Self-Assessment Level:
π’ Declaration: You publicly declare that your product meets security requirements.
Process: You assess your product internally against the set security standards.
π€© Advantage π€©
βProvides a starting point for demonstrating your commitment to cybersecurity.
Enhanced Level:
π Validation: You provide evidence that your product is secure.
Process: A Third-Party Assessor reviews your technical documentation to confirm compliance.
π€© Advantage π€©
βIncreases customer confidence by offering external validation of your product's security claims.
Substantial Level:
π Rigorous Examination: A Third-Party Assessors conduct a thorough examination of your product.
Process: Third-party assessors review your product's design, perform vulnerability assessments, and conduct functional testing.
π€© Advantage π€©
βAssures customers that your product can withstand basic cyber threats and attacks from less skilled adversaries.
High Level:
π§ͺ Comprehensive Evaluation: Your product faces the most stringent evaluation.
Process: Third-party assessors conduct penetration testing to assess resistance against skilled attackers.
π€© Advantage π€©
βDemonstrates your product's resilience against advanced cyber-attacks by highly skilled adversaries.
Each level represents a progressive step towards demonstrating the security robustness of your IoT products. From internal assessments to comprehensive third-party evaluations, the goal remains to ensure your products are equipped to handle cyber threats effectively.
