This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "IoT Security Checklist"

From OWASP
Jump to: navigation, search
(init)
 
(init)
Line 1: Line 1:
{| class="wikitable"
+
= The Checklist =
|-
+
 
! Criteria
+
== Threat model : neighbour ==
! Threat model
+
=== Unprotected wireless channel ===
! Conditions
+
* Present
|-
+
* Not present
| Unencrypted wireless channel
+
 
| Neighbor
+
== Threat model : guest ==
| *hello | *hello2
+
=== Authentication between client and device ===
|-
+
* Not present
| row 2, cell 1
+
* Login/password
| row 2, cell 2
+
* Key
| row 2, cell 3
+
 
|}
+
=== Client-device encryption ===
 +
* Not present
 +
* Weak/strong
 +
* Symmetric/asymmetric
 +
* Encryption key length
 +
 
 +
=== Authentication for firmware update ===
 +
* Not present
 +
* Login/password
 +
* Key
 +
 
 +
=== Firmware integrity controls ===
 +
* Not present
 +
* Weak/strong
 +
* E-signature
 +
* Checksum
 +
* Self-written
 +
* Threat model applies for reseller too!
 +
 
 +
 
 +
== Threat model : vendor ==
 +
=== Hidden data exchange services ===
 +
* Present
 +
* Not present
 +
 
 +
=== Backdoor accounts ===
 +
* Present
 +
* Not present
 +
 
 +
 
 +
== Threat model : website ==
 +
=== Client-side vulnerabilities in web interface ===
 +
* Present
 +
* Not present
 +
 
 +
=== Server-side vulnerabilities in web interface ===
 +
* Present
 +
* Not present
 +
* Threat model applies for guest too!
 +
 
 +
 
 +
== Threat model : physical ==
 +
=== Physical protection from damage ===
 +
* Present
 +
* Not present

Revision as of 12:54, 1 March 2015

The Checklist

Threat model : neighbour

Unprotected wireless channel

  • Present
  • Not present

Threat model : guest

Authentication between client and device

  • Not present
  • Login/password
  • Key

Client-device encryption

  • Not present
  • Weak/strong
  • Symmetric/asymmetric
  • Encryption key length

Authentication for firmware update

  • Not present
  • Login/password
  • Key

Firmware integrity controls

  • Not present
  • Weak/strong
  • E-signature
  • Checksum
  • Self-written
  • Threat model applies for reseller too!


Threat model : vendor

Hidden data exchange services

  • Present
  • Not present

Backdoor accounts

  • Present
  • Not present


Threat model : website

Client-side vulnerabilities in web interface

  • Present
  • Not present

Server-side vulnerabilities in web interface

  • Present
  • Not present
  • Threat model applies for guest too!


Threat model : physical

Physical protection from damage

  • Present
  • Not present