator to identify the security-critical information required by suppliers for the secure installation and operation of components.

Get to know our
trainers

You may also like…

  • Preview image Limes Academy Awareness Training SEC331
    Select options This product has multiple variants. The options may be chosen on the product page Quick View

    SEC.331 Secure Embedded & (I)IoT-Products Secure Embedded & (I)IoT-Products

     2.350,00
  • SEC.321 Security Testing Foundation

Share