{"id":2862,"date":"2024-05-14T11:56:14","date_gmt":"2024-05-14T09:56:14","guid":{"rendered":"https:\/\/www.spacesecurity.info\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\/"},"modified":"2024-10-28T09:39:39","modified_gmt":"2024-10-28T08:39:39","slug":"mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices","status":"publish","type":"post","link":"https:\/\/www.spacesecurity.info\/en\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\/","title":{"rendered":"MITRE Releases EMB3D\u2122 \u2013 A Cybersecurity Threat Model for Embedded Devices"},"content":{"rendered":"<p><em>Collaborative framework provides common understanding to mitigate cyber threats to critical infrastructure<\/em><\/p>\n<p>MCLEAN, Va. &amp; BEDFORD, Mass., May 13, 2024&#8211;(<a href=\"https:\/\/www.businesswire.com\/\">BUSINESS WIRE<\/a>)&#8211;The EMB3D Threat Model is now publicly available at <a href=\"https:\/\/emb3d.mitre.org\">https:\/\/emb3d.mitre.org<\/a>. The model provides a cultivated knowledge base of cyber threats to embedded devices, providing a common understanding of these threats with the security mechanisms required to mitigate them. The model is the result of a collaborative effort by <a href=\"https:\/\/www.mitre.org\/\">MITRE<\/a>, Niyo Little Thunder Pearson, <a href=\"https:\/\/redballoonsecurity.com\/\">Red Balloon Security<\/a>, and <a href=\"https:\/\/narfgroup.com\/\">Narf Industries<\/a>.<\/p>\n<blockquote><p>\u201cThe diverse perspectives and invaluable insights shared have fortified our approach, ensuring a robust and effective solution to address the evolving challenges in embedded device security.\u201d<\/p><\/blockquote>\n<p><strong>EMB3D model strengthened by peer reviews from infrastructure industries<\/strong><\/p>\n<p>After the model garnered significant interest for peer review across diverse industries, numerous organizations piloted the threat model, offering invaluable feedback. The EMB3D team appreciates the interest and feedback from vendors and integrators across many industries, including energy, water, manufacturing, aerospace, health, and automotive, as well as researchers and threat tool vendors. This ongoing collaborative effort has been instrumental in refining and enhancing the model\u2019s content and usability. The team looks forward to continued collaboration to strengthen the ability of the model to enable &#8220;secure by design.&#8221;<\/p>\n<p><em>&#8220;Our framework\u2019s strength lies in the collaborative efforts and rigorous review process across industries,&#8221;<\/em> said Yosry Barsoum, vice president and director, Center for Securing the Homeland at MITRE. <em>&#8220;The diverse perspectives and invaluable insights shared have fortified our approach, ensuring a robust and effective solution to address the evolving challenges in embedded device security.&#8221;<\/em><\/p>\n<p><strong>Leveraging established models to strengthen embedded device security<\/strong><\/p>\n<p>EMB3D aligns with and expands on several existing models, including <a href=\"https:\/\/cwe.mitre.org\/\">Common Weakness Enumeration<\/a>, <a href=\"https:\/\/attack.mitre.org\/\">MITRE ATT&amp;CK\u00ae<\/a>, and <a href=\"https:\/\/cve.mitre.org\/\">Common Vulnerabilities and Exposures<\/a>, but with a specific embedded-device focus. The threats defined within EMB3D are based on observation of use by threat actors, proof-of-concept and theoretical\/conceptual security research publications, and device vulnerability and weakness reports. These threats are mapped to device properties to help users develop and tailor accurate threat models for specific embedded devices.<\/p>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-2857\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-1024x443.png\" alt=\"\" width=\"696\" height=\"301\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-1024x443.png 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-300x130.png 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-768x332.png 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-1536x664.png 1536w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-696x301.png 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-1068x462.png 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D.png 1744w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><\/p>\n<p>For each threat, EMB3D suggests technical mechanisms that vendors should build into the device to mitigate the given threat. EMB3D is a comprehensive framework for the entire security ecosystem\u2014device vendors, asset owners, security researchers, and testing organizations.<\/p>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-2855\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-1-1024x475.png\" alt=\"\" width=\"696\" height=\"323\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-1-1024x475.png 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-1-300x139.png 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-1-768x356.png 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-1-1536x713.png 1536w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-1-696x323.png 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-1-1068x495.png 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-1-1920x891.png 1920w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-1.png 