<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=IoT_Testing_Guides</id>
		<title>IoT Testing Guides - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=IoT_Testing_Guides"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=IoT_Testing_Guides&amp;action=history"/>
		<updated>2026-04-27T19:45:53Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=IoT_Testing_Guides&amp;diff=216878&amp;oldid=prev</id>
		<title>Craig Smith at 19:37, 14 May 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=IoT_Testing_Guides&amp;diff=216878&amp;oldid=prev"/>
				<updated>2016-05-14T19:37:25Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 19:37, 14 May 2016&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;#tab=IoT_Attack_Surface_Areas &lt;/del&gt;Back To The &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;IoT Attack Surface Areas &lt;/del&gt;Project]&amp;lt;/center&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project Back To The &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Internet of Things &lt;/ins&gt;Project]&amp;lt;/center&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Tester IoT Security Guidance ==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Tester IoT Security Guidance ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=IoT_Testing_Guides&amp;diff=203979&amp;oldid=prev</id>
		<title>Craig Smith at 03:10, 30 November 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=IoT_Testing_Guides&amp;diff=203979&amp;oldid=prev"/>
				<updated>2015-11-30T03:10:17Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 03:10, 30 November 2015&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Attack_Surface_Areas Back To The IoT Attack Surface Areas Project]&amp;lt;/center&amp;gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Tester IoT Security Guidance ==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Tester IoT Security Guidance ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=IoT_Testing_Guides&amp;diff=203961&amp;oldid=prev</id>
		<title>Craig Smith: Created page with &quot;== Tester IoT Security Guidance ==  (DRAFT)  The goal of this page is to help testers assess IoT devices and applications in the Internet of Things space. The guidance below i...&quot;</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=IoT_Testing_Guides&amp;diff=203961&amp;oldid=prev"/>
				<updated>2015-11-30T02:47:06Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;quot;== Tester IoT Security Guidance ==  (DRAFT)  The goal of this page is to help testers assess IoT devices and applications in the Internet of Things space. The guidance below i...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== Tester IoT Security Guidance ==&lt;br /&gt;
&lt;br /&gt;
(DRAFT)&lt;br /&gt;
&lt;br /&gt;
The goal of this page is to help testers assess IoT devices and applications in the Internet of Things space. The guidance below is at a basic level, giving testers of devices and applications a basic set of guidelines to consider from their perspective. This is not a comprehensive list of considerations, and should not be treated as such, but ensuring that these fundamentals are covered will greatly improve the security of any IoT product.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Category&lt;br /&gt;
! IoT Security Consideration&lt;br /&gt;
|- &lt;br /&gt;
| '''I1: Insecure Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Assess any web interface to determine if weak passwords are allowed&lt;br /&gt;
* Assess the account lockout mechanism&lt;br /&gt;
* Assess the web interface for XSS, SQLi and CSRF vulnerabilities and other web application vulnerabilities&lt;br /&gt;
* Assess the use of HTTPS to protect transmitted information&lt;br /&gt;
* Assess the ability to change the username and password&lt;br /&gt;
* Determine if web application firewalls are used to protect web interfaces&lt;br /&gt;
|- &lt;br /&gt;
| '''I2: Insufficient Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the solution for the use of strong passwords where authentication is needed&lt;br /&gt;
* Assess the solution for multi-user environments and ensure it includes functionality for role separation&lt;br /&gt;
* Assess the solution for Implementation two-factor authentication where possible&lt;br /&gt;
* Assess password recovery mechanisms&lt;br /&gt;
* Assess the solution for the option to require strong passwords&lt;br /&gt;
* Assess the solution for the option to force password expiration after a specific period&lt;br /&gt;
* Assess the solution for the option to change the default username and password&lt;br /&gt;
|- &lt;br /&gt;
| '''I3: Insecure Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the solution to ensure network services don't respond poorly to buffer overflow, fuzzing or denial of service attacks&lt;br /&gt;
* Assess the solution to ensure test ports are are not present&lt;br /&gt;
|- &lt;br /&gt;
| '''I4: Lack of Transport Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the solution to determine the use of encrypted communication between devices and between devices and the internet&lt;br /&gt;
