Microchip gets IEC 62443‑4‑1 ML2 cybersecurity certification | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware


The certification confirms that Microchip’s product development processes meet internationally recognised “secure by design” requirements, as cybersecurity assurance becomes an increasingly critical expectation for connected systems used across residential, commercial and industrial settings.

IEC 62443‑4‑1 sets out requirements for a secure development lifecycle, including threat modelling, secure design practices, controlled implementation, verification and validation, and long‑term vulnerability and patch management. UL Solutions’ assessment verifies that Microchip integrates security across both hardware and software development, from initial design through end of life, and that these practices are applied consistently across its global design and manufacturing operations.

According to the company, the audit‑backed certification demonstrates that its cybersecurity framework is mature and repeatable, offering customers greater confidence in the security of products developed under these processes. It is also intended to help customers streamline their own cybersecurity assessments, reduce supply chain risk and prepare for regulatory requirements, including the forthcoming EU Cyber Resilience Act.

Nuri Dagdeviren, corporate vice president of Microchip Technology’s secure computing group, said the independent validation was an important step for customers. “Achieving IEC 62443‑4‑1 ML2 certification reflects Microchip’s long‑standing commitment to rigorous security practices,” he said. “Customers need partners who can demonstrate secure development maturity, not simply claim it. This independently validated certification strengthens trust, reduces risk across the hardware–firmware stack and supports our customers as they work toward CRA and other standards‑based compliance.”

The certification applies to Microchip’s new product development process and forms part of broader efforts across the industry to embed cybersecurity throughout the lifecycle of industrial and connected technologies.

——————————————————-


Click Here For The Original Source.

National Cyber Security

FREE
VIEW