banner Secure by Design

Secure by Design

Book Expert Call

Embedded Security Engineering for Connected Devices

The EU Cyber Resilience Act (CRA) and tightening customer requirements have moved security out of the release notes and into the architecture. For product teams, this is not a legal question but an engineering one across hardware and embedded software. 

Promwad helps OEMs and product companies build security inside the device.
With 21+ years of embedded engineering, we turn CRA requirements into concrete implementation from secure boot and trusted updates to device architecture and identity. 

Embedded Security
for Global OEMs

Industrial Automation & Robotics
✓ Telecom & Network Equipment
IoT Devices
✓ Automotive Systems

Why Promwad

Embedded security belongs to embedded engineers, because the closer security is implemented to the hardware and firmware levels, the more reliable it is — and the lower the risk of compromise at the software level.

21+ years in embedded
21+ years in embedded

We have been shipping firmware, device software, and hardware platforms since long before secure-by-design became a procurement clause

End-to-end engineering
100+ engineers under one roof

One team closes secure boot, OTA, provisioning, and hardware root-of-trust work in parallel — no vendor handoffs, no integration gaps between HW, FW, SW

End-to-end engineering
Standards in the engineering, not on the cover

We build aligned with ISA/IEC 62443 and ISO/SAE 21434 requirements, and we are honest about where our work ends and your assessors begin

End-to-end engineering
CRA-ready by default

Secure-by-design workflow, SBOM generation in SPDX and CycloneDX, signed OTA, and vulnerability-aware release discipline are baseline practice

Our Tech Stack

What we actually work with inside shipping products 

Hardware & Boot Integrity

  • Secure boot & hardware root of trust: chain-of-trust from boot ROM upward, on MCU and FPGA platforms
  • Anti-rollback protection: enforced at the bootloader level
  • Hardware security review: schematic and PCB review, physical inspection, component-level protection against unauthorized access
  • Tamper-resistant chips & secure storage elements: where the threat model requires hardware-level defenses
  • Platform primitives: TPM, TrustZone, and secure elements, applied against vendor SDKs and reference designs

Identity, Crypto & Updates

  • Device identity & provisioning: factory key injection, per-device certificates, mutual authentication, secure cloud onboarding
  • Cryptographic libraries: MbedTLS and OpenSSL
  • FIPS 140-2-aligned cryptographic modules: where the product requires it
  • Trusted updates: signed OTA with MCUboot, rollback protection, dual-bank failure-safe flows, controlled recovery paths

Out of scope: we do not develop proprietary cryptographic algorithms.

Software Discipline & Runtime

  • Secure coding standards: MISRA, SEI CERT C, applied in the daily workflow
  • SBOM generation: SPDX/CycloneDX as a release-pipeline step
  • Vulnerability-aware engineering: software components CVE tracking
  • Threat & vulnerability frameworks: MITRE EMB3D™ for embedded threat modeling, CWE for weakness classification, CVSS for severity scoring
  • Runtime protection: defenses implemented in firmware
  • Monitoring integration: into your chosen fleet and security platforms

Out of scope: we do not ship a proprietary monitoring product.

Standards & Regulatory Alignment

  • ISA/IEC 62443: industrial
  • ISO/SAE 21434: automotive
  • ETSI EN 303 645: consumer IoT
  • EU Cyber Resilience Act (CRA): secure-by-design practice mapped at the engineering level
  • ENISA baseline guidance: applied as product engineering input
  • Attestation: concepts understood and applied where relevant; we are open about the limits of our hands-on practice

Out of scope: we do not provide certification, formal audit, or legal advisory services.

Where It Applies

Embedded security shows up differently in every domain — in the integrity of an industrial controller, the update chain of a connected consumer device, the ECU of a vehicle, the edge of a telecom network. We work primarily where our engineering depth is strongest.

Retail

Industrial & IIoT — Primary

Controllers, gateways, and industrial edge devices where ISA/IEC 62443-aligned engineering, secure boot, and signed updates are core to asset integrity.

Retail

IoT & Connected Products — Primary

Consumer and B2B connected products where CRA readiness, device identity, and OTA hygiene decide whether a product ships — and stays shippable.

