This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
OWASP Internet of Things Project
- Main
- IoT Attack Surface Areas
- IoT Testing Guides
- Top IoT Vulnerabilities
- Talks
- In the News
- Community
OWASP Internet of Things (IoT) ProjectOxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.” The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies. The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities. LicensingThe OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
|
What is the OWASP Internet of Things Project?The OWASP Internet of Things Project provides:
Project Leaders
Related Projects |
Email ListQuick DownloadIoT Attack Surface Mapping DEFCON 23 News and Events
Classifications
| |||||||
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:
| Attack Surface | Vulnerability |
|---|---|
| Ecosystem Access Control |
|
| Device Memory |
|
| Device Physical Interfaces |
|
| Device Web Interface |
|
| Device Firmware |
|
| Device Network Services |
|
| Administrative Interface |
|
| Local Data Storage |
|
| Cloud Web Interface |
|
| Third-party Backend APIs |
|
| Update Mechanism |
|
| Mobile Application |
|
| Vendor Backend APIs |
|
| Ecosystem Communication |
|
| Network Traffic |
|
Tester IoT Security Guidance
(DRAFT)
The goal of this page is to help testers assess IoT devices and applications in the Internet of Things space. The guidance below is at a basic level, giving testers of devices and applications a basic set of guidelines to consider from their perspective. This is not a comprehensive list of considerations, and should not be treated as such, but ensuring that these fundamentals are covered will greatly improve the security of any IoT product.
| Category | IoT Security Consideration |
|---|---|
| I1: Insecure Web Interface |
|
| I2: Insufficient Authentication/Authorization |
|
| I3: Insecure Network Services |
|
| I4: Lack of Transport Encryption |
|
| I5: Privacy Concerns |
|
| I6: Insecure Cloud Interface |
|
| I7: Insecure Mobile Interface |
|
| I8: Insufficient Security Configurability |
|
| I9: Insecure Software/Firmware |
|
| I10: Poor Physical Security |
|
General Recommendations
Consider the following recommendations for all user interfaces (local device, cloud-based and mobile):
- Avoid potential Account Harvesting issues by:
- Ensuring valid user accounts can't be identified by interface error messages
- Ensuring strong passwords are required by users
- Implementing account lockout after 3 - 5 failed login attempts
For each attack surface areas, the following sections are included:
- A description of the attack surface
- Threat agents
- Attack vectors
- Security weaknesses
- Technical impacts
- Business impacts
- Example vulnerabilities
- Example attacks
- Guidance on how to avoid the issue
- References to OWASP and other related resources
- I1 Insecure Web Interface
- I2 Insufficient Authentication/Authorization
- I3 Insecure Network Services
- I4 Lack of Transport Encryption
- I5 Privacy Concerns
- I6 Insecure Cloud Interface
- I7 Insecure Mobile Interface
- I8 Insufficient Security Configurability
- I9 Insecure Software/Firmware
- I10 Poor Physical Security
RSA Conference San Francisco
Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project
Daniel Miessler, Practice Principal
April 21, 2015
---
Defcon 23
IoT Attack Surface Mapping
Daniel Miessler
August 6-9, 2015
- "McKinsey: The IoT is Worth $11.1T a Year" CMS Wire. CMS Wire 05 July 2015
- "Why Caterpillar is letting its geek flag fly" Crain's. Crain's 04 July 2015
- "The cable box might solve the Internet of Thing's biggest problem" msn.com. msn.com 04 July 2015
- "The Internet Versus The Great California Drought" Forbes. Forbes 01 July 2015
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.
Their areas of focus include:
- Medical devices
- Automobiles
- Home Electronics
- Public Infrastructure
A service that lets you create powerful connections with one simple statement.
Channels are the basic building blocks of IFTTT. Channels include:
- Triggers - The this part of a Recipe
- Actions - The that part of a Recipe
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.
Their goals include:
- Focus effort towards small business
- Build partnerships
- Coordinate efforts
- Curate informational resources
- Present research


