This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Robot Security Project"
Ghuntington (talk | contribs) (Removed leader red) (Tag: Visual edit) |
Ghuntington (talk | contribs) m (→The OWASP Robotic Security Principles) (Tag: Visual edit) |
||
(8 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
− | = | + | =TBMain= |
<!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --> | <!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --> | ||
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div> | <div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div> | ||
Line 36: | Line 36: | ||
'''Other Robot Security Principles:''' | '''Other Robot Security Principles:''' | ||
− | We need to insert here a detailed list of other robot security principles. These should detail out virtual and physical security principles for | + | We need to insert here a detailed list of other robot security principles. These should detail out virtual and physical security principles for robots. The project must also address robots acting together in singularity. |
==Description== | ==Description== | ||
<!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--> | <!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--> | ||
− | + | The OWASP Robotic Security Project is meant to create bottom up driven robot security standards applied globally. It includes robot identification, registration, change of registration, robot termination (and other robot security - we need to flesh this out). | |
− | + | ||
− | + | With the advent of both virtual and physical robots, the number being created will shortly grow from millions to billions. They can and will easily cross existing nation state borders. The robots' actions will have legal implications ranging from contracts and operations through to personal interactions with people and/or other robots. This results in potential civil and criminal liabilities. Thus there is a need to legally register the identities of the robots, in a manner such that all jurisdictions are involved. | |
− | + | The potential aspect of malicious people, organizations or states taking advantage of a robot must be addressed. This ranges from identity, consent, data to potential operation of the robot. It also must include cloud based security for the robot. Thus, global security best practices need to be developed regarding robotic security. | |
− | + | This project is results driven. Thus, it starts with robot creation through to termination, generating practical code and business practice security which industry can readily adopt with new laws and regulations referencing them. | |
− | + | Since technology changes very quickly, the security principles and best practices also needs to be designed to rapidly change. Thus, the robot security project is creating a framework with which to then rapidly change as and when required. | |
− | + | '''We invite interested parties to join us!''' | |
==Licensing== | ==Licensing== | ||
Line 57: | Line 57: | ||
<!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--> | <!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--> | ||
<span style="color:#ff0000"> | <span style="color:#ff0000"> | ||
− | + | TBD based on our activities. | |
</span> | </span> | ||
− | '''The OWASP Security Principles are free to use. In fact it is encouraged!!!' | + | '''The OWASP Security Principles are free to use. In fact it is encouraged!!!''' |
− | |||
The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. | The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. | ||
Line 68: | Line 67: | ||
| valign="top" style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" | | | valign="top" style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" | | ||
− | == What is OWASP Security Principles Project? == | + | == What is OWASP Robotic Security Principles Project? == |
<!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--> | <!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--> | ||
− | + | It's a group of industry, government, security and privacy experts wanting to establish bottom up driven robot security standards. These range from robot creation, identification, registration and termination standards through to operational security (we need to flesh this out). | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
== Presentation == | == Presentation == | ||
− | <!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--> | + | <!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.-->* "[https://www.hvl.net/pdf/Legally%20Identifying%20Robots%20Feb%202019.pdf Legally Identifying Robots (Robot Identification)]" |
− | + | * [https://www.hvl.net/pdf/Rapidly%20Scaling%20Robot%20Identification%20Feb%202019.pdf "Rapidly Scaling Robot Identification?]" | |
− | + | * "[https://www.hvl.net/pdf/Legal%20Person%20March%202019.pdf Legal Person: Humans, Clones, Virtual and Physical AI Robotics – New Identity Principles]" | |
− | + | * [https://scholar.google.com/scholar?as_ylo=2018&q=robot+legal+person&hl=en&as_sdt=1,5 Robot legal person - google scholar] | |
− | + | * other? | |
− | |||
− | |||
== Project Leader == | == Project Leader == | ||
− | + | * [https://ca.linkedin.com/in/ghuntington Guy Huntington] | |
− | + | * Hopefully there will soon be more leaders for each subject! | |
− | |||
− | |||
− | |||
− | |||
− | * [https:// | ||
− | |||
== Related Projects == | == Related Projects == | ||
− | <!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--> | + | <!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.-->* What should we link to? |
− | |||
− | |||
− | |||
− | |||
− | |||
== Openhub == | == Openhub == | ||
Line 119: | Line 99: | ||
<!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--> | <!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--> | ||
<span style="color:#ff0000"> | <span style="color:#ff0000"> | ||
− | + | TBD. | |
</span> | </span> | ||
Line 132: | Line 112: | ||
<!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--> | <!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--> | ||
<span style="color:#ff0000"> | <span style="color:#ff0000"> | ||
− | + | TBD</span> | |
− | </span> | ||
− | * | + | * |
− | |||
== In Print == | == In Print == | ||
Line 142: | Line 120: | ||
<!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--> | <!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--> | ||
