With IoT security, knowledge is power. In fact, in our PSA Certified 2021 Security Report we found that 84% welcomed industry guidance on security best practice, and that only 77% were happy with the security expertise in their company, which sadly drops to 41% in small companies. With all that in mind, we think it’s more important than ever to provide up-to-date training on IoT security and PSA Certified, providing a frictionless path to secure products.
Only three quarters are satisfied with the level of security expertise within their company
Under half of technology decision makers carry out a threat analysis in the design of every new product
are satisfied with the level of security expertise within their company sized between 1 and 49 employees
Enter the PSA Certified Foundational Training Course which has been developed by the world-class training team at Arm, one of the PSA Certified co-founders. This training course has been designed for decision makers and architects to learn more about the PSA Certified scheme, why it’s important and how it can be used.
Chapter 1.1 has six short videos covering why PSA Certified is important. It also covers some of the key elements of the scheme including the three levels of PSA Certified and an introduction to the PSA Certified 10 Security Goals.
Chapter 1.2 covers a more in depth look at the PSA Certified 10 Security Goals. The PSA Certified 10 Security Goals is a foundational baseline for all connected devices to meet and provides a key component of PSA Certified Level 1 security certification.
Chapter 2 introduces one of the most important aspects of security implementation: Threat Modeling. When we surveyed IoT decision makers we were shocked to hear that only 47% carry out a threat model for every new product. This is alarming as threat models are a key best practice resource to ensuring that security is implemented correctly.
This is precisely why we have covered threat modeling in our training course. There are many ways to do carry out Threat Modeling and in this module, we cover some of the key methodologies. There are four videos in this chapter.