This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP IoT Attack Surface Areas"
Craig Smith (talk | contribs) |
Craig Smith (talk | contribs) |
||
| Line 6: | Line 6: | ||
| valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | ||
| − | ==OWASP | + | ==OWASP Internet of Things Top 10== |
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.” | Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.” | ||
| − | ''The OWASP Internet of Things (IoT) | + | ''The OWASP Internet of Things (IoT) Top 10 is a project designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. |
The project defines the top ten security surface areas presented by IoT systems, and provides information on threat agents, attack vectors, vulnerabilities, and impacts associated with each. In addition, the project aims to provide practical security recommendations for builders, breakers, and users of IoT systems. | The project defines the top ten security surface areas presented by IoT systems, and provides information on threat agents, attack vectors, vulnerabilities, and impacts associated with each. In addition, the project aims to provide practical security recommendations for builders, breakers, and users of IoT systems. | ||
| Line 18: | Line 18: | ||
== == | == == | ||
| + | {{Social Media Links}} | ||
| + | | valign="top" style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" | | ||
| + | |||
| + | == What is the OWASP Internet of Things Top 10? == | ||
| + | |||
| + | The OWASP Internet of Things Top 10 provides: | ||
| + | |||
| + | * A list of the 10 Most Significant IoT Security Surface Areas | ||
| + | * A list of basic recommendations for manufacturers, developers, and consumers | ||
| + | |||
| + | For each attack surface areas, the following sections are included: | ||
| + | |||
| + | * A description of the attack surface | ||
| + | * Threat agents | ||
| + | * Attack vectors | ||
| + | * Security weaknesses | ||
| + | * Technical impacts | ||
| + | * Business impacts | ||
| + | * Example vulnerabilities | ||
| + | * Example attacks | ||
| + | * Guidance on how to avoid the issue | ||
| + | * References to OWASP and other related resources | ||
| + | |||
| + | For each role in Manufacturers, Developers, and Consumer, the following recommendations are included: | ||
| + | |||
| + | * For each I''N'' category, list the top few considerations that should be observed in that context | ||
| + | |||
| + | == Project Leaders == | ||
| + | |||
| + | * Daniel Miessler | ||
| + | * Craig Smith | ||
| + | |||
| + | |||
| + | == Related Projects == | ||
| + | |||
| + | * [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project] | ||
| + | * [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project] | ||
| + | |||
| + | | valign="top" style="padding-left:25px;width:200px;" | | ||
| + | |||
| + | == Email List == | ||
| + | [https://lists.owasp.org/mailman/listinfo/owasp_internet_of_things_top_ten_project Subcribe here] | ||
| + | |||
| + | == Quick Download == | ||
| + | [https://drive.google.com/file/d/0B52IUvO0LP6ON2VzZVFkNGF6aVE/view?usp=sharing OWASP Internet of Things Top Ten 2014 PDF] | ||
| + | |||
| + | [https://drive.google.com/file/d/0B52IUvO0LP6OYVoweHNBeVFDdGs/view?usp=sharing OWASP Internet of Things Top Ten 2014 Infographic] | ||
| + | |||
| + | [https://drive.google.com/file/d/0B52IUvO0LP6OUGVWeGZGdnhleFU/view?usp=sharing OWASP Internet of Things Top Ten 2014 PPT] | ||
| + | |||
| + | [https://drive.google.com/file/d/0B52IUvO0LP6OdW1HMjRpM3VVUVE/view?usp=sharing OWASP IoT Top Ten RSA 2015 Presentation] | ||
| + | |||
| + | == News and Events == | ||
| + | * [April 2015] Added the IoT Top 10 talk from RSA | ||
| + | * [April 2015] Added an IoT Top 10 Infographic | ||
| + | * IoT day is April 9th! | ||
| + | * [February 2015] Added a PDF containing a walk through of the project and the Top Ten. | ||
