Secure ICS products through integrated cyber security

Industrial Security Engineering

Increasing connectivity requires secure solutions

Increasing digitalisation and connectivity make the automation industry more and more vulnerable to cyber attacks. Systems and processes can be manipulated by hackers and production stopped. Even dangerous accidents can be caused.

Are you an operator, integrator or manufacturer of industrial automation systems and would like to reduce the risk of cyber attacks on your systems and processes? Get in touch with us. By implementing and proving security measures in accordance with the specifications of IEC 62443, you minimise this risk many times over. The security experts at achelos will be happy to support you!

Security Engineering for ICS products

Benefit from our many years of experience in the development and evaluation of secure software. Our experts support you in ensuring the integrity, availability and confidentiality of your critical data and systems.

achelos provides you with professional and efficient support throughout the entire development and evaluation process of your ICS products in accordance with IEC 62443. In this way, you achieve a clear time and cost advantage right from the start and avoid additional expenses for later adaptations.

Secure ICS products through integrated cyber security in development

Secure software from the outset

Security Engineering by achelos

1. Security Requirements Engineering / TARA

Developing secure software starts with a risk assessment. Our security engineers support you in performing this risk assessment and also a threat analysis, thereby facilitating proactive specification of security requirements for your product.

For this, we organise security workshops, to identify and evaluate potential threats to the components of industrial control systems (ICS). Based on the results of the workshops, we then define security objectives and requirements for ongoing project work.

2. Security Architecture Engineering

Our security engineers accompany you throughout the entire development process. They examine security requirements, work with you to develop security architectures and are the central contacts for any product security-related issues and questions your team of developers may have. Relevant standards such as IEC 62443 are obviously observed here.

3. Embedded Security Engineering

Would you like to make the update and boot processes of your ICS components more secure? As your development partner, we support you in implementing cyber security and cryptographic functions, in particular in embedded Secure Elements (eSE) and hardware security modules (HSM). This ensures that the ICS components you produce are protected from cyber attacks and are certifiable under IEC 62443.

4. Security Testing

achelos offers individual testing services, as well as high performance testing tools for manufacturer-independent testing of your new ICS products for security and conformity with IEC 62443, as well as individual security requirements.

achelos provides support in the following areas:

  • Functional & conformity tests
  • Robustness tests of security functions
  • Code analysis
  • Vulnerability analysis
  • Penetration tests

5. Security Evaluation & Certification Support

As your competent partner, we use all the experience we have gained from collaborating with both testing centres and manufacturers on Common Criteria evaluations and other established safety standards for high-security products.

Benefit from our expertise: When performing product evaluations as per IEC 62443, achelos helps save you both time and money, as well as avoid the high costs associated with subsequent adaptations.

Your benefits

  • Secure products
    Develop and provision of secure products without vulnerabilities that are resistant to attacks and other security threats.

  • Future-proof
    Efficient integration of cyber security into your development process.

  • Risk minimisation
    Secure software development from the outset, suitable for meeting the requirements of the German Federal Office for Information Security (BSI)
    and, where applicable, also for certification.

  • Efficiency
    Avoid high costs and time spent on subsequent identification and elimination of vulnerabilities.

Dr. Michael Jahnich

Director Business Development


+49 5251 14212-378