threat modeling iot final - sinog · i8 insufficient security configurability i9 insecure...
TRANSCRIPT
![Page 1: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat](https://reader030.vdocument.in/reader030/viewer/2022041016/5ec7ee4a189b200b744bd55c/html5/thumbnails/1.jpg)
Threat modeling IoTGrega Prešeren
![Page 3: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat](https://reader030.vdocument.in/reader030/viewer/2022041016/5ec7ee4a189b200b744bd55c/html5/thumbnails/3.jpg)
![Page 6: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat](https://reader030.vdocument.in/reader030/viewer/2022041016/5ec7ee4a189b200b744bd55c/html5/thumbnails/6.jpg)
PhysicalCyber
Cloud
Embedded
Wireless
Mobile
CPS
![Page 7: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat](https://reader030.vdocument.in/reader030/viewer/2022041016/5ec7ee4a189b200b744bd55c/html5/thumbnails/7.jpg)
SECURITYBY DESIGN
START TO FINISH
END TO END
![Page 8: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat](https://reader030.vdocument.in/reader030/viewer/2022041016/5ec7ee4a189b200b744bd55c/html5/thumbnails/8.jpg)
DEFENSEIN DEPTH
START TO FINISH
END TO END
![Page 9: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat](https://reader030.vdocument.in/reader030/viewer/2022041016/5ec7ee4a189b200b744bd55c/html5/thumbnails/9.jpg)
![Page 10: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat](https://reader030.vdocument.in/reader030/viewer/2022041016/5ec7ee4a189b200b744bd55c/html5/thumbnails/10.jpg)
3GPP
IEC
IETF
ETSI
Industrie 4.0
ITU-T
IoTSF
GSMA
NIST
OASIS
![Page 11: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat](https://reader030.vdocument.in/reader030/viewer/2022041016/5ec7ee4a189b200b744bd55c/html5/thumbnails/11.jpg)
OWASP IoT Top TenI1 Insecure Web Interface
I2 Insufficient Authentication/Authorization
I3 Insecure Network Services
I4 Lack of Transport Encryption
I5 Privacy Concerns
I6 Insecure Cloud Interface
I7 Insecure Mobile Interface
I8 Insufficient Security Configurability
I9 Insecure Software/Firmware
I10 Poor Physical Security
A1 Injection
A2 Broken Authentication and Session Management
A3 Cross-Site Scripting (XSS)
A4 Insecure Direct Object References
A5 Security Misconfiguration
A6 Sensitive Data Exposure
A7 Missing Function Level Access Control
A8 Cross-Site Request Forgery (CSRF)
A9 Using Components with Known Vulnerabilities
A10 Unvalidated Redirects and Forwards
M1 Improper Platform Usage
M2 Insecure Data Storage
M3 Insecure Communication
M4 Insecure Authentication
M5 Insufficient Cryptography
M6 Insecure Authorization
M7 Client Code Quality
M8 Code Tampering
M9 Reverse Engineering
M10 Extraneous Functionality
R1 Accountability and Data Ownership
R2 User Identity Federation
R3 Regulatory Compliance
R4 Business Continuity and Resiliency
R5 User Privacy and Secondary Usage of Data
R6 Service and Data Integration
R7 Multi Tenancy and Physical Security
R8 Incidence Analysis and Forensic Support
R9 Infrastructure Security
R10 Non Production Environment Exposure
![Page 12: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat](https://reader030.vdocument.in/reader030/viewer/2022041016/5ec7ee4a189b200b744bd55c/html5/thumbnails/12.jpg)
![Page 13: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat](https://reader030.vdocument.in/reader030/viewer/2022041016/5ec7ee4a189b200b744bd55c/html5/thumbnails/13.jpg)
![Page 19: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat](https://reader030.vdocument.in/reader030/viewer/2022041016/5ec7ee4a189b200b744bd55c/html5/thumbnails/19.jpg)
![Page 22: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat](https://reader030.vdocument.in/reader030/viewer/2022041016/5ec7ee4a189b200b744bd55c/html5/thumbnails/22.jpg)
Sensor Actuator
Device Thing
ControllerGateway Middleware Application
EDGE TIER PLATFORM TIER ENTERPRISE TIER
ACC
ESS
NET
WO
RK
(Int
erne
t)
SERV
ICE
NET
WO
RK
(Int
erne
t)
PRO
XIM
ITY
NET
WO
RK
PRO
XIM
ITY
NET
WO
RK
ING
ESTI
ON
STO
RAG
E
AI /
ANAL
YTIC
S
MAN
AGEM
ENT
ENTERPRISE
VISU
ALIZ
ATIO
N
![Page 23: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat](https://reader030.vdocument.in/reader030/viewer/2022041016/5ec7ee4a189b200b744bd55c/html5/thumbnails/23.jpg)