| + | |||
| + | ==Classifications== | ||
| + | |||
| + | {| width="200" cellpadding="2" | ||
| + | |- | ||
| + | | align="center" valign="top" width="50%" rowspan="2"| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]] | ||
| + | | align="center" valign="top" width="50%"| [[File:Owasp-builders-small.png|link=]] | ||
| + | |- | ||
| + | | align="center" valign="top" width="50%"| [[File:Owasp-defenders-small.png|link=]] | ||
| + | |- | ||
| + | | colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] | ||
| + | |- | ||
| + | | colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]] | ||
| + | |} | ||
| + | |||
| + | |} | ||
| + | |||
| + | = OWASP Internet of Things Top 10 for 2014 = | ||
| + | |||
| + | <div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div> | ||
| + | |||
| + | |||
| + | The OWASP Internet of Things Top 10 - 2014 is as follows: | ||
| + | |||
| + | * [[Top_10_2014-I1 Insecure Web Interface | I1 Insecure Web Interface]] | ||
| + | * [[Top_10_2014-I2 Insufficient Authentication/Authorization | I2 Insufficient Authentication/Authorization]] | ||
| + | * [[Top_10_2014-I3 Insecure Network Services | I3 Insecure Network Services]] | ||
| + | * [[Top_10_2014-I4 Lack of Transport Encryption | I4 Lack of Transport Encryption]] | ||
| + | * [[Top_10_2014-I5 Privacy Concerns | I5 Privacy Concerns]] | ||
| + | * [[Top_10_2014-I6 Insecure Cloud Interface | I6 Insecure Cloud Interface]] | ||
| + | * [[Top_10_2014-I7 Insecure Mobile Interface | I7 Insecure Mobile Interface]] | ||
| + | * [[Top_10_2014-I8 Insufficient Security Configurability | I8 Insufficient Security Configurability]] | ||
| + | * [[Top_10_2014-I9 Insecure Software/Firmware | I9 Insecure Software/Firmware]] | ||
| + | * [[Top_10_2014-I10 Poor Physical Security | I10 Poor Physical Security]] | ||
| + | |||
| + | |||
| + | == Introduction == | ||
| + | |||
| + | Oxford defines the Internet of Things as “a proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.” | ||
| + | |||
| + | The OWASP Internet of Things (IoT) Top 10 is a project designed to help vendors who are interested in making common appliances and gadgets network/Internet accessible. The project walks through the top ten security problems that are seen with IoT devices, and how to prevent them. | ||
| + | |||
| + | Examples of IoT Devices: Cars, lighting systems, refrigerators, telephones, SCADA systems, traffic control systems, home security systems, TVs, DVRs, etc… | ||
| + | |||
| + | |||
| + | |||
| + | == Feedback == | ||
| + | |||
| + | Please let us know how your organization is using the Internet of Things Top 10. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! | ||
| + | |||
| + | We hope you find the information in the OWASP Internet of Things Top Ten useful. Please contribute back to the project by sending your comments, questions, and suggestions to [email protected], [email protected], or [email protected], Thanks! | ||
| + | |||
| + | == Project Sponsors == | ||
| + | |||
| + | * [http://www8.hp.com/us/en/software-solutions/fortify-on-demand-application-security/ HP Fortify on Demand] | ||
| + | * Contribute and add your name here! | ||
| + | |||
| + | <!-- ==== Project Identification ==== | ||
| + | {{Template:OWASP OWASP_Top10 Project}} --> | ||
| + | |||
| + | |||
| + | = Talks = | ||
| + | |||
| + | RSA Conference San Francisco <br> | ||
| + | [https://drive.google.com/file/d/0B52IUvO0LP6OdW1HMjRpM3VVUVE/view?usp=sharing Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] <br> | ||
| + | Daniel Miessler, Practice Principal <br> | ||
| + | April 21, 2015 <br> | ||
| + | --- <br> | ||
| + | Defcon 2015 <br> | ||
| + | IoT Security <br> | ||
| + | Daniel Miessler <br> | ||
| + | August 6-9, 2015 | ||
| + | |||
| + | = In the News = | ||
| + | |||
