Skip To Main Content
Intel logo - Return to the home page
My Tools

Select Your Language

  • Bahasa Indonesia
  • Deutsch
  • English
  • Español
  • Français
  • Português
  • Tiếng Việt
  • ไทย
  • 한국어
  • 日本語
  • 简体中文
  • 繁體中文
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Emerald Rapids
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.
  1. Intel Secure Development Practices

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox

 

 

 

 

 

Secure Development Practices

Robust Security Practices

While you may see Intel primarily as a technology provider, we’re also a process leader that develops and role models leading practices. Security is no exception. 

Our product and process breadth puts us at the forefront of secure development practices. This discipline guides how we design, develop, test, and support products customers can trust. 

Requirement Definition

No single solution exists for component-level security. Each product requires security aligned to its features, uses, and risk. Security requirements are typically defined early in design, helping ensure they match a product’s features as well as functional, user, and legal requirements and standards, among other factors. Since these factors change, security requirements must also adapt over the entire lifecycle.

Learn more

Threat Modeling

Evaluating our products to determine potential security threats based on adversary models. This helps create a plan to address threats. Intel products go through a rigorous threat modeling process, starting at the very beginning stages of product planning and all the way through deployment of a product.

Learn more

Architecture Review

Experts across disciplines review each product’s architecture and carefully consider potential threats covering security aspects for microcode, hardware, firmware, software, and cryptography.

Learn more

Development Tools

Intel develops proprietary tools based on our security development needs, covering both hardware and software. We use these tools to guide our own efforts and to help ensure that open source software meets the highest security standards. Many of our tools are state-of-the art, advancing software security; Intel not only uses them internally, but also offers them to the security community for use.

Learn more

Validation

Security verification efforts aim to ensure our products adhere to the security requirements defined at the beginning of development. Validation teams first focus on confirming the design they’re validating is functionally correct. They then strive to confirm that the systems shield sensitive information.

Learn more

Hackathons

One aspect of Intel’s security first mindset is thinking like a hacker by breaking what we build. Hackathons are a critical part of this effort. These events bring together product and security experts with the purpose of finding security vulnerabilities within the product to complement a structured security evaluation.

Learn more

Show more Show less

  

best practice guidance

  

  

Access Intel Development Insight

Intel contributes our security learnings and expertise to benefit the global community in a number of ways, including publication of guidance and best practices for developing with security in mind.

Learn more

  

More Information

Intel Security Development Lifecycle (white paper)

  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map
  • Recycling
  • Your Privacy Choices California Consumer Privacy Act (CCPA) Opt-Out Icon
  • Notice at Collection

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration and other factors. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding causing or contributing to adverse impacts on human rights. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to adverse impacts on human rights.

Intel Footer Logo