With frontline experience in both
embedded software and hardware design, Mandiant’s Embedded Device
Assessment methodology enables us to bring together our incident
response experience by identifying specific attacker tactics,
techniques, and procedures (TTPS), on a daily basis.
Mandiant experts start by threat modeling
a specific device’s typical deployment setting—uncovering real-world
risks to highlight the impact of compromise. Next, our experts analyze
critical components of the device, such as hardware interfaces,
debugging capabilities, firmware and update mechanisms, and network
Mandiant uses the information gathered
from this analysis to identify vulnerabilities in the device and in
turn provide recommendations on the best course of action for
remediation and hardening of the device’s security posture.