Retail

Automotive — Supporting

ECUs, gateways, and supporting control units where ISO/SAE 21434-aligned engineering complements our broader automotive hardware and software work.

Retail

Telecom & Networking Devices — Supporting

CPE, routers, and edge equipment — hardened firmware, provisioned identity, managed update flows.

Retail

Medical Devices — Selective

Device-level security engineering only, where the work is genuinely embedded.

Retail

Broadcasting & Pro AV — Selective

Included where the device-security angle is real, not as a generic fit.


The Security Hardening Path

Whether you are hardening a shipping product or building a new one secure-by-design, the path is the same shape — a short, concrete engineering engagement, not an open-ended consulting track. 

Retail

Assess

We review your architecture, firmware flows, update chain, and key handling. The deliverable is an engineering-level risk-and-gap view anchored in your product.

Retail

Design

We translate risks and requirements into concrete firmware, hardware, and update-chain decisions, co-developed with your product team.

Retail

Implement

The bulk of the engagement: secure boot, signed OTA, provisioning, anti-rollback, device identity, crypto integration — delivered as working code and verified hardware flows.

Retail

Harden

For existing products: close gaps in update flows, key handling, and device identity — without rewriting what you already ship.



Retail

Sustain

SBOM maintenance, CVE monitoring against your release, security updates and patch delivery across the CRA support period, and integration with your monitoring and fleet platforms — so security does not decay after release.

Our Case Studies

Every project below was delivered inside a real, shipping product. 

Router Cybersecurity Audit for CRA Compliance

A full-stack security audit of an OpenWRT-based router covering hardware, firmware, and compliance readiness.

Pain 

The client needed to bring their router — built on the Realtek RTL9615C platform — into compliance with the Cyber Resilience Act and a stack of overlapping standards including FIPS 140-2, GDPR, and UL 2900-1. Without a structured audit, hidden vulnerabilities and untracked dependencies posed both regulatory and product risk. 

Solution 

We ran a four-layer audit: threat analysis using the MITRE model, hardware inspection of circuits and unused platform features, firmware analysis with SBOM generation and CVE mapping, and penetration testing. Each finding was mapped to concrete mitigations across the OpenWRT/prplOS stack.

Result 

The router achieved documented compliance with CRA, FIPS 140-2, GDPR, and UL 2900-1 — with a full SBOM and remediated vulnerabilities ready for regulatory submission and customer-facing security documentation.

router case

Industrial Switch Cybersecurity Audit

A multi-layer security audit of a Microchip-based industrial switch covering hardware, firmware, and network protection.

Pain 

The client needed to validate the security posture of their industrial switch against real-world threats and meet a demanding compliance stack — GDPR, FIPS 140, and IEC 62443 — without a clear picture of existing vulnerabilities across hardware, firmware, and network layers. 

Solution 

We ran a five-layer audit: MITRE-based threat analysis, hardware inspection against CWE Most Important Hardware Weaknesses, firmware hardening with CVE elimination and SBOM creation, network protocol analysis with attack prevention measures, and full penetration testing across the Microchip VSC7448YIH-01 platform.

Result  

The switch achieved documented compliance with GDPR, FIPS 140, and IEC 62443 — with a clean SBOM, remediated CVEs, and hardened network stack ready for industrial deployment and regulatory review.

switch-case

CRA Threat Model for a Linux-Based Measuring Device

EMB3D-based threat modeling and mitigation roadmap for a networked industrial measurement device.

Pain 

A European manufacturer of professional measurement and data-acquisition equipment needed to demonstrate CRA readiness for a Linux-based device with network connectivity and local UI — but had no structured threat model or documented evidence of hardware and software security controls. 

Solution 

We applied MITRE EMB3D™ threat modeling to map device properties to threats across hardware and software layers, prioritise risks, and produce a concrete HW/SW mitigation roadmap. The analysis covered boot-chain integrity, firmware update security, cryptographic configuration, network surface hardening, and hardware Root of Trust.

