1 SECURE THE DEVICE OS AND FIRMWARE 4 SECURE THE COMMUNICATION CHANNEL
• Ensure updates are over a secure channel, • Secure the Wi-Fi interface via secure configurations signed and verified (encryption, password, etc.) and drivers • Ensure bootloader firmware is secure and has • Secure the UPnP configuration not been tampered with • Secure the exposed services and keys during • Ensure installed bootloader is verified at every device enrollment stage of the boot sequence • Audit the file, printer and device sharing mechanism • Ensure device makes use of full disk encryption in place regularly • Disable unnecessary services running on the device • Secure the Bluetooth interface via secure • Protect against fuzzing and buffer overflow attacks configurations (discovery modes, PIN, etc.) and drivers • Ensure that binaries are compiled and signed • Verify that secure Bluetooth modes are in use for security • Ensure sensitive data is not sent over unencrypted bus lines 2 ENSURE SUFFICIENT DATA PROTECTION • Test for side-channel leakage via power/timing • Encrypt data at rest using strong and known analysis and glitching attacks encryption techniques • Ensure protection against Denial-of-Service • Ensure device uses dedicated security chips (DoS) and fuzzing attacks and modules to store sensitive data • Configure TLS to conform with accepted • Avoid usage of hard-coded credentials or encryption standards cryptographic key • Do not collect data not essential for device 5 ENFORCE AUTHENTICATION/AUTHORIZATION functionality • Ensure role-based access control is currently in place • Avoid usage of weak, broken, or risky • Mandate the use of multi-factor authentication for cryptographic algorithms privileged accounts • Log all secure data access and alter events • Ensure that a strong password management policy • Ensure authentication and authorization is in place to all PII 6 SECURE THE BACK-END INTERFACES 3 SECURE THE PHYSICAL DEVICE • Change the default passwords for all accessible • Ensure data storage is not directly accessible interfaces • Test debug interfaces (JTAG, UART, etc.) and USB • Ensure there is a robust password policy in place ports for unintended device or data access • Ensure there is protection against the traditional • Ensure tamper protection/resistance techniques web attacks (XSS, SQLi, CSRF) are in use • Ensure all network communication is over a secure • Limit the admin functionalities present on channel like TLS the device • Verify there is an anti-automation mechanism in place to counter brute-force attacks • Secure against request manipulation attacks • Test for business logic vulnerabilities