Product Security Incident Response Team (PSIRT)
SEALSQ Product Security Commitment
Scope
1- Scope of the SEALSQ PSIRT
The SEALSQ PSIRT covers security vulnerabilities affecting certified products and other SEALSQ hardware, software, and security documentation where relevant.
Secure semiconductors and secure elements
Security vulnerabilities affecting certified and non-certified secure hardware components.
Embedded firmware and cryptographic components
Vulnerabilities impacting embedded software, cryptographic implementations, and security-critical firmware.
PKI, trust services, and software platforms
Security issues related to PKI services, certificate management, trust infrastructures, and supporting software.
Reference designs and security-critical integrations
Security flaws affecting reference designs, security guidance, and validated integration architectures.

2- Vulnerability Reporting Channel
SEALSQ encourages responsible disclosure of potential security vulnerabilities. All reports submitted to the PSIRT are acknowledged and handled in accordance with established security processes.
Contact: 📧 Email: psirt@sealsq.com
To help us assess and respond efficiently, reporters are encouraged to include, when available:
- Product name and version
- A detailed description of the issue
- Steps to reproduce the vulnerability
- Potential impact and attack scenario, if known
Reports may be submitted in English or French.
3- Responsible Disclosure & Handling Process
SEALSQ follows a responsible vulnerability disclosure process that includes:
-
Acknowledgment of the report
-
Technical evaluation and risk assessment
-
Development of mitigation and/or remediation measures when applicable
-
Coordinated communication with affected parties and authorities when required
Detailed vulnerability handling procedures are maintained internally as part of SEALSQ’s certified security management system.


4- Compliance & Standards Alignment
SEALSQ’s PSIRT process is aligned with European cybersecurity regulations and recognized standards, including the EU Cybersecurity Act (Regulation (EU) 2019/881) and Common Criteria–related vulnerability handling requirements.
Detailed vulnerability handling procedures are maintained internally as part of SEALSQ’s certified security management system.
5- Security Support & Lifecycle Information
Security information and vulnerability handling guidance remain publicly available for the duration required by applicable certifications and regulatory frameworks.


6- Public Advisories & Authorities Coordination
When appropriate, SEALSQ may coordinate vulnerability disclosure with relevant authorities, certification bodies, and industry partners, in accordance with applicable regulations.