{"id":1298,"date":"2026-03-05T13:07:54","date_gmt":"2026-03-05T13:07:54","guid":{"rendered":"https:\/\/pickplace-rtjzvn2oa4.live-website.com\/?page_id=1298"},"modified":"2026-04-22T08:18:19","modified_gmt":"2026-04-22T08:18:19","slug":"threat-and-risk-assessment","status":"publish","type":"page","link":"https:\/\/www.pickplace.de\/de\/threat-and-risk-assessment\/","title":{"rendered":"Threat and Risk Assessment"},"content":{"rendered":"<div class=\"wp-block-stackable-columns alignfull stk-block-columns stk-block stk-7e7d25a stk-block-background stk--has-background-overlay\" data-block-id=\"7e7d25a\"><style>.stk-7e7d25a {background-image:url(https:\/\/pickplace-rtjzvn2oa4.live-website.com\/wp-content\/uploads\/2026\/02\/bg-cyber-security-embedded-systems-2000.jpg) !important;min-height:400px !important;align-items:center !important;padding-top:var(--stk--preset--spacing--70, 3.38rem) !important;padding-right:var(--stk--preset--spacing--70, 3.38rem) !important;padding-bottom:var(--stk--preset--spacing--70, 3.38rem) !important;padding-left:var(--stk--preset--spacing--70, 3.38rem) !important;margin-bottom:0px !important;display:flex !important;}.stk-7e7d25a:before{background-color:#000000 !important;opacity:0.5 !important;}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-7e7d25a-column alignwide\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-5bb4270\" data-v=\"4\" data-block-id=\"5bb4270\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-5bb4270-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-5bb4270-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-ecf6e82\" id=\"heading-placeholder\" data-block-id=\"ecf6e82\"><style>.stk-ecf6e82 .stk-block-heading__text{color:#ffffff !important;}<\/style><h1 class=\"stk-block-heading__text has-text-color\">Threat and Risk Assessment<\/h1><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-11a016a\" data-block-id=\"11a016a\"><style>.stk-11a016a .stk-block-text__text{color:#ffffff !important;}<\/style><p class=\"stk-block-text__text has-text-color\">Von der Schwachstelle zum Sicherheitskonzept. PICKPLACE unterst&#xFC;tzt Hersteller elektronischer Systeme bei der Identifikation, Bewertung und Dokumentation technischer Bedrohungen. Wir verbinden Security Engineering mit tiefem Hardware- und Software-Verst&#xE4;ndnis. F&#xFC;r Produkte, die langfristig sicher und resilient bleiben.<\/p><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-4445b9e\" data-block-id=\"4445b9e\"><style>.stk-4445b9e {height:150px !important;}<\/style><\/div>\n\n\n\n<div class=\"wp-block-stackable-columns stk-block-columns stk-block stk-2ef8d74\" data-block-id=\"2ef8d74\"><style>.stk-2ef8d74 .stk--block-align-2ef8d74{align-items:center !important;}.stk-2ef8d74 {margin-bottom:0px !important;}.stk-2ef8d74-column{--stk-column-gap:70px !important;row-gap:50px !important;}<\/style><div class=\"stk-row stk-inner-blocks stk--block-align-2ef8d74 stk-block-content stk-content-align stk-2ef8d74-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-b3ddcb3\" data-v=\"4\" data-block-id=\"b3ddcb3\"><style>.stk-b3ddcb3-container{margin-top:0px !important;margin-right:0px !important;margin-bottom:0px !important;margin-left:0px !important;}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-b3ddcb3-container stk--no-background stk--no-padding\"><div class=\"has-text-align-center-mobile stk-block-content stk-inner-blocks stk-b3ddcb3-inner-blocks\">\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-2fbd800 stk-block-background stk--has-background-overlay\" data-block-id=\"2fbd800\"><style>.stk-2fbd800 {height:400px !important;background-image:url(https:\/\/pickplace-rtjzvn2oa4.live-website.com\/wp-content\/uploads\/2026\/03\/technology-background-texture-cyber-800.jpg) !important;border-top-left-radius:var(--stk--preset--border-radius--xx-large, 32px) !important;border-top-right-radius:var(--stk--preset--border-radius--xx-large, 