This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Internet of Things Top Ten Project"

From OWASP
Jump to: navigation, search
m (removing this project and redirecting)
 
(159 intermediate revisions by 7 users not shown)
Line 1: Line 1:
=Main=
+
#REDIRECT [[OWASP_Internet_of_Things_Project]]
 
 
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div>
 
 
 
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
 
| valign="top"  style="border-right: 1px dotted gray;padding-right:25px;" |
 
 
 
==OWASP Internet of Things Top 10==
 
 
 
Oxford defines the Internet of Things as “a proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”
 
 
 
The OWASP Internet of Things (IoT) Top 10 is a project designed to help vendors who are interested in making common appliances and gadgets network/Internet accessible. The project walks through the top ten security problems that are seen with IoT devices, and how to prevent them.
 
 
 
Examples of IoT Devices: Cars, lighting systems, refrigerators, telephones, SCADA systems, traffic control systems, home security systems, TVs, DVRs, etc…
 
 
 
==Licensing==
 
The OWASP Internet of Things Top 10 is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
 
 
 
== ==
 
{{Social Media Links}}
 
 
 
| valign="top"  style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" |
 
 
 
== What is the OWASP Internet of Things Top 10? ==
 
 
 
The OWASP Internet of Things Top 10 provides:
 
 
 
* A list of the 10 Most Critical Internet of Things Security Risks
 
 
 
And for each Risk it provides:
 
* A description
 
* Example vulnerabilities
 
* Example attacks
 
* Guidance on how to avoid
 
* References to OWASP and other related resources
 
 
 
== Project Leaders ==
 
 
 
* Daniel Miessler
 
* Craig Smith
 
* Jason Haddix
 
 
 
== Related Projects ==
 
 
 
* [[OWASP_CISO_Survey]]
 
 
 
 
 
 
 
| valign="top"  style="padding-left:25px;width:200px;" |
 
 
 
== Quick Download ==
 
 
 
 
 
 
 
== Email List ==
 
[[https://lists.owasp.org/mailman/listinfo/owasp_internet_of_things_top_ten_project Subcribe here]]
 
 
 
== News and Events ==
 
 
 
 
 
==Classifications==
 
 
 
  {| width="200" cellpadding="2"
 
  |-
 
  | align="center" valign="top" width="50%" rowspan="2"| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]
 
  | align="center" valign="top" width="50%"| [[File:Owasp-builders-small.png|link=]] 
 
  |-
 
  | align="center" valign="top" width="50%"| [[File:Owasp-defenders-small.png|link=]]
 
  |-
 
  | colspan="2" align="center"  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]
 
  |-
 
  | colspan="2" align="center"  | [[File:Project_Type_Files_DOC.jpg|link=]]
 
  |}
 
 
 
|}
 
 
 
 
 
= OWASP Internet of Things Top 10 for 2014 =
 
 
 
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div>
 
 
 
 
 
The OWASP Internet of Things Top 10 - 2014 is as follows:
 
 
 
* [[Top_10_2014-I1 Insecure Web Interface | I1 Insecure Web Interface]]
 
* [[Top_10_2014-I2 Insufficient Authentication/Authorization | I2 Insufficient Authentication/Authorization]]
 
* [[Top_10_2014-I3 Insecure Network Services | I3 Insecure Network Services]]
 
* [[Top_10_2014-I4 Lack of Transport Encryption | I4 Lack of Transport Encryption]]
 
* [[Top_10_2014-I5 Privacy Concerns | I5 Privacy Concerns]]
 
* [[Top_10_2014-I6 Insecure Cloud Interface | I6 Insecure Cloud Interface]]
 
* [[Top_10_2014-I7 Insecure Mobile Interface | I7 Insecure Mobile Interface]]
 
* [[Top_10_2014-I8 Insufficient Security Configurability | I8 Insufficient Security Configurability]]
 
* [[Top_10_2014-I9 Insecure Software/Firmware | I9 Insecure Software/Firmware]]
 
* [[Top_10_2014-I10 Poor Physical Security | I10 Poor Physical Security]]
 
 
 
 
 
== Introduction ==
 
 
 
Oxford defines the Internet of Things as “a proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”
 
 
 
The OWASP Internet of Things (IoT) Top 10 is a project designed to help vendors who are interested in making common appliances and gadgets network/Internet accessible. The project walks through the top ten security problems that are seen with IoT devices, and how to prevent them.
 
