By identifying the assets to be protected in your IoT ecosystem/product and analyzing your vertical sector's common threats we can assess the security risks and chose the appropriate set of security requirements to be implemented in your security architecture. We use our IoT 3D security analysis methodology which is applicable to all types of markets/organizations intending to manage risks that could compromise their sensitive assets.
Our solution is based on several methodologies (such as EBIOS, OCTAVE, Threat modeling, STRIDE, DREAD, OWASP IoT, ISO 27K series, etc.) and in-house tools