Your browser does not support JavaScript!

Incorporating CWE into Security Requirements

MITRE’s Common Weakness Enumeration is a powerful tool for understanding and addressing modern system vulnerabilities

MITRE’s Common Weakness Enumeration (CWE) is the industry’s formal list of common hardware weaknesses addressing the increasing vulnerabilities from today’s complex systems, controls and processes. The CWE list provides a solid framework for preventing security vulnerabilities by helping identify missing security requirements.

When conducting a hardware security review, security teams begin by threat modeling and pinpointing assets they need to protect. They then establish specific security requirements that will ensure a “secure by design” status.

CWEs can be utilized to ensure the derived security requirements cover all industry-established common weaknesses applicable to the threat model are addressed, as well as identifying any requirements that may have been overlooked. Reporting coverage against the CWE database provides a quantifiable metric to effectively communicate what has been verified.

With vulnerabilities continually rising, a measurable reduction in hardware security risk requires a robust technical solution with broad coverage that is designed to validate CWEs.

By identifying 80% of common hardware weaknesses in the CWE database, Radix serves as a strong foundation for a comprehensive security verification process by:

  • Protecting against both emerging security weaknesses identified in CWE and known security threats
  • Identifying your secret assets and the relevant CWEs
  • Using the CWEs as a basis for writing Radix Security Rules
  • Providing a quantifiable metric to effectively communicate what has been verified

Related Links:

Level up your hardware security today.

Get the confidence of end-to-end hardware security assurance throughout the product lifecycle. Contact us today to see how.