32px) !important;border-bottom-right-radius:var(--stk--preset--border-radius--xx-large, 32px) !important;border-bottom-left-radius:var(--stk--preset--border-radius--xx-large, 32px) !important;overflow:hidden !important;}<\/style><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-425a78d\" data-v=\"4\" data-block-id=\"425a78d\"><style>.stk-425a78d-container{margin-top:0px !important;margin-right:0px !important;margin-bottom:0px !important;margin-left:0px !important;}@media screen and (max-width:999px){.stk-425a78d-container{padding-left:0px !important;}}@media screen and (max-width:689px){.stk-425a78d-container{padding-left:0px !important;}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-425a78d-container stk--no-background stk--no-padding\"><div class=\"has-text-align-center-mobile stk-block-content stk-inner-blocks stk-425a78d-inner-blocks\">\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-77d462d\" data-block-id=\"77d462d\"><style>.stk-77d462d {margin-bottom:16px !important;}.stk-77d462d .stk-block-text__text{color:var(--theme-palette-color-4, #000000) !important;font-weight:600 !important;text-transform:uppercase !important;}<\/style><p class=\"stk-block-text__text has-text-color has-palette-color-4-color\"><strong>Cyber resilience act<\/strong><\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-cab0231\" id=\"risiken-und-bedrohungen-analysieren\" data-block-id=\"cab0231\"><style>.stk-cab0231 {margin-bottom:8px !important;}.stk-cab0231 .stk-block-heading__text{line-height:1.5em !important;font-weight:800 !important;}@media screen and (max-width:999px){.stk-cab0231 .stk-block-heading__text{font-size:30px !important;}}@media screen and (max-width:689px){.stk-cab0231 .stk-block-heading__text{font-size:25px !important;}}<\/style><h2 class=\"stk-block-heading__text\">Risiken und Bedrohungen analysieren <\/h2><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-15dcdba\" data-block-id=\"15dcdba\"><style>.stk-15dcdba {margin-bottom:8px !important;}@media screen and (max-width:689px){.stk-15dcdba {margin-bottom:35px !important;}}<\/style><p class=\"stk-block-text__text\">Eine detaillierte Risiko- und Bedrohungsanalyse mit der TARA ist die Grundvoraussetzung f&#xFC;r die CE-Konformit&#xE4;tserkl&#xE4;rung nach dem neuen Cyber Resilience Act. <\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-fd579bd\" data-block-id=\"fd579bd\"><p class=\"stk-block-text__text\">Wir f&#xFC;hren als unabh&#xE4;ngiger Entwicklungspartner Threat And Risk Assessments f&#xFC;r Produkte mit Embedded Systems durch.<\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-icon-list stk-block-icon-list has-text-color stk-block stk-7be197c\" data-block-id=\"7be197c\"><style>.stk-7be197c {--stk-icon-list-column-count:1 !important;--stk-icon-list-row-gap:12px !important;}.stk-7be197c ul li, .stk-7be197c ol li, .stk-7be197c ul li span, .stk-7be197c ol li span{color:var(--theme-palette-color-8, #0F7173) !important;}<\/style><svg style=\"display:none\"><defs><g id=\"stk-icon-list__icon-svg-def-7be197c\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M470.6 278.6c12.5-12.5 12.5-32.8 0-45.3l-160-160c-12.5-12.5-32.8-12.5-45.3 0s-12.5 32.8 0 45.3L402.7 256 265.4 393.4c-12.5 12.5-12.5 32.8 0 45.3s32.8 12.5 45.3 0l160-160zm-352 160l160-160c12.5-12.5 12.5-32.8 0-45.3l-160-160c-12.5-12.5-32.8-12.5-45.3 0s-12.5 32.8 0 45.3L210.7 256 73.4 393.4c-12.5 12.5-12.5 32.8 0 45.3s32.8 12.5 45.3 0z\"><\/path><\/svg><\/g><\/defs><\/svg><ul class=\"stk-block-icon-list__ul stk-block-icon-list--column\">\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-927169d\" data-block-id=\"927169d\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-7be197c\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Threat Modeling<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-2f5ce49\" data-block-id=\"2f5ce49\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-7be197c\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Physical