
Embedded Device Assessment
Discover device vulnerabilities and improve security against cyber attacks
Identify weaknesses of an embedded device that connects to your enterprise network. This connectivity creates a foothold for attacker access to your organization’s critical asset management, sensitive data, and business processes.
Mandiant experts reveal systematic flaws in both the device’s development and operating process, to implement improved security methods across the development lifecycle.


Perform Early Risk Remediation
Identify and mitigate hidden threats before large-scale device market rollout and prevent reputational damage.

Identify Critical Security Gaps
Apply developmental best practices to implement a security-oriented approach to protect your customers.

Reduce Production Costs
Implement necessary security improvements prior to mass production with an independent prototype analysis.
Overview
An embedded device can be any appliance used in the home or in the office that is connected to your organization’s enterprise network and cannot be managed through traditional security controls. These are often called ‘smart’ devices, which are a class of devices collectively referred to as the Internet of Things or “IoT”. Most consumers and businesses use these devices as an asset inventory program or risk management solution. The security risks of these devices manifest from various management features that servers contain like endpoint detection and response products or vulnerability scanning tools, which are abstracted by the vendor-supplied interface.
Manufacturers must consider the highest level of protection for their customers, as discovered vulnerabilities in production units could lead to damaging compromise for their customer’s personal and professional assets, along with reputational harm for the manufacturer itself.
Our Embedded Device Assessment highlights the strengths and weaknesses of your specific device, along with your development process. Understanding systemic flaws in the development process will improve the security of your device throughout its lifecycle.
Security objectives over the lifecycle of a device

Embedded Device Assessments Features

Expert Risk Analysis
Real-world risk analysis and threat modeling based on the deployment scenario of your embedded device (e.g., locked network versus public location).

Comprehensive Testing
Security testing of associated software and component services of the embedded device.

Best Practice Analysis
Security analysis of hardware interfaces, wire protocols, running services, and microprocessor features.

Flexible Delivery Options
(1) Black-box testing where Mandiant receives no prior information about the device, and (2) White-box testing where your staff and our experts collaboratively discuss device design during the engagement.

Demonstrated Impact
Mandiant develops tools that demonstrate the impact of discovered vulnerabilities, including backdoor access of the device’s specific architecture.

Technical Details
Step-by-step technical data that enables your team to recreate our findings—this ensures understanding of the vulnerabilities to avoid introducing them again in the future.

Tactical Recommendations
Long-term improvement recommendations for your device’s security across its development lifecycle.
Our Methodology
With frontline experience in both embedded software and hardware design, Mandiant’s Embedded Device Assessment methodology enables us to bring together our incident response experience by identifying specific attacker tactics, techniques, and procedures (TTPS), on a daily basis.
Mandiant experts start by threat modeling a specific device’s typical deployment setting—uncovering real-world risks to highlight the impact of compromise. Next, our experts analyze critical components of the device, such as hardware interfaces, debugging capabilities, firmware and update mechanisms, and network service components.
Mandiant uses the information gathered from this analysis to identify vulnerabilities in the device and in turn provide recommendations on the best course of action for remediation and hardening of the device’s security posture.
TESTIMONIAL
“The quality and comprehensiveness of the FireEye plan, combined with continuous guidance, ongoing customizations and hands-on implementation support enabled the rapid realization of meaningful improvements to our worldwide cyber defense capabilities.”
- Global Healthcare Provider
Related resources
Blog
Embedded Device Security Testing at Every Stage of Development
Blog
Separating the Signal from the Noise
Blog
Rooting a Logitech Harmony Hub: Improving Security in Today's IoT World
Ready to get started?
Our security experts are
standing by to help you with an incident or answer questions about
our
consulting and managed detection and response services.