This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP IoT Attack Surface Areas"

From OWASP
Jump to: navigation, search
Line 91: Line 91:
 
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:
 
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:
  
* Ecosystem Access Control
+
{| border="1" class="wikitable" style="text-align: left"
* Device Web Interface
+
! Attack Surface
* [https://www.owasp.org/index.php/IoT_Attack_Surface_Area_-_Administrative_Interface Administrative Interface]
+
! Vulnerability
* Ecosystem Communication
+
! Data Type
* Update Mechanism
+
|-
* Network Traffic
+
| '''Ecosystem Access Control'''
* Device Memory
+
|
* Device Firmware
+
* Implicit trust between components
* Local Data Storage
+
* Enrollment security
* Vendor Backend APIs
+
* Decommissioning system
* Mobile Application
+
* Lost access procedures
* Device Physical Interfaces
+
|
* Device Network Services
+
* Test
* [https://www.owasp.org/index.php/IoT_Attack_Surface_Area_-_Web_Cloud_Interface Cloud Web Interface]
+
|-
* Third-party Backend APIs
+
| '''Device Memory'''
* Vendor Backend APIs
+
|
 +
* Cleartext usernames
 +
* Cleartext passwords
 +
* Third-party credentials
 +
* Encryption keys
 +
|
 +
* Test
 +
|-
 +
| '''Device Physical Interfaces'''
 +
|
 +
* Firmware extraction
 +
* User CLI
 +
* Admin CLI
 +
* Privilege escalation
 +
* Reset to insecure state
 +
|
 +
* Test
 +
|-
 +
| '''Device Web Interface'''
 +
|
 +
* SQL injection
 +
* Cross-site scripting
 +
* Username enumeration
 +
* Weak passwords
 +
* Account lockout
 +
* Known credentials
 +
|
 +
* Test
 +
|-
 +
|}
 +
 
  
  

Revision as of 19:20, 7 August 2015

OWASP Project Header.jpg

OWASP IoT Attack Surface Areas (DRAFT)

Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”

The OWASP Internet of Things (IoT) Attack Surface Areas is a project designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies.

The project defines the attack surface areas presented by IoT systems, and provides information on threat agents, attack vectors, vulnerabilities, and impacts associated with each. In addition, the project aims to provide practical security recommendations for builders, breakers, and users of IoT systems.

Licensing

The OWASP IoT Attack Surface Areas is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.


What is the OWASP IoT Attack Surface Areas?

The OWASP IoT Attack Surface Areas provide:

  • A list of IoT Attack Surface Areas
  • A list of basic recommendations for manufacturers, developers, and consumers

For each attack surface areas, the following sections are included:

  • A description of the attack surface
  • Threat agents
  • Attack vectors
  • Security weaknesses
  • Technical impacts
  • Business impacts
  • Example vulnerabilities
  • Example attacks
  • Guidance on how to avoid the issue
  • References to OWASP and other related resources

For each role in Manufacturers, Developers, and Consumer, the following recommendations are included:

  • For each IN category, list the top few considerations that should be observed in that context

Project Leaders

  • Daniel Miessler
  • Craig Smith


Related Projects

Email List

Subcribe here

Quick Download

News and Events

Classifications

Owasp-incubator-trans-85.png Owasp-builders-small.png
Owasp-defenders-small.png
Cc-button-y-sa-small.png
Project Type Files DOC.jpg
OWASP Project Header.jpg


The OWASP IoT Attack Surface Areas (DRAFT) are as follows:

Attack Surface Vulnerability Data Type
Ecosystem Access Control
  • Implicit trust between components
  • Enrollment security
  • Decommissioning system
  • Lost access procedures
  • Test
Device Memory
  • Cleartext usernames
  • Cleartext passwords
  • Third-party credentials
  • Encryption keys
  • Test
Device Physical Interfaces
  • Firmware extraction
  • User CLI
  • Admin CLI
  • Privilege escalation
  • Reset to insecure state
  • Test
Device Web Interface
  • SQL injection
  • Cross-site scripting
  • Username enumeration
  • Weak passwords
  • Account lockout
  • Known credentials
  • Test


Introduction

Oxford defines the Internet of Things as “a proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”

The OWASP IoT Attack Surface Areas is a project designed to help vendors who are interested in making common appliances and gadgets network/Internet accessible. The project walks through the top ten security problems that are seen with IoT devices, and how to prevent them.

Examples of IoT Devices: Cars, lighting systems, refrigerators, telephones, SCADA systems, traffic control systems, home security systems, TVs, DVRs, etc…


Feedback

Please let us know how your organization is using the OWASP IoT Attack Surface Areas. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP!

We hope you find the information in the OWASP IoT Attack Surface Areas useful. Please contribute back to the project by sending your comments, questions, and suggestions to [email protected], or [email protected]. Thanks!

Project Sponsors