Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

Always treat IoT

MITIGATING IoT RISK devices as insecure


by default

1 SECURE THE DEVICE OS AND FIRMWARE 4 SECURE THE COMMUNICATION CHANNEL


• Ensure updates are over a secure channel, • Secure the Wi-Fi interface via secure configurations
signed and verified (encryption, password, etc.) and drivers
• Ensure bootloader firmware is secure and has • Secure the UPnP configuration
not been tampered with • Secure the exposed services and keys during
• Ensure installed bootloader is verified at every device enrollment
stage of the boot sequence • Audit the file, printer and device sharing mechanism
• Ensure device makes use of full disk encryption in place regularly
• Disable unnecessary services running on the device • Secure the Bluetooth interface via secure
• Protect against fuzzing and buffer overflow attacks configurations (discovery modes, PIN, etc.) and drivers
• Ensure that binaries are compiled and signed • Verify that secure Bluetooth modes are in use
for security • Ensure sensitive data is not sent over unencrypted
bus lines
2 ENSURE SUFFICIENT DATA PROTECTION • Test for side-channel leakage via power/timing
• Encrypt data at rest using strong and known analysis and glitching attacks
encryption techniques • Ensure protection against Denial-of-Service
• Ensure device uses dedicated security chips (DoS) and fuzzing attacks
and modules to store sensitive data • Configure TLS to conform with accepted
• Avoid usage of hard-coded credentials or encryption standards
cryptographic key
• Do not collect data not essential for device 5 ENFORCE AUTHENTICATION/AUTHORIZATION
functionality • Ensure role-based access control is currently in place
• Avoid usage of weak, broken, or risky • Mandate the use of multi-factor authentication for
cryptographic algorithms privileged accounts
• Log all secure data access and alter events • Ensure that a strong password management policy
• Ensure authentication and authorization is in place
to all PII
6 SECURE THE BACK-END INTERFACES
3 SECURE THE PHYSICAL DEVICE • Change the default passwords for all accessible
• Ensure data storage is not directly accessible interfaces
• Test debug interfaces (JTAG, UART, etc.) and USB • Ensure there is a robust password policy in place
ports for unintended device or data access • Ensure there is protection against the traditional
• Ensure tamper protection/resistance techniques web attacks (XSS, SQLi, CSRF)
are in use • Ensure all network communication is over a secure
• Limit the admin functionalities present on channel like TLS
the device • Verify there is an anti-automation mechanism in
place to counter brute-force attacks
• Secure against request manipulation attacks
• Test for business logic vulnerabilities

www.securityinnovation.com | 978.694.1008 | @SecInnovation

You might also like