1996w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-2859\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-1024x442.png\" alt=\"\" width=\"696\" height=\"300\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-1024x442.png 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-300x129.png 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-768x331.png 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-1536x663.png 1536w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-2048x883.png 2048w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-696x300.png 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-1068x461.png 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-1920x828.png 1920w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-2853\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-2-1024x929.png\" alt=\"\" width=\"696\" height=\"631\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-2-1024x929.png 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-2-300x272.png 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-2-768x697.png 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-2-696x631.png 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-2-1068x969.png 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-2.png 1078w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><\/p>\n<p><strong>Associated mitigations<\/strong><\/p>\n<p>Each threat includes mitigation guidance, these often have varying efficacies and challenges with their implementations.<\/p>\n<p>Mitigation tiers are intended to help device vendors\/OEMs better understand how to assess the challenge of deploying mitigations and better strategize and prioritize efforts to add additional mitigations or technologies to address threats.<\/p>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/Assoxciated-mitigations.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2969\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/Assoxciated-mitigations.jpg\" alt=\"\" width=\"804\" height=\"445\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/Assoxciated-mitigations.jpg 804w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/Assoxciated-mitigations-300x166.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/Assoxciated-mitigations-768x425.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/Assoxciated-mitigations-696x385.jpg 696w\" sizes=\"auto, (max-width: 804px) 100vw, 804px\" \/><\/a><\/p>\n<p><strong>ISA\/IEC 62443-4-2 Mappings<\/strong><\/p>\n<p>ISA is the International Society of Automation. ISA\/IEC 62443 is the applicable standard for cybersecurity of OT and ICS (IACS).<\/p>\n<p>Each associated mitigation is mapped with the ISA\/IEC 62443-4-2.<\/p>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/ISA-IEC-62443-4-2-mappings.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2967\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/ISA-IEC-62443-4-2-mappings.jpg\" alt=\"\" width=\"822\" height=\"193\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/ISA-IEC-62443-4-2-mappings.jpg 822w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/ISA-IEC-62443-4-2-mappings-300x70.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/ISA-IEC-62443-4-2-mappings-768x180.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/ISA-IEC-62443-4-2-mappings-696x163.jpg 696w\" sizes=\"auto, (max-width: 822px) 100vw, 822px\" \/><\/a><\/p>\n<p><strong>An evolving framework for a dynamic threat landscape<\/strong><\/p>\n<p>EMB3D is intended to be a living framework, where new threats and mitigations are added and updated as new threat actors emerge and security researchers discover new categories of vulnerabilities, threats, and security defenses. EMB3D is a public, community resource where all information is openly available and the security community can submit additions and revisions.<\/p>\n<p>For more information, visit <a href=\"https:\/\/emb3d.mitre.org\">https:\/\/emb3d.mitre.org<\/a>.<\/p>\n<p><strong>About MITRE<\/strong><\/p>\n<p>MITRE\u2019s mission-driven teams are dedicated to solving problems for a safer world. Through our public-private partnerships and federally funded R&amp;D centers, we work across government and in partnership with industry to tackle challenges to the safety, stability, and well-being of our nation. Learn more at <a href=\"https:\/\/www.mitre.org\/\">mitre.org<\/a>.<\/p>\n<p>View source version on businesswire.com: <a href=\"https:\/\/www.businesswire.com\/news\/home\/20240513302654\/en\/\">https:\/\/www.businesswire.com\/news\/home\/20240513302654\/en\/<\/a><\/p>\n<p><strong>Contacts<\/strong><\/p>\n<p>Sarah Lytle, <a href=\"mailto:media@mitre.org\">media@mitre.org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Collaborative framework provides common understanding to mitigate cyber threats to critical infrastructure MCLEAN, Va. &amp; BEDFORD, Mass., May 13, 2024&#8211;(BUSINESS WIRE)&#8211;The EMB3D Threat Model is now publicly available at https:\/\/emb3d.mitre.org. The model provides a cultivated knowledge base of cyber threats to embedded devices, providing a common understanding of these threats with the security mechanisms required [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2860,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[38,20,19],"tags":[],"class_list":{"0":"post-2862","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-en","8":"category-news","9":"category-united-states"},"a3_pvc":{"activated":false,"total_views":0,"today_views":0},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>MITRE