Security Assessment<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-8a64382\" data-block-id=\"8a64382\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-7be197c\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Impact Analysis<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-8fa990d\" data-block-id=\"8fa990d\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-7be197c\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Security Level Assessment<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-ea0fa3a\" data-block-id=\"ea0fa3a\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-7be197c\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Software Architecture<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-8b2faba\" data-block-id=\"8b2faba\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-7be197c\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Hardware Architecture<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-0ef47a5\" data-block-id=\"0ef47a5\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-7be197c\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Software Bill of Materials (SBoM)<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-696c6cb\" data-block-id=\"696c6cb\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-7be197c\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">CVE \/ CWE<\/span><\/div><\/li>\n<\/ul><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-a0ab727\" data-block-id=\"a0ab727\"><style>.stk-a0ab727 {height:150px !important;}<\/style><\/div>\n\n\n\n<div class=\"wp-block-stackable-columns alignfull stk-block-columns stk-block stk-727ed35 stk-block-background stk--has-background-overlay\" data-block-id=\"727ed35\"><style>.stk-727ed35 .stk--block-align-727ed35{align-items:center !important;}.stk-727ed35 {background-image:url(https:\/\/pickplace-rtjzvn2oa4.live-website.com\/wp-content\/uploads\/2026\/02\/platine-pcb-design-stecker-emv-bg-1200-rotated.jpg) !important;min-height:400px !important;align-items:center !important;padding-top:var(--stk--preset--spacing--70, 3.38rem) !important;padding-right:var(--stk--preset--spacing--70, 3.38rem) !important;padding-bottom:var(--stk--preset--spacing--70, 3.38rem) !important;padding-left:var(--stk--preset--spacing--70, 3.38rem) !important;margin-bottom:0px !important;display:flex !important;}.stk-727ed35:before{background-color:#000000 !important;opacity:0.5 !important;}<\/style><div class=\"stk-row stk-inner-blocks stk--block-align-727ed35 stk-block-content stk-content-align stk-727ed35-column alignwide\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-ad09fbb\" data-v=\"4\" data-block-id=\"ad09fbb\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-ad09fbb-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-ad09fbb-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-3bbd84d\" id=\"heading-placeholder\" data-block-id=\"3bbd84d\"><style>.stk-3bbd84d .stk-block-heading__text{color:#ffffff !important;}<\/style><h2 class=\"stk-block-heading__text has-text-color\">Bedrohungen systemisch analysieren und CRA-konform dokumentieren<\/h2><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-657fac7\" data-block-id=\"657fac7\"><style>.stk-657fac7 {margin-bottom:11px !important;}.stk-657fac7 .stk-block-text__text{color:#ffffff !important;}<\/style><p class=\"stk-block-text__text has-text-color\">Ab 2026 m&#xFC;ssen Hersteller nachweisen, dass ihre vernetzten Embedded Systeme den neuen EU-Sicherheitsvorgaben entsprechen. Ab 2027 sind nur noch konforme Produkte in der EU zul&#xE4;ssig.