This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
OWASP IoT Attack Surface Areas
OWASP IoT Attack Surface Areas (DRAFT)Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.” The OWASP Internet of Things (IoT) Attack Surface Areas is a project designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies. The project defines the attack surface areas presented by IoT systems, and provides information on threat agents, attack vectors, vulnerabilities, and impacts associated with each. In addition, the project aims to provide practical security recommendations for builders, breakers, and users of IoT systems. LicensingThe OWASP IoT Attack Surface Areas is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
|
What is the OWASP IoT Attack Surface Areas?The OWASP IoT Attack Surface Areas provide:
For each attack surface areas, the following sections are included:
For each role in Manufacturers, Developers, and Consumer, the following recommendations are included:
Project Leaders
Related Projects |
Email ListQuick DownloadNews and EventsClassifications |
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:
Attack Surface | Vulnerability |
---|---|
Ecosystem Access Control |
|
Device Memory |
|
Device Physical Interfaces |
|
Device Web Interface |
|
Device Firmware |
|
Device Network Services |
|
Administrative Interface |
|
Local Data Storage |
|
Cloud Web Interface |
|
Third-party Backend APIs |
|
Update Mechanism |
|
Mobile Application |
|
Vendor Backend APIs |
|
Ecosystem Communication |
|
Network Traffic |
|
Feedback
Please let us know how your organization is using the OWASP IoT Attack Surface Areas. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP!
We hope you find the information in the OWASP IoT Attack Surface Areas useful. Please contribute back to the project by sending your comments, questions, and suggestions to [email protected], or [email protected]. Thanks!
Project Sponsors
- HP Fortify on Demand
- Contribute and add your name here!