Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

The 6 stages of a holistic hardware security development lifecycle

By Vernetta Dorsey
Software-as-a-Service
November 16, 2020

Building security and privacy into product development is more critical today than ever before. First introduced through the Microsoft Trustworthy Computing initiative in the early 2000s, the well-known security development lifecycle (SDL) is a framework designed to do just that. It was originally devised to enhance software security, but an SDL process can and should be applied to all types of products to help root out security and privacy vulnerabilities, while establishing long-term resilience in the rapidly evolving threat landscape.

At Intel, for instance, we’ve taken a holistic approach to SDL, customizing the process to address the highly integrated nature of hardware, firmware and software development. Why? Security researchers and bad actors alike are increasingly focused on trying to identify hardware vulnerabilities. Additionally, hardware security presents a pair of inherent challenges not found in software. First, hardware development cycles are generally longer and more complex due to the various coordination required across the manufacturing process, requirements for specialized components, testing processes in diverse conditions and more. Second, hardware updates are often far more difficult because of physical limitations to the amount of code that fits in a piece of hardware, constant uptime requirements, integration with firmware or software, etc.

These two obstacles mean hardware engineers must place an emphasis on security during product development, and actively work to anticipate new usage models and potential threats years in advance. In order to build and support more secure hardware products, consider the following best practices across each stage of the security development lifecycle (SDL):

 

  1. Planning and Assessment – Start by having security experts interview product architects with the goal of helping the project team identify the necessary security tasks and processes across the development cycle. In this stage, your team should map out and assign cryptography and privacy reviews, as well as other architectural assessments. For hardware specifically, it’s important to carefully plan and execute security assurance appraisals for any third-party components and intellectual property (IP). Conducting a thorough risk assessment up front can help you avoid designing for or purchasing third-party IP from an untrustworthy source or that has been compromised at some point within the supply chain. Failing to take this initial step when planning your product could leave it open to major vulnerabilities you must patch retroactively (which can be an immensely complex, time-consuming and costly proposition for hardware systems).

 

  1. Architecture – Next, it’s time to develop your architectural specifications. Once specs have been finalized and sent off to the design team, any undetected security gaps become much harder to address. So here it is critical that security architects and developers work together to define security objectives, build an appropriate threat model and document product security and privacy requirements. Your team should complete every review laid out in the planning and assessment process, while architects follow secure design principles (such as least privilege, fail safely and securely, defense in depth, zero trust, etc.) throughout this process. By conducting due diligence in the hardware architecture phase, you can often identify and resolve hardware security or privacy issues that would otherwise take months (and sometimes even years) of re-architecture, design, validation, production and distribution to address.  

 

  1. Design – In this phase, your team will want to ensure that the product design satisfies all the architectural specifications defined in the previous phase. Hardware validation experts should take the lead on defining your security and privacy validation strategy, using appropriate hardware tools (which vary based on your industry), security test plans and regression testing to achieve confidence that the product design meets all architectural requirements.  

 

  1. Implementation – Now you’ll need to work to ensure that product implementation addresses the threat models defined in the architecture phase, and that the development team is on track to deliver a trustworthy product. In this phase, you’ll perform manual secure code reviews and static code analysis as appropriate to identify any hardware issues, such as register transfer level (RTL) issues. Establish formal verification for implemented mitigations against glitching attacks and other threats, and help confirm that all aspects of the product are performing as designed and architected. The team should also spend time verifying and accounting for any necessary updates to the SDL and formal security validation plan (to address any new findings or updated test requirements) to execute on in the next phase.

 

  1. Security Validation – When done successfully, the security validation stage can help account for known and emerging threats and risks, and even help anticipate unknown vulnerabilities. Throughout this process, the product team should execute and document a variety of security and privacy analyses as appropriate, including penetration testing, fuzzing exercises and more. From a hardware security perspective, it’s important to conduct physical attack assessments to help ensure your product isn’t open to clock glitching attacks, denial of service or other attack types. Any bugs you identify during validation should be triaged and addressed prior to release. At this point, your team should be able to make a strong recommendation whether or not to ship a product, since you will have information regarding whether the product is clear of known risks, meets security requirements and is supported with an appropriate survivability plan.

 

  1. Release and Post Deployment – When releasing hardware, the goals include delivering a trustworthy product that can be effectively supported throughout its lifecycle. This entails evaluating and updating third-party hardware components and IP to account for known vulnerabilities, working to eliminate any malware from the release package, and putting a plan in place for product support, hardware patch contingencies (via firmware or software) and survivability.

 

In today’s dynamic threat landscape, both researchers and bad actors will continue to devote more time and energy toward cracking hardware products and with the complexity of modern computer systems, absolute security is not guaranteed. But now more than ever, the industry must make a committed effort to continuously improve the quality, security and privacy of new hardware products. This starts with a “security first” mindset and a commitment to applying SDL principles throughout each stage of hardware development, in addition to firmware and software. As more organizations take this proactive approach and leverage the above best practices, the industry as a whole can find and resolve potential hardware vulnerabilities earlier, and deliver products that offer the level of security, privacy and resilience required today. 

KEYWORDS: computer security cyber security software security threat landscape

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Vernetta dorsey

Vernetta Dorsey is the Product Security Practices Enablement Engineer at Intel. She manages the Security Development Lifecycle and Privacy by Design requirements for Intel, as well as business unit enablement and other special projects. This focuses on protecting Intel products by encouraging and mandating the use of secure design and coding principles and privacy consideration across the Intel portfolio. Prior to joining Intel, Vernetta worked for Bank of America for eight years in several technology management positions focused on information security, software engineering and development and emergency preparedness. Vernetta started off her career as an Army officer, serving over nine years in technology management positions including telecommunications, information systems, and infrastructure protection. She received her B.S. in Computer Science from the University of Denver in 1996 and her M.B.A in Global Business from Georgia Institute of Technology in 2012.

 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

Coding

AI Emerges as the Top Concern for Security Leaders

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • The Long and Winding Road to Cyber Recovery

    Security from the Start: Why Cyber Awareness is Critical at the Initial Stages of Business

    See More
  • Technician checking video camera

    The three "T's" of device lifecycle management

    See More
  • Zero-trust-freepik

    4 stages of a zero trust self-assessment

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!