<\/p><\/div>\n\n\n\n<p><\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-349fd2d\" data-v=\"4\" data-block-id=\"349fd2d\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-349fd2d-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-349fd2d-inner-blocks\">\n<div class=\"wp-block-stackable-icon-list stk-block-icon-list has-text-color stk-block stk-5483e81\" data-block-id=\"5483e81\"><style>.stk-5483e81 {--stk-icon-list-column-count:1 !important;--stk-icon-list-marker-color:var(--theme-palette-color-6, #f9fafb) !important;}.stk-5483e81 ul li, .stk-5483e81 ol li, .stk-5483e81 ul li span, .stk-5483e81 ol li span{color:var(--theme-palette-color-6, #f9fafb) !important;font-weight:bold !important;}<\/style><svg style=\"display:none\"><defs><g id=\"stk-icon-list__icon-svg-def-5483e81\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 190 190\"><polygon points=\"173.8,28.4 60.4,141.8 15.7,97.2 5.1,107.8 60.4,163 184.4,39 173.8,28.4\"><\/polygon><\/svg><\/g><\/defs><\/svg><ul class=\"stk-block-icon-list__ul stk-block-icon-list--column\">\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-5124f04\" data-block-id=\"5124f04\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-5483e81\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">TARA-Analysen sind die Basis f&#xFC;r Security-Konzepte<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-247801f\" data-block-id=\"247801f\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-5483e81\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Mit TARA-Analysen k&#xF6;nnen Physical Security Assessments strukturiert werden<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-6f065b3\" data-block-id=\"6f065b3\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-5483e81\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">TARA bietet einen objektiven Bewertungsrahmen f&#xFC;r Schwachstellen<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-2150e83\" data-block-id=\"2150e83\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-5483e81\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Threats werden systematisch in Kategorien unterteilt, damit Handlungsfelder offen erkannt werden<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-e9bef06\" data-block-id=\"e9bef06\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-5483e81\"><\/use><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Threat and Risk Assessments sind Grundlagen f&#xFC;r interne Entscheidungsprozesse zu Security Hardening<\/span><\/div><\/li>\n<\/ul><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-cf811e1\" data-v=\"4\" data-block-id=\"cf811e1\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-cf811e1-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-cf811e1-inner-blocks\">\n<div class=\"wp-block-stackable-image stk-block-image stk-block stk-a0738ec\" data-block-id=\"a0738ec\"><figure><span class=\"stk-img-wrapper stk-image--shape-stretch\"><img loading=\"lazy\" decoding=\"async\" class=\"stk-img wp-image-1310\" src=\"https:\/\/pickplace-rtjzvn2oa4.live-website.com\/wp-content\/uploads\/2026\/03\/tara-cal-prozess.webp\" width=\"2000\" height=\"1298\" alt=\"Diagramm zu Threat and Risk Assessment bei embedded elektronik\"\/><\/span><\/figure><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-efc8aff\" data-block-id=\"efc8aff\"><style>.stk-efc8aff {height:150px !important;}<\/style><\/div>\n\n\n\n<div class=\"wp-block-stackable-columns alignfull stk-block-columns stk-block stk-567ba89\" data-block-id=\"567ba89\"><style>.stk-567ba89 {margin-top:var(--stk--preset--spacing--70, 3.38rem) !important;margin-bottom:var(--stk--preset--spacing--70, 3.38rem) !important;}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-567ba89-column alignwide\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-62b83b6\" data-v=\"4\" data-block-id=\"62b83b6\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-62b83b6-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-62b83b6-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-89d7948\" id=\"heading-placeholder\" data-block-id=\"89d7948\"><h2 class=\"stk-block-heading__text has-text-align-center\">TARA als Grundlage f&#xFC;r Embedded Cyber Security<\/h2><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-4d761ed\" data-block-id=\"4d761ed\"><p