Analysing also the IaC code, reports the potential vulnerabilities and proposes potential fixes, addressing the dependency information from the IaC and application code, detect included programs and libraries with known vulnerabilities by querying public vulnerability databases, and produce a report to the PIACERE user.
Abstract interface allowing the orchestration and connectivity of virtualized functions for monitoring and mitigation actions on different types of underlying infrastructure (IoT, IaaS, baremetal, etc)
When addressing the resilience of supply chains in their complexity, a platform that provides vulnerability forecast, risk estimation and mitigation must consider the heterogeneous nature of supply chain infrastructures as an important driver of architectural design and exposing it with an architecture designed for supply chains, instead of single network.
In this wild IoT market, estimating cybersecurity risks, selecting the right standard to comply with and getting certified during the manufacturing process is an extremely complex task. Security Requirements, Security Controls and Security Assurance Activities must be considered by all the project stakeholders including business-lines and risk-owners.
On the event of the adoption of the draft regulation laying down measures for a high common level of cybersecurity at the institutions, bodies, offices and agencies of the Union, the AI4HealthSec project kicked off a process to provide its opinion.