Threat Modeling scheme

Result  

The manufacturer received a CRA-ready evidence package: 41 documented mitigations (36 SW, 5 HW), a prioritised action plan covering secure boot, signed updates, HW RoT, and off-device logging — ready to support regulatory submission and product security architecture decisions. 

How We Ensure Quality

If you are going to let us sign your firmware and provision your devices, you need to know how we keep that trust intact.

Retail

Secure development lifecycle

Security requirements, threat considerations, and verification live inside the engineering workflow — tracked, reviewed, and owned by the same team that ships the code.

icon

Secure coding, code review, static and dynamic analysis, dependency scanning

aligned with MISRA C / MISRA C++ and SEI CERT C standards, applied with a vulnerability-aware discipline.

Retail

SBOM and vulnerability-aware releases

SPDX and CycloneDX outputs ship with relevant releases, with CVE and CWE tracking wired against the SBOM and severity prioritized with CVSS.

Retail

End-to-end traceability

Requirements → design → test → release. Valuable when you are preparing for certification — although certification itself stays with you and your assessors.

Retail

Key and secret handling

Provisioning workflows, HSM-backed key injection where the product calls for it, and a clear rule: your keys stay yours. We do not custody production key material.

icon

Testing and external coordination

We run engineering-level security testing and verification in-house, and bring in specialized external partners for penetration testing and formal audit when the product calls for it.

Turn CRA Pressure into a Concrete Engineering Plan

In a 30-minute call with our embedded security engineers, we review your product, propose concrete security mechanisms, and scope a pilot. No commitment.

Tell us about your project

We’ll review it carefully and get back to you with the best technical approach.

All information you share stays private and secure — NDA available upon request.

Prefer direct email?
Write to info@promwad.com

Secured call with our expert in 24h

FAQ

What does Promwad actually implement in embedded security?

 

Concrete engineering work inside your product: secure boot and hardware root of trust, signed OTA with MCUboot, anti-rollback protection, device identity and factory provisioning, SBOM generation in SPDX and CycloneDX with CVE and CWE tracking, secure requirements and design with hardware and software threat models, and remediation support for existing products. We integrate proven third-party cryptographic libraries such as MbedTLS and OpenSSL, work with modules aligned with FIPS 140-2 where required, use secure coding practices aligned with MISRA C / C++ and SEI CERT C, and connect into your chosen fleet and monitoring platforms.
 

Does Promwad provide certification or compliance services?

 

No, and we will not pretend otherwise. We build with engineering aligned with ISA/IEC 62443 and ISO/SAE 21434 requirements, and we support clients preparing for certification with the right artifacts and traceability. Formal certification stays with you and your assessors.
 

Do you do formal security audits?

 

No. We run engineering-level verification inside our development process and coordinate with your external auditors. Keeping that boundary clear is part of how we protect your program.
 

Can you help us prepare for the EU Cyber Resilience Act?

 

Yes, at the product engineering level. Secure-by-design architecture, signed OTA, SBOM in SPDX or CycloneDX, CVE and CWE tracking, and vulnerability-aware release discipline map directly to CRA expectations, and align with ENISA baseline guidance and ETSI EN 303 645 for consumer IoT. We deliver the engineering substance, while your legal and regulatory teams handle the formal positioning.
 

Which MCU and SoC platforms do you work with for secure boot and root of trust?

 

We work across major embedded platforms, including NXP, STMicroelectronics, Nordic, Renesas, Microchip, and TI, as well as Xilinx / AMD FPGAs. We match the platform to the product, not the other way around.
 

Do you work with existing products or only new designs?

 

Both. For new products, we build secure-by-design from architecture forward. For existing products, we harden what is already shipping, closing gaps in update flows, device identity, and key handling without rewriting your stack.
 

How do you handle keys and cryptographic material during development and provisioning?

 

With customer-side control as the default. We design provisioning flows, integrate HSM-backed key injection where the product calls for it, and keep your root material under your ownership. We do not custody production keys.
 

What does a typical engagement look like?

 

A scoped pilot is the most common starting point, a concrete piece of security work, for example, secure boot plus signed OTA on one target platform, delivered in a fixed window by a clearly defined engineering team. From there, engagements typically expand across the product line.