|
|
Line 1: |
Line 1: |
− | =Main=
| + | #REDIRECT [[OWASP_Internet_of_Things_Project#tab=IoT_Attack_Surface_Areas]] |
− | | |
− | <div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div>
| |
− | | |
− | {| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
| |
− | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" |
| |
− | | |
− | ==OWASP IoT Attack Surface Areas (DRAFT)==
| |
− | | |
− | '''NOTE''': This project is part of [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Main The OWASP IoT Project], which is located [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Main here].
| |
− | | |
− | Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”
| |
− | | |
− | ''The OWASP Internet of Things (IoT) Attack Surface Areas is a project designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''.
| |
− | | |
− | The project defines the attack surface areas presented by IoT systems, and provides information on threat agents, attack vectors, vulnerabilities, and impacts associated with each. In addition, the project aims to provide practical security recommendations for builders, breakers, and users of IoT systems.
| |
− | | |
− | ==Licensing==
| |
− | The OWASP IoT Attack Surface Areas is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
| |
− | | |
− | == ==
| |
− | {{Social Media Links}}
| |
− | | |
− | | valign="top" style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" |
| |
− | | |
− | == What is the OWASP IoT Attack Surface Areas? ==
| |
− | | |
− | The OWASP IoT Attack Surface Areas provide:
| |
− | | |
− | * A list of IoT Attack Surface Areas
| |
− | * A list of basic recommendations for manufacturers, developers, and consumers
| |
− | | |
− | For each attack surface areas, the following sections are included:
| |
− | | |
− | * A description of the attack surface
| |
− | * Threat agents
| |
− | * Attack vectors
| |
− | * Security weaknesses
| |
− | * Technical impacts
| |
− | * Business impacts
| |
− | * Example vulnerabilities
| |
− | * Example attacks
| |
− | * Guidance on how to avoid the issue
| |
− | * References to OWASP and other related resources
| |
− | | |
− | For each role in Manufacturers, Developers, and Consumer, the following recommendations are included:
| |
− | | |
− | * For each I''N'' category, list the top few considerations that should be observed in that context
| |
− | | |
− | == Project Leaders ==
| |
− | | |
− | * Daniel Miessler
| |
− | * Craig Smith
| |
− | | |
− | | |
− | == Related Projects ==
| |
− | | |
− | * [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]
| |
− | * [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]
| |
− | | |
− | | valign="top" style="padding-left:25px;width:200px;" |
| |
− | | |
− | == Email List ==
| |
− | [https://lists.owasp.org/mailman/listinfo/owasp_internet_of_things_top_ten_project Subcribe here]
| |
− | | |
− | == Quick Download ==
| |
− | | |
− | | |
− | == News and Events ==
| |
− | | |
− | | |
− | ==Classifications==
| |
− | | |
− | {| width="200" cellpadding="2"
| |
− | |-
| |
− | | align="center" valign="top" width="50%" rowspan="2"| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]
| |
− | | align="center" valign="top" width="50%"| [[File:Owasp-builders-small.png|link=]]
| |
− | |-
| |
− | | align="center" valign="top" width="50%"| [[File:Owasp-defenders-small.png|link=]]
| |
− | |-
| |
− | | colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]
| |
− | |-
| |
− | | colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]
| |
− | |}
| |
− | | |
− | |}
| |
− | | |
− | = OWASP IoT Attack Surface Areas =
| |
− | | |
− | The OWASP IoT Attack Surface Areas (DRAFT) are as follows:
| |
− | | |
− | {| border="1" class="wikitable" style="text-align: left"
| |
− | ! Attack Surface
| |
− | ! Vulnerability
| |
− | |-
| |
− | | '''Ecosystem Access Control'''