* Assess the solution to determine if accepted encryption practices are used and if proprietary protocols are avoided&lt;br /&gt;
* Assess the solution to determine if a firewall option available is available&lt;br /&gt;
|- &lt;br /&gt;
| '''I5: Privacy Concerns'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the solution to determine the amount of personal information collected&lt;br /&gt;
* Assess the solution to determine if collected personal data is properly protected using encryption at rest and in transit&lt;br /&gt;
* Assess the solution to determine if Ensuring data is de-identified or anonymized&lt;br /&gt;
* Assess the solution to ensure end-users are given a choice for data collected beyond what is needed for proper operation of the device&lt;br /&gt;
|- &lt;br /&gt;
| '''I6: Insecure Cloud Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the cloud interfaces for security vulnerabilities (e.g. API interfaces and cloud-based web interfaces)&lt;br /&gt;
* Assess the cloud-based web interface to ensure it disallows weak passwords&lt;br /&gt;
* Assess the cloud-based web interface to ensure it includes an account lockout mechanism&lt;br /&gt;
* Assess the cloud-based web interface to determine if two-factor authentication is used&lt;br /&gt;
* Assess any cloud interfaces for XSS, SQLi and CSRF vulnerabilities and other vulnerabilities&lt;br /&gt;
* Assess all cloud interfaces to ensure transport encryption is used&lt;br /&gt;
* Assess the cloud interfaces to determine if the option to require strong passwords is available&lt;br /&gt;
* Assess the cloud interfaces to determine if the option to force password expiration after a specific period is available&lt;br /&gt;
* Assess the cloud interfaces to determine if the option to change the default username and password is available&lt;br /&gt;
|- &lt;br /&gt;
| '''I7: Insecure Mobile Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the mobile interface to ensure it disallows weak passwords&lt;br /&gt;
* Assess the mobile interface to ensure it includes an account lockout mechanism&lt;br /&gt;
* Assess the mobile interface to determine if it Implements two-factor authentication (e.g Apple's Touch ID)&lt;br /&gt;
* Assess the mobile interface to determine if it uses transport encryption&lt;br /&gt;
* Assess the mobile interface to determine if the option to require strong passwords is available&lt;br /&gt;
* Assess the mobile interface to determine if the option to force password expiration after a specific period is available&lt;br /&gt;
* Assess the mobile interface to determine if the option to change the default username and password is available&lt;br /&gt;
* Assess the mobile interface to determine the amount of personal information collected&lt;br /&gt;
|- &lt;br /&gt;
| '''I8: Insufficient Security Configurability'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the solution to determine if password security options (e.g. Enabling 20 character passwords or enabling two-factor authentication) are available&lt;br /&gt;
* Assess the solution to determine if encryption options (e.g. Enabling AES-256 where AES-128 is the default setting) are available&lt;br /&gt;
* Assess the solution to determine if logging for security events is available&lt;br /&gt;
* Assess the solution to determine if alerts and notifications to the user for security events are available&lt;br /&gt;
|- &lt;br /&gt;
| '''I9: Insecure Software/Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the device to ensure it includes update capability and can be updated quickly when vulnerabilities are discovered&lt;br /&gt;
* Assess the device to ensure it uses encrypted update files and that the files are transmitted using encryption&lt;br /&gt;
* Assess the device to ensure is uses signed files and then validates that file before installation&lt;br /&gt;
&lt;br /&gt;
|- &lt;br /&gt;
| '''I10: Poor Physical Security'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the device to ensure it utilizes a minimal number of physical external ports (e.g. USB ports) on the device&lt;br /&gt;
* Assess the device to determine if it can be accessed via unintended methods such as through an unnecessary USB port&lt;br /&gt;
* Assess the device to determine if it allows for disabling of unused physical ports such as USB&lt;br /&gt;
* Assess the device to determine if it includes the ability to limit administrative capabilities to a local interface only&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===General Recommendations===&lt;br /&gt;
&lt;br /&gt;
Consider the following recommendations for all user interfaces (local device, cloud-based and mobile):&lt;br /&gt;
* Avoid potential Account Harvesting issues by:&lt;br /&gt;
** Ensuring valid user accounts can't be identified by interface error messages&lt;br /&gt;
** Ensuring strong passwords are required by users&lt;br /&gt;
** Implementing account lockout after 3 - 5 failed login attempts&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	</feed>