Skip To Main Content
Intel logo - Return to the home page
My Tools

Select Your Language

  • Bahasa Indonesia
  • Deutsch
  • English
  • Español
  • Français
  • Português
  • Tiếng Việt
  • ไทย
  • 한국어
  • 日本語
  • 简体中文
  • 繁體中文
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Emerald Rapids
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.
  1. Intel Advanced Security Development Practices
  2. Intel Secure Development Practices
  3. Intel Secure Development: Architecture Reviews

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox

Security Architecture Review

Aligning Architecture to Security Objectives

Reviewing architecture and designs early in product development is an important part of the Intel Security Development Lifecycle (SDL). Our security architecture review board brings together expertise from across disciplines to review each product’s architecture and carefully consider potential threats - and does so more comprehensively than any tools could.

The role of security architecture reviews is to evaluate product or technology architecture. The process helps ensure that security objectives are properly scoped and identified, and the architecture meets the defined objectives, covering: 

  • Network 
  • Unprivileged software 
  • System software 
  • Software side-channel/Covert-channel 
  • Startup code (e.g. BIOS, firmware, System Management Mode) 
  • Simple hardware 
  • Skilled hardware  
  • Hardware reverse engineer 
  • Authorized

These reviews help ensure that the problem statement is clearly defined and threat models are complete. Completing architecture reviews helps identify and mitigate risks early and results in an action plan for development teams to follow.

More Information

Intel Security Development Lifecycle

Secure Development Practices Overview

Defining Requirements

Threat Modeling

Security Development Tools

Security Validation

Hackathons

  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map
  • Recycling
  • Your Privacy Choices California Consumer Privacy Act (CCPA) Opt-Out Icon
  • Notice at Collection

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration, and other factors. Learn more at intel.com/performanceindex. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding causing or contributing to adverse impacts on human rights. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to adverse impacts on human rights.

Intel Footer Logo