 
 
Examples of IoT Devices: Cars, lighting systems, refrigerators, telephones, SCADA systems, traffic control systems, home security systems, TVs, DVRs, etc…
 
 
 
 
 
 
 
== Feedback ==
 
 
 
Please let us know how your organization is using the Internet of Things Top 10. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP!
 
 
 
We hope you find the information in the OWASP Internet of Things Top Ten useful. Please contribute back to the project by sending your comments, questions, and suggestions to [email protected] or [email protected] Thanks!
 
 
 
 
 
== Project Sponsors ==
 
 
 
* [http://www8.hp.com/us/en/software-solutions/fortify-on-demand-application-security/ HP Fortify on Demand]
 
* Contribute and add your name here!
 
 
 
<!-- ==== Project Identification ====
 
{{Template:OWASP OWASP_Top10 Project}} -->
 
 
 
 
 
= Talks =
 
 
 
= Community =
 
 
 
= Manufacturer =
 
 
 
(DRAFT)
 
 
 
This goal of this page is help manufacturers build more secure products in the Internet of Things space. The guidance below is at a basic level, giving builders of products a basic set of guidelines to consider from their perspective. This is not a comprehensive list of considerations, and should not be treated as such, but ensuring that these fundamentals are covered will greatly improve the security of any IoT product.
 
 
 
{| border="1" class="wikitable"
 
|+ The table's caption
 
!
 
! IoT Security Consideration
 
|-
 
! Category
 
| I1 || * Ensure that any web interface present in the product disallows weak passwords
 
* Ensure that any web interface present in the product has an account lockout mechanism
 
|-
 
! Row heading A
 
| Cell B
 
| Cell C
 
|}
 
 
 
'''I1: Insecure Web Interfaces'''
 
 
 
* Ensure that any web interface present in the product disallows weak passwords
 
* Ensure that any web interface present in the product has an account lockout mechanism
 
 
 
 
 
 
 
* Ensure the device has update capability and can be updated in a timely manner if vulnerabilities are discovered
 
* Ensure the device is tamper resistant (both physical and network)
 
* Ensure the device is produced with a minimal number of physical external ports (e.g. USB ports)
 
* Ensure the device operates with a minimal number of network ports active
 
* Ensure the device does make network ports and/or services available to the internet
 
 
 
= Developers =
 
 
 
(DRAFT) If you are looking to develop for a device or system, consider the following recommendations for all user interfaces (local device, cloud-based and mobile):
 
* Avoid potential Account Harvesting issues by:
 
** Ensuring valid user accounts can't be identified by interface error messages
 
** Ensuring strong passwords are required by users
 
** Implementing account lockout after 3 - 5 failed login attempts
 
* Ensure user credentials are properly protected using recommended and accepted encryption or hashing practices
 
* Ensure sensitive data is properly protected both at rest and during transmission using recommended practices
 
* Provide the option for two-factor authentication
 
* Ensure user roles are properly segregated in multi-user environments
 
 
 
= Consumer =
 
 
 
(DRAFT) If you are looking to purchase a device or system, consider the following recommendations:
 
* Include security in feature considerations when evaluating a product
 
* Avoid using system defaults for usernames and passwords when possible and choose good passwords and two-factor authentication when possible
 
* Place Internet of Things devices on a separate wireless network if possible using a firewall
 
 
 
= Project Details =
 
 
 
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div>
 
 
 
 
 
{{:Projects/OWASP_Internet_of_Things_Top_Ten_Project}}
 
 
 
 
 
__NOTOC__ <headertabs />
 
 
 
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]
 

Latest revision as of 21:23, 11 November 2015