| + | * [http://www.cmswire.com/internet-of-things/mckinsey-the-iot-is-worth-111t-a-year/?utm_source=MainRSSFeed&utm_medium=Web&utm_campaign=RSS-News "McKinsey: The IoT is Worth $11.1T a Year"] ''CMS Wire.'' CMS Wire 05 July 2015 | ||
| + | * [http://www.chicagobusiness.com/article/20150704/ISSUE01/307049995/why-caterpillar-is-letting-its-geek-flag-fly "Why Caterpillar is letting its geek flag fly"] ''Crain's.'' Crain's 04 July 2015 | ||
| + | * [http://www.msn.com/en-us/news/connectedworld/the-cable-box-might-solve-the-internet-of-things-biggest-problem/ar-AAcqB3E?srcref=rss&ocid=winrs "The cable box might solve the Internet of Thing's biggest problem"] ''msn.com.'' msn.com 04 July 2015 | ||
| + | * [http://www.forbes.com/sites/aarontilley/2015/07/01/the-internet-versus-the-great-california-drought/ "The Internet Versus The Great California Drought"] ''Forbes.'' Forbes 01 July 2015 | ||
| + | |||
| + | = IoT Conferences - July 2015= | ||
| + | |||
| + | * [http://go.softwebsolutions.com/l/12632/2015-06-09/25vn7f Softweb Solutions Internet of Things Workshop Partnered with Microsoft] Downers Grove, US July 09 | ||
| + | * [https://www.media.mit.edu/events/knotty/overview?utm_content=buffer56e60&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer Knotty Objects | MIT Media Lab Summit | MIT Media Lab] Boston, US July 15 - 16 | ||
| + | * [http://www.unicomlearning.com/IoTweek/usa/2015/Internet_of_Things Internet of Things Chicago] Chicago, US July 17 | ||
| + | * [http://iotinfluencers.com/siliconvalley/ APPNATION Internet of Things (IoT) Summit] Santa Clara US July 20 - 21 | ||
| + | * [https://www.blackhat.com/us-15/training/ Black Hat USA 2015 - Offensive IoT Exploitation] Las Vegas, US August 01 - 06 | ||
| + | * [https://www.iotvillage.org/ IoT - Internet of Things] Las Vegas US August 06 - 09 | ||
| + | |||
| + | = Community = | ||
| + | |||
| + | [https://www.iamthecavalry.org/ I Am The Cavalry] | ||
| + | |||
| + | A global grassroots organization that is focused on issues where computer security intersects public safety and human life. | ||
| + | |||
| + | Their areas of focus include: | ||
| + | * Medical devices | ||
| + | * Automobiles | ||
| + | * Home Electronics | ||
| + | * Public Infrastructure | ||
| + | == == | ||
| + | [https://ifttt.com/ If This Then That (IFTTT)] | ||
| + | |||
| + | A service that lets you create powerful connections with one simple statement. | ||
| + | |||
| + | Channels are the basic building blocks of IFTTT. Channels include: | ||
| + | * Triggers - The ''this'' part of a Recipe | ||
| + | * Actions - The ''that'' part of a Recipe | ||
| + | == == | ||
| + | [http://builditsecure.ly BuildItSecure.ly] | ||
| + | |||
| + | A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market. | ||
| + | |||
| + | Their goals include: | ||
| + | * Focus effort towards small business | ||
| + | * Build partnerships | ||
| + | * Coordinate efforts | ||
| + | * Curate informational resources | ||
| + | * Present research | ||
| + | |||
| + | |||
| + | = Project Details = | ||
| + | |||
| + | <div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div> | ||
| + | |||
| + | |||
| + | {{:Projects/OWASP_Internet_of_Things_Top_Ten_Project}} | ||
Revision as of 16:06, 27 July 2015
- Main
- OWASP Internet of Things Top 10 for 2014
- Talks
- In the News
- IoT Conferences - July 2015
- Community
- Project Details
OWASP Internet of Things Top 10Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.” The OWASP Internet of Things (IoT) Top 10 is a project designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies. The project defines the top ten security surface areas presented by IoT systems, and provides information on threat agents, attack vectors, vulnerabilities, and impacts associated with each. In addition, the project aims to provide practical security recommendations for builders, breakers, and users of IoT systems. LicensingThe OWASP Internet of Things Top 10 is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
