Embedded Security Certification System
Overview
When you deliver a system to clients, they need proof it’s secure - not promises. The Embedded Security Certification System runs automated security validation across 59 checks, tests your platform against adversarial AI scenarios, and generates professional certificates mapped to OWASP ASVS 5.0 and NIST CSF 2.0 standards. Ship with evidence-based security documentation that proves your platform protects sensitive data.Step-by-Step Guide
Generate a Security Certificate (Admin Only)
- Access the certification endpoint - Navigate to your admin dashboard or call the certification API directly. Only admin users can generate security certificates.
-
Choose synchronous or async mode - For quick validation (static analysis only), use the synchronous endpoint with
skipAdversarial: true. This completes in under 10 seconds. For full certification including AI adversarial testing, queue an async job. - Review the certificate - The system returns an overall grade (A/B/C/D/F) based on six security dimensions: Authentication, Access Control, Data Protection, Infrastructure, Compliance, and Audit. Each dimension shows a 0-100 score.
- Check OWASP ASVS mappings - Every finding in your certificate maps to a specific OWASP ASVS 5.0 requirement ID. Security consultants can independently verify these mappings against the OWASP standard.
- Download the markdown report - Export a professional security report with executive summary, traffic-light indicators, and detailed findings. Share this with clients or investors.
-
Verify calibration status - Check the
calibrationStatusfield. If markedFAILED, the certificate requires human review because a known-insecure configuration incorrectly passed validation.
Monitor Async Certification Progress
- Submit the certification job - Call the async endpoint. You receive a 202 status with a job ID immediately.
- Poll for progress - Check the job status endpoint. The API returns progress percentage (0-100) and phase information (Static Analysis, Red Team, Blue Team, Auditor).
-
Retrieve the completed certificate - When status shows
COMPLETED, fetch both the JSON certificate and markdown report. The certificate includes an audit trail with ISO 8601 timestamps for each phase. - Handle failures - If the job fails, the status endpoint shows the failure reason and attempt count. Common failures include timeout, dependency errors, or calibration canary violations.
Common Questions
Q: Why does my certificate show a CALIBRATION_FAILED status?A: The system runs 10 calibration canaries with known security flaws. If any canary incorrectly passes (scores 60 or above), the certificate is flagged. This prevents the system from rubber-stamping insecure configurations. Contact support for human review. Q: What’s the difference between synchronous and async certification?
A: Synchronous certification runs static analysis only and completes in under 60 seconds. Async certification includes adversarial AI evaluation with three independent personas (Red Team, Blue Team, Auditor), which takes longer but provides comprehensive validation. Q: How does adversarial AI evaluation prevent bias?
A: Three AI personas evaluate your security independently. The Red Team attacks from an adversary’s perspective. The Blue Team defends. The Auditor resolves disagreements. The Red Team prevails in more than 50% of cases, structurally counteracting AI bias toward positive assessments. Q: Can I customize which checks run during certification?
A: No. All 59 checks across 6 dimensions run every time. This ensures consistency and prevents cherry-picking. Missing controls are penalized more heavily than present controls are rewarded (asymmetric scoring). Q: What happens if evidence can’t be collected for a check?
A: The evidence-or-zero rule applies. If the system can’t find specific evidence (file path, config value, header), that check scores 0 points rather than guessing. This prevents false positives.
Troubleshooting
Issue: Certificate shows lower grade than expectedSolution: Review the dimension scores in the JSON certificate. Each finding includes an
asvsRef field showing which OWASP requirement failed. Common culprits: missing CSRF protection, weak cookie settings (sameSite: 'none'), or wildcard CORS (origin: '*'). The markdown report’s traffic-light indicators show which dimensions need attention.
Issue: Async job stuck in progressSolution: Check the audit trail in the certificate JSON. Each phase includes start time and duration. If a phase exceeds 5 minutes, it likely timed out. Retry the job. If timeout persists, verify your AI API credentials and rate limits. Issue: Certificate rejected by security consultant
Solution: Share the OWASP ASVS mappings section. Every finding maps to a specific OWASP ASVS 5.0 requirement ID that consultants can verify independently. The methodology section lists all 7 anti-bias controls used during evaluation. If the consultant disputes a finding, request human review via support. Issue: Can’t access certification endpoints
Solution: All certification endpoints require admin-only access. Non-admin requests return 403 Forbidden. Verify your role in the user profile or contact your account owner to grant admin privileges.