class=\"stk-block-text__text has-text-align-center\">Cyber Security wird bei vielen Embedded-Systemen zu einem zentralen Bestandteil der Produktentwicklung. Kommunikationsschnittstellen, Update-Mechanismen, externe Peripherie oder Cloud-Anbindungen schaffen zus&#xE4;tzliche Angriffsfl&#xE4;chen, die bereits in der Architektur eines Ger&#xE4;ts ber&#xFC;cksichtigt werden m&#xFC;ssen. PICKPLACE unterst&#xFC;tzt Hersteller dabei, Cybersecurity strukturiert in die Elektronik- und Softwareentwicklung zu integrieren. Ausgangspunkt ist in der Regel ein Threat and Risk Assessment, in dem m&#xF6;gliche Angriffsszenarien systematisch identifiziert und bewertet werden. Diese Analyse bildet die Grundlage daf&#xFC;r, welche technischen Cybersecurity-Ma&#xDF;nahmen in Hardware, Firmware und Systemarchitektur erforderlich sind und wie sie konkret umgesetzt werden.<\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-columns stk-block-columns stk-block stk-c8fac2b\" data-block-id=\"c8fac2b\"><style>.stk-c8fac2b-column{flex-wrap:wrap !important;--stk-flex-grow:0 !important;}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-c8fac2b-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-07821a9\" data-v=\"4\" data-block-id=\"07821a9\"><style>@media screen and (min-width:690px){.stk-07821a9 {flex:var(--stk-flex-grow, 1) 1 calc(33.33% - var(--stk-column-gap, 0px) * 2 \/ 3 ) !important;}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-07821a9-container stk-hover-parent\"><div class=\"stk-block-content stk-inner-blocks stk-07821a9-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-155ef08\" id=\"c-title-1-placeholder\" data-block-id=\"155ef08\"><h3 class=\"stk-block-heading__text\">Schwachstellen-Analyse<\/h3><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-2683e94\" data-block-id=\"2683e94\"><p class=\"stk-block-text__text\">Identifikation und Bewertung potenzieller Sicherheitsl&#xFC;cken in Software und Hardware.<\/p><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-1e7961a\" data-v=\"4\" data-block-id=\"1e7961a\"><style>@media screen and (min-width:690px){.stk-1e7961a {flex:var(--stk-flex-grow, 1) 1 calc(33.33% - var(--stk-column-gap, 0px) * 2 \/ 3 ) !important;}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-1e7961a-container stk-hover-parent\"><div class=\"stk-block-content stk-inner-blocks stk-1e7961a-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-6978bd8\" id=\"c-title-2-placeholder\" data-block-id=\"6978bd8\"><h3 class=\"stk-block-heading__text\">Threat and Risk Assessment<\/h3><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-595a828\" data-block-id=\"595a828\"><p class=\"stk-block-text__text\">Systematische Analyse m&#xF6;glicher Bedrohungsszenarien und Risikobewertungen, um gezielte Gegenma&#xDF;nahmen zu entwickeln.<\/p><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-e123e68\" data-v=\"4\" data-block-id=\"e123e68\"><style>@media screen and (min-width:690px){.stk-e123e68 {flex:var(--stk-flex-grow, 1) 1 calc(33.33% - var(--stk-column-gap, 0px) * 2 \/ 3 ) !important;}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-e123e68-container stk-hover-parent\"><div class=\"stk-block-content stk-inner-blocks stk-e123e68-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-fd81545\" id=\"c-title-3-placeholder\" data-block-id=\"fd81545\"><h3 class=\"stk-block-heading__text\">Authentifizierung und Autorisierung<\/h3><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-a5bf9ea\" data-block-id=\"a5bf9ea\"><p class=\"stk-block-text__text\">Verifizierung aller Zugriffe, um sicherzustellen, dass nur berechtigte Nutzer oder Systeme Zugriff haben.