Dealing with IoT Security- Do nothing, Do simple things, or Do it - - PowerPoint PPT Presentation
Dealing with IoT Security- Do nothing, Do simple things, or Do it - - PowerPoint PPT Presentation
Dealing with IoT Security- Do nothing, Do simple things, or Do it RIGHT Sameer Dixit, Sr.Director Security Consulting IoT on A Rise IoT Security Frameworks and Standards NIST - International Cybersecurity Standardization for the Internet of
IoT on A Rise
IoT Security Frameworks and Standards
- NIST- International Cybersecurity Standardization for the Internet of Things (IoT)
- OWASP- IoT Security Guidance
- ISA/IEC 62443 - Standards to Secure Your Industrial Automation & Control Systems (IC32)
- CTIA - Cybersecurity Certification Program for Cellular-Connected IoT Devices
- Etc….
IoT Security Attack Surface
IoT Security
Network – Services, Firewall
Application – Authentication, Authorization, Input Validation
Device Hardware – Physical Security, Local Storage, Encryption Mobile – Client Data Storage, Data Transport, API Cloud – Backend Server, Authorization, Update Security
Security Review of IoT Environment
IoT Security Testing- Do it Right !!!
IoT Application & Cloud
- Authentication
- Authorization
- Encryption usage
- Lockout
- Brute force Login
- Injection Attacks
- XSS
- SQL
- Weak Password
- Privilege Escalation
IoT Network
- Insecure Server
Configuration
- Default System
Passwords
- Unpatched systems
- Known Vulnerabilities &
Exploits
- Insecure Firewall
Configuration
- Information Leakage
- Improper Error Handling
- Weak cryptographic keys
- Vulnerable Ciphers and
Protocols
- Data Exfiltration
IoT Device Hardware
- Device Firmware
Analysis
- Binary Code Analysis
- Spoofing
- JTAG/UART Review
- Fuzzing
- Underlying Software &
application evaluation
- Unencrypted
Communication IoT Mobile Interface
- Device End Security
- Sensitive information
stored in cache
- Unencrypted Data
Storage
- Files inspection
- Excess Permissions
and Privileges
- Device Lockout policy
- Dynamic Analysis
- Authentication
- Authorization
- Encryption usage
You are not alone.
We Can Help.
Spirent SecurityLabs Credentials
Certified & Experienced Security Consultants
CATL
CTIA- IoT Cybersecurity Certification
CREST
Global Certified Ethical Security Testers
OSCP
Offensive Security Certified Professional
CEH
Certified Ethical Hacker
CISSP
Certified Information Systems Security Professional
GXPN
GIAC Certified Exploit Researcher and Advanced Penetration Tester
GPEN
GIAC Penetration Tester
GICSP
Global Industrial Cyber Security Professional
NSA ISAM
NSA InfoSec Assessment Methodology Certification
CCENT
Cisco Certified Entry Networking Technician
UCP
Unix Certified Programmer
Security+, Server+
Thank You!
SecurityLabs@Spirent.com
https://www.spirent.com/Products/SecurityLabs