Skip To Main Content
Intel logo - Return to the home page
My Tools

Select Your Language

  • Bahasa Indonesia
  • Deutsch
  • English
  • Español
  • Français
  • Português
  • Tiếng Việt
  • ไทย
  • 한국어
  • 日本語
  • 简体中文
  • 繁體中文
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Emerald Rapids
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.
  1. Intel Advanced Security Development Practices
  2. Intel Security Research Expertise and Practices
  3. Intel Security Culture & Capabilities Research

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox

 

 

 

 

 

 

 

 

Culture and Capabilities Research

Driving a Security-Focused Mindset

Central to research efforts is raising the security acumen and practices of our employees to encourage every architect, developer, designer, and validator to think like a hacker and break what they build, through:

Immersive Mentoring

Company-wide mentoring aims to grow security leaders across disciplines and businesses. These efforts focus on training engineers in how to approach and solve security challenges and how to best balance requirements to make optimal security decisions for our products.

Security Belt Program

This multi-level training program follows industry best-practices, creating a formalized process for our employees to develop and demonstrate technical expertise across hardware and software security. 

Initial belt levels focus on web-based courses, manager/mentor discussions, and participation in activities designed not only to acquire knowledge but to apply it directly to product development. These include White (awareness), Yellow (learner), and Green (practitioner) belts. 

Advanced belt levels require demonstration of significant security acumen through activities such as presenting, mentoring, publishing, and innovating/enhancing product security. The levels progress from Blue (expert) to Brown (leader), culminating in the Black Belt (visionary) certification recognizing the highest levels of leadership within Intel and externally.

Purple Teaming

Specific security hackathons involving Red teams (ethical hackers looking for product vulnerabilities) working alongside Blue teams (the architect and developers who have built the products defending against potential attacks).
 

Security Tools

We invest in hardware automated security verification tooling for more effective testing.  Hardware security is a complex, relatively new discipline; as such, well-established security assurance automation solutions aren’t available and design methodologies have not been standardized across the industry.

Intel is pioneering automation and tooling for hardware security, including new security assurance methods. One example: we collaborated with MITRE in the implementation of the first-ever, industry-wide taxonomy standard called Hardware Common Weakness Enumeration (CWE).
 

Comprehensive Training

Our security training program is designed to strengthen the knowledge and skills needed for employees to appropriately apply security every day in their roles, to facilitate security being part of every engineer's DNA, and to provide a strong career path for those interested in security.  To do so, the training program incorporates structured pathways covering SDL practices, tools/processes, role specific technical security knowledge, and skills along with mentoring and hands-on experiences.
 

Security Development Lifecycle (SDL) Enhancements

SDL is always evolving to recognize the changing technology and threat landscape as well as best practices. It also evolves with the security experts at Intel as we adapt the requirements to different products and methodologies.

More Information

Security Research Overview

Defensive Security Research

Offensive Security Research

Security Practices Overview

  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map
  • Recycling
  • Your Privacy Choices California Consumer Privacy Act (CCPA) Opt-Out Icon
  • Notice at Collection

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration, and other factors. Learn more at intel.com/performanceindex. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding causing or contributing to adverse impacts on human rights. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to adverse impacts on human rights.

Intel Footer Logo