<\/p><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-289c04c\" data-v=\"4\" data-block-id=\"289c04c\"><style>@media screen and (min-width:690px){.stk-289c04c {flex:var(--stk-flex-grow, 1) 1 calc(33.33% - var(--stk-column-gap, 0px) * 2 \/ 3 ) !important;}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-289c04c-container stk-hover-parent\"><div class=\"stk-block-content stk-inner-blocks stk-289c04c-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-819d592\" id=\"c-title-4-placeholder\" data-block-id=\"819d592\"><h3 class=\"stk-block-heading__text\">Sichere Updates<\/h3><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-b300764\" data-block-id=\"b300764\"><p class=\"stk-block-text__text\">Sicherstellung, dass nur autorisierte und &#xFC;berpr&#xFC;fte Software-Updates auf die Ger&#xE4;te gelangen.<\/p><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-40cc93a\" data-v=\"4\" data-block-id=\"40cc93a\"><style>@media screen and (min-width:690px){.stk-40cc93a {flex:var(--stk-flex-grow, 1) 1 calc(33.33% - var(--stk-column-gap, 0px) * 2 \/ 3 ) !important;}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-40cc93a-container stk-hover-parent\"><div class=\"stk-block-content stk-inner-blocks stk-40cc93a-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-97d2fbf\" id=\"c-title-5-placeholder\" data-block-id=\"97d2fbf\"><h3 class=\"stk-block-heading__text\">Verschl&#xFC;sselte Kommunikation<\/h3><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-e62784c\" data-block-id=\"e62784c\"><p class=\"stk-block-text__text\">Schutz der Daten&#xFC;bertragung durch bew&#xE4;hrte Verschl&#xFC;sselungsverfahren.<\/p><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-61ce331\" data-v=\"4\" data-block-id=\"61ce331\"><style>@media screen and (min-width:690px){.stk-61ce331 {flex:var(--stk-flex-grow, 1) 1 calc(33.33% - var(--stk-column-gap, 0px) * 2 \/ 3 ) !important;}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-61ce331-container stk-hover-parent\"><div class=\"stk-block-content stk-inner-blocks stk-61ce331-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-634d059\" id=\"c-title-6-placeholder\" data-block-id=\"634d059\"><h3 class=\"stk-block-heading__text\">Schl&#xFC;ssel-Management<\/h3><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-1fb8548\" data-block-id=\"1fb8548\"><p class=\"stk-block-text__text\">Sicheres Management kryptografischer Schl&#xFC;ssel und Geheimnissen &#xFC;ber den gesamten Lebenszyklus eines Produkts.<\/p><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-bb06dbf\" data-block-id=\"bb06dbf\"><style>.stk-bb06dbf {height:150px !important;}<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Threat and Risk Assessment Von der Schwachstelle zum Sicherheitskonzept. PICKPLACE unterst\u00fctzt Hersteller elektronischer Systeme bei der Identifikation, Bewertung und Dokumentation technischer Bedrohungen. Wir verbinden Security Engineering mit tiefem Hardware- und Software-Verst\u00e4ndnis. F\u00fcr Produkte, die langfristig sicher und resilient bleiben. Cyber resilience act Risiken und Bedrohungen analysieren Eine detaillierte Risiko- und Bedrohungsanalyse mit der TARA ist [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1298","page","type-page","status-publish","hentry"],"blocksy_meta":{"has_hero_section":"disabled","styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":6}},"_links":{"self":[{"href":"https:\/\/www.pickplace.de\/de\/wp-json\/wp\/v2\/pages\/1298","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pickplace.de\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.pickplace.de\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.pickplace.de\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pickplace.de\/de\/wp-json\/wp\/v2\/comments?post=1298"}],"version-history":[{"count":5,"href":"https:\/\/www.pickplace.de\/de\/wp-json\/wp\/v2\/pages\/1298\/revisions"}],"predecessor-version":[{"id":1859,"href":"https:\/\/www.pickplace.de\/de\/wp-json\/wp\/v2\/pages\/1298\/revisions\/1859"}],"wp:attachment":[{"href":"https:\/\/www.pickplace.de\/de\/wp-json\/wp\/v2\/media?parent=1298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}