The deliverable was submitted in M10. This deliverable reports on the activities of T1.1, T1.2 and T1.3 and includes the security requirements elicitation and threat models for the use cases and the first version of the CERTIFY security lifecycle methodology.
This document reports on the first version of the CERTIFY security lifecycle methodology and on the three use cases part of the project; namely, connected cabin system, smart micro-factories, and tracking and monitoring of artworks.
The use cases were chosen to represent a range of applications for embedded systems that are a component of complex systems. Consideration of operational circumstances and requirements was made when describing the use cases. Then, through the use of secondary research, pertinent threat scenarios and related risks have been identified.
Through the identification of requirements and risks stated in this document, these efforts helped to achieve the MS1 - "Initial requirement elicitation and threats modeling."
In conclusion, the Certify project's Security requirements, threats models, and initial CERTIFY lifecycle management are most important and very essential to run the development phase smoothly. This deliverable is one of the most important deliverable to get all the aspects of all the use cases and scenarios.