| |
− | |
| |
− | * Implicit trust between components
| |
− | * Enrollment security
| |
− | * Decommissioning system
| |
− | * Lost access procedures
| |
− | |-
| |
− | | '''Device Memory'''
| |
− | |
| |
− | * Cleartext usernames
| |
− | * Cleartext passwords
| |
− | * Third-party credentials
| |
− | * Encryption keys
| |
− | |-
| |
− | | '''Device Physical Interfaces'''
| |
− | |
| |
− | * Firmware extraction
| |
− | * User CLI
| |
− | * Admin CLI
| |
− | * Privilege escalation
| |
− | * Reset to insecure state
| |
− | |-
| |
− | | '''Device Web Interface'''
| |
− | |
| |
− | * SQL injection
| |
− | * Cross-site scripting
| |
− | * Username enumeration
| |
− | * Weak passwords
| |
− | * Account lockout
| |
− | * Known credentials
| |
− | |-
| |
− | | '''Device Firmware'''
| |
− | |
| |
− | * Hardcoded passwords
| |
− | * Sensitive URL disclosure
| |
− | * Encryption keys
| |
− | |-
| |
− | | '''Device Network Services'''
| |
− | |
| |
− | * Information disclosure
| |
− | * User CLI
| |
− | * Administrative CLI
| |
− | * Injection
| |
− | * Denial of Service
| |
− | |-
| |
− | | '''Administrative Interface'''
| |
− | |
| |
− | * SQL injection
| |
− | * Cross-site scripting
| |
− | * Username enumeration
| |
− | * Weak passwords
| |
− | * Account lockout
| |
− | * Known credentials
| |
− | |-
| |
− | | '''Local Data Storage'''
| |
− | |
| |
− | * Unencrypted data
| |
− | * Data encrypted with discovered keys
| |
− | * Lack of data integrity checks
| |
− | |-
| |
− | | '''Cloud Web Interface'''
| |
− | |
| |
− | * SQL injection
| |
− | * Cross-site scripting
| |
− | * Username enumeration
| |
− | * Weak passwords
| |
− | * Account lockout
| |
− | * Known credentials
| |
− | |-
| |
− | | '''Third-party Backend APIs'''
| |
− | |
| |
− | * Unencrypted PII sent
| |
− | * Encrypted PII sent
| |
− | * Device information leaked
| |
− | * Location leaked
| |
− | |-
| |
− | | '''Update Mechanism'''
| |
− | |
| |
− | * Update sent without encryption
| |
− | * Updates not signed
| |
− | * Update location writable
| |
− | |-
| |
− | | '''Mobile Application'''
| |
− | |
| |
− | * Implicitly trusted by device or cloud
| |
− | * Known credentials
| |
− | * Insecure data storage
| |
− | * Lack of transport encryption
| |
− | |-
| |
− | | '''Vendor Backend APIs'''
| |
− | |
| |
− | * Inherent trust of cloud or mobile application
| |
− | * Weak authentication
| |
− | * Weak access controls
| |
− | * Injection attacks
| |
− | |-
| |
− | | '''Ecosystem Communication'''
| |
− | |
| |
− | * Health checks
| |
− | * Heartbeats
| |
− | * Ecosystem commands
| |
− | * Deprovisioning
| |
− | * Pushing updates
| |
− | |-
| |
− | | '''Network Traffic'''
| |
− | |
| |
− | * LAN
| |
− | * LAN to Internet
| |
− | * Short range
| |
− | * Non-standard
| |
− | |-
| |
− | |}
| |
− | | |
− | | |
− | == Feedback ==
| |
− | | |
− | Please let us know how your organization is using the OWASP IoT Attack Surface Areas. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP!
| |
− | | |
− | We hope you find the information in the OWASP IoT Attack Surface Areas useful. Please contribute back to the project by sending your comments, questions, and suggestions to [email protected], or [email protected]. Thanks! | |
− | | |
− | == Project Sponsors ==
| |
− | | |
− | * [http://www8.hp.com/us/en/software-solutions/fortify-on-demand-application-security/ HP Fortify on Demand]
| |
− | * Contribute and add your name here!
| |
− | | |
− | <!-- ==== Project Identification ====
| |
− | {{Template:OWASP OWASP IoT Attack Surface Areas}} -->
| |
− | | |
− | | |
− | = Project Details =
| |
− | | |
− | <div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div>
| |
− | | |
− | | |
− | | |
− | | |
− | | |
− | __NOTOC__ <headertabs />
| |
− | | |
− | [[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]
| |