Your browser does not support JavaScript!

Where Are You Today on the Hardware Security Maturity Model?

Hardware security is a journey.

LEVEL 1: Foundational
Define security requirements and validate hardware security features are working with functional verification.

LEVEL 2: Basic
Introduce threat models and security verification requirements while also enabling hardware protection mechanisms. Ad hoc security verification begins at this stage.

LEVEL 3: Advanced
Security verification is well documented and is now applied throughout the entire design cycle. All results are reported before tape-out.

LEVEL 4: Comprehensive
The final goal is an end-to-end governance program with trackable metrics that shows progress toward a mandated security signoff.