threat modeling iot final - sinog · i8 insufficient security configurability i9 insecure...

23
Threat modeling IoT Grega Prešeren

Upload: others

Post on 21-May-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat

Threat modeling IoTGrega Prešeren

Page 2: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat

Source: krebsonsecurity.com

Page 3: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat
Page 4: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat

Source: iot-analytics.com

Page 5: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat

Source: cyberphysicalsystems.org

Page 6: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat

PhysicalCyber

Cloud

Embedded

Wireless

Mobile

CPS

Page 7: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat

SECURITYBY DESIGN

START TO FINISH

END TO END

Page 8: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat

DEFENSEIN DEPTH

START TO FINISH

END TO END

Page 9: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat
Page 10: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat

3GPP

IEC

IETF

ETSI

Industrie 4.0

ITU-T

IoTSF

GSMA

NIST

OASIS

Page 11: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat

OWASP IoT Top TenI1 Insecure Web Interface

I2 Insufficient Authentication/Authorization

I3 Insecure Network Services

I4 Lack of Transport Encryption

I5 Privacy Concerns

I6 Insecure Cloud Interface

I7 Insecure Mobile Interface

I8 Insufficient Security Configurability

I9 Insecure Software/Firmware

I10 Poor Physical Security

A1 Injection

A2 Broken Authentication and Session Management

A3 Cross-Site Scripting (XSS)

A4 Insecure Direct Object References

A5 Security Misconfiguration

A6 Sensitive Data Exposure

A7 Missing Function Level Access Control

A8 Cross-Site Request Forgery (CSRF)

A9 Using Components with Known Vulnerabilities

A10 Unvalidated Redirects and Forwards

M1 Improper Platform Usage

M2 Insecure Data Storage

M3 Insecure Communication

M4 Insecure Authentication

M5 Insufficient Cryptography

M6 Insecure Authorization

M7 Client Code Quality

M8 Code Tampering

M9 Reverse Engineering

M10 Extraneous Functionality

R1 Accountability and Data Ownership

R2 User Identity Federation

R3 Regulatory Compliance

R4 Business Continuity and Resiliency

R5 User Privacy and Secondary Usage of Data

R6 Service and Data Integration

R7 Multi Tenancy and Physical Security

R8 Incidence Analysis and Forensic Support

R9 Infrastructure Security

R10 Non Production Environment Exposure

Page 12: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat
Page 13: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat
Page 14: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat

Source: iiconsortium.org

Page 15: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat

Source: wso2.com

Page 16: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat

Source: linkedin.com

Page 17: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat

Source: linkedin.com

Page 18: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat

Source: ieee.com

Page 19: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat
Page 20: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat

Source: microsoft.com

Page 21: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat

Source: microsoft.com

Page 22: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat

Sensor Actuator

Device Thing

ControllerGateway Middleware Application

EDGE TIER PLATFORM TIER ENTERPRISE TIER

ACC

ESS

NET

WO

RK

(Int

erne

t)

SERV

ICE

NET

WO

RK

(Int

erne

t)

PRO

XIM

ITY

NET

WO

RK

PRO

XIM

ITY

NET

WO

RK

ING

ESTI

ON

STO

RAG

E

AI /

ANAL

YTIC

S

MAN

AGEM

ENT

ENTERPRISE

VISU

ALIZ

ATIO

N

Page 23: Threat modeling IoT final - SINOG · I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security A1 Injection ... ENTERPRISE TION. Title: Threat