Releases EMB3D\u2122 \u2013 A Cybersecurity Threat Model for Embedded Devices - Space &amp; Cybersecurity Info<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.spacesecurity.info\/en\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MITRE Releases EMB3D\u2122 \u2013 A Cybersecurity Threat Model for Embedded Devices - Space &amp; Cybersecurity Info\" \/>\n<meta property=\"og:description\" content=\"Collaborative framework provides common understanding to mitigate cyber threats to critical infrastructure MCLEAN, Va. &amp; BEDFORD, Mass., May 13, 2024&#8211;(BUSINESS WIRE)&#8211;The EMB3D Threat Model is now publicly available at https:\/\/emb3d.mitre.org. The model provides a cultivated knowledge base of cyber threats to embedded devices, providing a common understanding of these threats with the security mechanisms required [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.spacesecurity.info\/en\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"Space &amp; Cybersecurity Info\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-14T09:56:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-28T08:39:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2156\" \/>\n\t<meta property=\"og:image:height\" content=\"930\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Fran\u00e7ois Quiquet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fran\u00e7ois Quiquet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\\\/\"},\"author\":{\"name\":\"Fran\u00e7ois Quiquet\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/person\\\/5e36ba49bf1d87a387c9ab60c233013c\"},\"headline\":\"MITRE Releases EMB3D\u2122 \u2013 A Cybersecurity Threat Model for Embedded Devices\",\"datePublished\":\"2024-05-14T09:56:14+00:00\",\"dateModified\":\"2024-10-28T08:39:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\\\/\"},\"wordCount\":633,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/workflow-summary.png\",\"articleSection\":[\"Cyber\",\"News\",\"United-States\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\\\/\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\\\/\",\"name\":\"MITRE Releases EMB3D\u2122 \u2013 A Cybersecurity Threat Model for Embedded Devices - Space &amp; Cybersecurity Info\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/workflow-summary.png\",\"datePublished\":\"2024-05-14T09:56:14+00:00\",\"dateModified\":\"2024-10-28T08:39:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/workflow-summary.png\",\"contentUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/workflow-summary.png\",\"width\":2156,\"height\":930},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"MITRE Releases EMB3D\u2122 \u2013 A Cybersecurity Threat Model for Embedded Devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\",\"name\":\"Space Cybersecurity Info\",\"description\":\"La cybers\u00e9curit\u00e9 appliqu\u00e9e au domaine de l&#039;espace\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\",\"name\":\"Space Security Info\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/SSI-Logo-4.jpg\",\"contentUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/SSI-Logo-4.jpg\",\"width\":594,\"height\":144,\"caption\":\"Space Security Info\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/person\\\/5e36ba49bf1d87a387c9ab60c233013c\",\"name\":\"Fran\u00e7ois Quiquet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"caption\":\"Fran\u00e7ois Quiquet\"},\"description\":\"(EN) I'm a cybersecurity engineer in network, telecommunication and embedded\\\/integrated systems. Founder of the website spacesecurity.info. Passionate about cybersecurity and space, I share my two passions through this site. My goal is to federate a community around these two themes. Join my LinkedIn Group. (FR) Je suis ing\u00e9nieur cybers\u00e9curit\u00e9 en r\u00e9seau, t\u00e9l\u00e9communication et syst\u00e8mes embarqu\u00e9s et int\u00e9gr\u00e9s. Fondateur du site spacesecurity.info. Passionn\u00e9 de cybers\u00e9curit\u00e9 et du monde de l'espace, j'ai souhait\u00e9 partager mes deux passions \u00e0 travers ce site. Mon objectif est de f\u00e9d\u00e9rer une communaut\u00e9 autour de ces deux th\u00e8mes. Rejoindre mon groupe LinkedIn.\",\"sameAs\":[\"https:\\\/\\\/www.spacesecurity.info\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/francoisquiquet\\\/\"],\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/author\\\/francois\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MITRE Releases EMB3D\u2122 \u2013 A Cybersecurity Threat Model for Embedded Devices - Space &amp; Cybersecurity Info","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.spacesecurity.info\/en\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\/","og_locale":"en_US","og_type":"article","og_title":"MITRE Releases EMB3D\u2122 \u2013 A Cybersecurity Threat Model for Embedded Devices - Space &amp; Cybersecurity Info","og_description":"Collaborative framework provides common understanding to mitigate cyber threats to critical infrastructure MCLEAN, Va. &amp; BEDFORD, Mass., May 13, 2024&#8211;(BUSINESS WIRE)&#8211;The EMB3D Threat Model is now publicly available at https:\/\/emb3d.mitre.org. The model provides a cultivated knowledge base of cyber threats to embedded devices, providing a common understanding of these threats with the security mechanisms required [&hellip;]","og_url":"https:\/\/www.spacesecurity.info\/en\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\/","og_site_name":"Space &amp; Cybersecurity Info","article_published_time":"2024-05-14T09:56:14+00:00","article_modified_time":"2024-10-28T08:39:39+00:00","og_image":[{"width":2156,"height":930,"url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary.png","type":"image\/png"}],"author":"Fran\u00e7ois Quiquet","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fran\u00e7ois Quiquet","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.spacesecurity.info\/en\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\/#article","isPartOf":{"@id":"https:\/\/www.spacesecurity.info\/en\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\/"},"author":{"name":"Fran\u00e7ois Quiquet","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/person\/5e36ba49bf1d87a387c9ab60c233013c"},"headline":"MITRE Releases EMB3D\u2122 \u2013 A Cybersecurity Threat Model for Embedded Devices","datePublished":"2024-05-14T09:56:14+00:00","dateModified":"2024-10-28T08:39:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.spacesecurity.info\/en\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\/"},"wordCount":633,"commentCount":0,"publisher":{"@id":"https:\/\/www.spacesecurity.info\/en\/#organization"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary.png","articleSection":["Cyber","News","United-States"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.spacesecurity.info\/en\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.spacesecurity.info\/en\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\/","url":"https:\/\/www.spacesecurity.info\/en\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\/","name":"MITRE Releases EMB3D\u2122 \u2013 A Cybersecurity Threat Model for Embedded Devices - Space &amp; Cybersecurity Info","isPartOf":{"@id":"https:\/\/www.spacesecurity.info\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.spacesecurity.info\/en\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\/#primaryimage"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary.png","datePublished":"2024-05-14T09:56:14+00:00","dateModified":"2024-10-28T08:39:39+00:00","breadcrumb":{"@id":"https:\/\/www.spacesecurity.info\/en\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.spacesecurity.info\/en\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spacesecurity.info\/en\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\/#primaryimage","url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary.png","contentUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary.png","width":2156,"height":930},{"@type":"BreadcrumbList","@id":"https:\/\/www.spacesecurity.info\/en\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.spacesecurity.info\/en\/"},{"@type":"ListItem","position":2,"name":"MITRE Releases EMB3D\u2122 \u2013 A Cybersecurity Threat Model for Embedded Devices"}]},{"@type":"WebSite","@id":"https:\/\/www.spacesecurity.info\/en\/#website","url":"https:\/\/www.spacesecurity.info\/en\/","name":"Space Cybersecurity Info","description":"La cybers\u00e9curit\u00e9 appliqu\u00e9e au domaine de l&#039;espace","publisher":{"@id":"https:\/\/www.spacesecurity.info\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.spacesecurity.info\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.spacesecurity.info\/en\/#organization","name":"Space Security Info","url":"https:\/\/www.spacesecurity.info\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/SSI-Logo-4.jpg","contentUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/SSI-Logo-4.jpg","width":594,"height":144,"caption":"Space Security Info"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/person\/5e36ba49bf1d87a387c9ab60c233013c","name":"Fran\u00e7ois Quiquet","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","caption":"Fran\u00e7ois Quiquet"},"description":"(EN) I'm a cybersecurity engineer in network, telecommunication and embedded\/integrated systems. Founder of the website spacesecurity.info. Passionate about cybersecurity and space, I share my two passions through this site. My goal is to federate a community around these two themes. Join my LinkedIn Group. (FR) Je suis ing\u00e9nieur cybers\u00e9curit\u00e9 en r\u00e9seau, t\u00e9l\u00e9communication et syst\u00e8mes embarqu\u00e9s et int\u00e9gr\u00e9s. Fondateur du site spacesecurity.info. Passionn\u00e9 de cybers\u00e9curit\u00e9 et du monde de l'espace, j'ai souhait\u00e9 partager mes deux passions \u00e0 travers ce site. Mon objectif est de f\u00e9d\u00e9rer une communaut\u00e9 autour de ces deux th\u00e8mes. Rejoindre mon groupe LinkedIn.","sameAs":["https:\/\/www.spacesecurity.info","https:\/\/www.linkedin.com\/in\/francoisquiquet\/"],"url":"https:\/\/www.spacesecurity.info\/en\/author\/francois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/2862","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/comments?post=2862"}],"version-history":[{"count":2,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/2862\/revisions"}],"predecessor-version":[{"id":2974,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/2862\/revisions\/2974"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/media\/2860"}],"wp:attachment":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/media?parent=2862"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/categories?post=2862"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/tags?post=2862"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}