Governments are introducing cyber security regimes such as the Product Security and Telecommunications Infrastructure (PSTI), the Radio Equipment Directive (RED) and the US Cyber Trust Mark. These aim to address manufacturers’ requirements by setting out security requirements for connected products as well as the compliance requirements that apply to manufacturers.
As the market for connected products and Internet of Things (IoT) devices grows, governments are tightening the cyber security requirements that manufacturers of products with wireless interfaces must follow.
Determining which legislation applies to a product is complex because it varies by the type and purpose of the device, as well as whether the device is for consumer or business use. This complicates the process of achieving cyber security compliance, potentially making manufacturers vulnerable to significant penalties for non-compliance.
Our team of cyber security and compliance experts will guide you through this complexity using the services below, so you can be confident that your product portfolio meets every point of relevant compliance.
- A readiness assessment – confirm what legislation applies to products and evaluate each product’s strengths, weaknesses, gaps and areas for improvement to achieve compliance.
- Product compliance assessments – based on evidence that includes questionnaires, receive confirmation of compliance, a Statement of Compliance document, and a detailed report on any areas of non-compliance.
- CSA IoT Device Security Specification (IoT DSS) compliance assessment – demonstrate that smart products and IoT devices meet a comprehensive set of technical and organisational security requirements.
- Product security assessment – test all product components via a specialist and technical hands-on assessment based on a broad set of security requirements derived from industry standards.
Get started
Our experts are ready to streamline your pathway to robust compliance with device security legislation, giving you confidence that your organisation is protected from the consequences of non-compliance.
Get in touchSecurity Assessment
Keep up with the ever-changing threat landscape. Identify vulnerabilities before attackers do.