Solution
Motivation
Several countries and standards are putting forward security assurance regulations on ICT supply chains, on vendors, and on service providers to ensure the trustworthiness of their products and services. Many of the requirements impose high transparency towards 3-rd party authorized auditors and evaluators.
Approach
Balancing the need for security assurance with protecting intellectual property, we provide a comprehensive evaluation process while safeguarding vendors’ proprietary technologies.
Solution
Proposed solution for the CEST project involves confidential computing technologies, software analysis tools, and methodologies for security software assurance. The CEST platform will provide representative test use cases for the Telco industry domain and suggestions for standardization.
Demo
Take a look at our prototype in action.