|
What is the OWASP Internet of Things Top 10?The OWASP Internet of Things Top 10 provides:
For each attack surface areas, the following sections are included:
For each role in Manufacturers, Developers, and Consumer, the following recommendations are included:
Project Leaders
Related Projects |
Email ListQuick DownloadOWASP Internet of Things Top Ten 2014 PDF OWASP Internet of Things Top Ten 2014 Infographic OWASP Internet of Things Top Ten 2014 PPT OWASP IoT Top Ten RSA 2015 Presentation News and Events
Classifications
| |||||||
The OWASP Internet of Things Top 10 - 2014 is as follows:
- I1 Insecure Web Interface
- I2 Insufficient Authentication/Authorization
- I3 Insecure Network Services
- I4 Lack of Transport Encryption
- I5 Privacy Concerns
- I6 Insecure Cloud Interface
- I7 Insecure Mobile Interface
- I8 Insufficient Security Configurability
- I9 Insecure Software/Firmware
- I10 Poor Physical Security
Introduction
Oxford defines the Internet of Things as “a proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”
The OWASP Internet of Things (IoT) Top 10 is a project designed to help vendors who are interested in making common appliances and gadgets network/Internet accessible. The project walks through the top ten security problems that are seen with IoT devices, and how to prevent them.
Examples of IoT Devices: Cars, lighting systems, refrigerators, telephones, SCADA systems, traffic control systems, home security systems, TVs, DVRs, etc…
Feedback
Please let us know how your organization is using the Internet of Things Top 10. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP!
We hope you find the information in the OWASP Internet of Things Top Ten useful. Please contribute back to the project by sending your comments, questions, and suggestions to [email protected], [email protected], or [email protected], Thanks!
Project Sponsors
- HP Fortify on Demand
- Contribute and add your name here!
RSA Conference San Francisco
Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project
Daniel Miessler, Practice Principal
April 21, 2015
---
Defcon 2015
IoT Security
Daniel Miessler
August 6-9, 2015
- "McKinsey: The IoT is Worth $11.1T a Year" CMS Wire. CMS Wire 05 July 2015
- "Why Caterpillar is letting its geek flag fly" Crain's. Crain's 04 July 2015
- "The cable box might solve the Internet of Thing's biggest problem" msn.com. msn.com 04 July 2015
- "The Internet Versus The Great California Drought" Forbes. Forbes 01 July 2015
- Softweb Solutions Internet of Things Workshop Partnered with Microsoft Downers Grove, US July 09
- Knotty Objects | MIT Media Lab Summit | MIT Media Lab Boston, US July 15 - 16
- Internet of Things Chicago Chicago, US July 17
- APPNATION Internet of Things (IoT) Summit Santa Clara US July 20 - 21
- Black Hat USA 2015 - Offensive IoT Exploitation Las Vegas, US August 01 - 06
- IoT - Internet of Things Las Vegas US August 06 - 09
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.
Their areas of focus include:
- Medical devices
- Automobiles
- Home Electronics
- Public Infrastructure
A service that lets you create powerful connections with one simple statement.
Channels are the basic building blocks of IFTTT. Channels include:
- Triggers - The this part of a Recipe
- Actions - The that part of a Recipe
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.
Their goals include:
- Focus effort towards small business
- Build partnerships
- Coordinate efforts
- Curate informational resources
- Present research
| PROJECT INFO What does this OWASP project offer you? |
RELEASE(S) INFO What releases are available for this project? | |||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
| |||||||||||||||||||||||||||||||||||