<span style="color:#ff0000"> | <span style="color:#ff0000"> | ||
− | + | TBD</span> | |
− | </span> | ||
− | |||
− | |||
==Classifications== | ==Classifications== | ||
Line 151: | Line 126: | ||
<!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--> | <!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--> | ||
<span style="color:#ff0000"> | <span style="color:#ff0000"> | ||
− | + | Builder</span> | |
− | </span> | ||
{| width="200" cellpadding="2" | {| width="200" cellpadding="2" | ||
Line 172: | Line 146: | ||
<!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--> | <!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--> | ||
<span style="color:#ff0000"> | <span style="color:#ff0000"> | ||
− | + | TBD</span> | |
− | </span> | ||
Line 180: | Line 153: | ||
==If I am not a programmer can I participate in your project?== | ==If I am not a programmer can I participate in your project?== | ||
− | Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for | + | Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, beyond the programmer, technical and security folks we are looking for people with skills sets in legal, government and privacy. |
= Acknowledgements = | = Acknowledgements = | ||
Line 187: | Line 160: | ||
<!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--> | <!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--> | ||
− | + | '''Thanks JIM!!!!!!''' | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
The first contributors to the project were: | The first contributors to the project were: | ||
− | * | + | * Jim Manico |
= Road Map and Getting Involved = | = Road Map and Getting Involved = | ||
+ | '''We need to hash this out as a team''' | ||
===Define Robot's Security Area=== | ===Define Robot's Security Area=== |
Latest revision as of 05:49, 17 April 2019
The OWASP Robotic Security PrinciplesThe OWASP Robotic Security Project has the following principles: I, Guy Huntington, have listed these principles below to get the discussion going. They aren't yet written in stone! Identification:
Registration:
Change of Registration:
Robotic Termination:
Other Robot Security Principles: We need to insert here a detailed list of other robot security principles. These should detail out virtual and physical security principles for robots. The project must also address robots acting together in singularity. DescriptionThe OWASP Robotic Security Project is meant to create bottom up driven robot security standards applied globally. It includes robot identification, registration, change of registration, robot termination (and other robot security - we need to flesh this out). With the advent of both virtual and physical robots, the number being created will shortly grow from millions to billions. They can and will easily cross existing nation state borders. The robots' actions will have legal implications ranging from contracts and operations through to personal interactions with people and/or other robots. This results in potential civil and criminal liabilities. Thus there is a need to legally register the identities of the robots, in a manner such that all jurisdictions are involved. The potential aspect of malicious people, organizations or states taking advantage of a robot must be addressed. This ranges from identity, consent, data to potential operation of the robot. It also must include cloud based security for the robot. Thus, global security best practices need to be developed regarding robotic security. This project is results driven. Thus, it starts with robot creation through to termination, generating practical code and business practice security which industry can readily adopt with new laws and regulations referencing them. Since technology changes very quickly, the security principles and best practices also needs to be designed to rapidly change. Thus, the robot security project is creating a framework with which to then rapidly change as and when required. We invite interested parties to join us! LicensingTBD based on our activities. The OWASP Security Principles are free to use. In fact it is encouraged!!! The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. |
What is OWASP Robotic Security Principles Project?It's a group of industry, government, security and privacy experts wanting to establish bottom up driven robot security standards. These range from robot creation, identification, registration and termination standards through to operational security (we need to flesh this out). Presentation
Project Leader
Related Projects
Openhub |
Quick DownloadTBD. The home of the OWASP Security Principles is on GitHub. You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github. However, if you like you may also download the master repository from the following links: News and EventsTBD In PrintTBD ClassificationsBuilder |
TBD
How can I participate in your project?
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key.
If I am not a programmer can I participate in your project?
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, beyond the programmer, technical and security folks we are looking for people with skills sets in legal, government and privacy.
Contributors
Thanks JIM!!!!!!
The first contributors to the project were:
- Jim Manico
We need to hash this out as a team
Define Robot's Security Area
- define a robot
- define robot's security layer
- define attack surface
- define attack vector
- make threat modeling
Make a Security Guideline(interface, communication, authentication, etc)
- define countermeasures of attack vector
- define robot's identification spec. and methods
- guideline for robot hardware/sensor development
- guideline for external interface of robot
- guideline for software development
- guideline for robot OS
- guideline for robot's communication/transport layer
- guideline for robot's (dynamic) authentication
- guideline for robot's cloud layer
This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says "OWASP_Example_Project". When in doubt, ask the OWASP Projects Manager. Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project
PROJECT INFO What does this OWASP project offer you? |
RELEASE(S) INFO What releases are available for this project? | |||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|