Security Checklist For The Internet of Things: An Essential Guide To Securing Connected Products
Security Checklist For The Internet of Things: An Essential Guide To Securing Connected Products
This paper will detail the unique risks of connected devices and best practices for
IoT security. It is based on the advice of experienced professionals and leaders in
this emerging field. It includes:
Selecting an IoT platform can mitigate risk if the platform has implemented ap-
propriate, full-stack security practices. These practices extend from the device
hardware to the cloud.
** http://www.gartner.com/newsroom/id/3165317
In October 2016, a botnet of IoT security cameras, set-top boxes, routers and similar devices attacked
Dyn, a prominent domain and service provider. Dyn underwent a massive internet outage that cost mil-
lions of dollars in productivity losses alone. In the wake of the Dyn hack, many decision-makers realized
that they needed to consider not just functionality, but security and reliability as key features of the IoT
platforms they were buying and building.
The Dyn hack, while the most visible, is not the only example of critical IoT security failures in recent
years. Vulnerabilities in some solar panels allow hackers to spy on and control power access to homes.
Security holes in certain toys exposed images of children and their parents to malicious third parties. In
industry and consumer fields alike, security has already been compromised and data lost.
To protect devices, customers, and businesses, decision-makers must be vigilant about the unique risks
of an IoT system. These risks include:
High-Risk Downtime
Some IoT services can pose fatal threats in the case of service failure. Connected medical devices
must still function correctly when offline. An automated pet feeder could endanger the life of a
pet if the service supporting it has unplanned downtime.
Broader Liability
As detailed above, IoT hacks can create liability for physical harm that goes beyond data loss or
identity theft. Hacks to these products can have existential life and property liability, which has
been shifted to the companies producing connected devices.
Developers and decision-makers can combat the unique risks of IoT by preventing potential attacks and
taking actions to ensure the continued safety of their connected systems. This checklist covers areas to
review in creating a minimal attack surface area, as well as features and actions key to maintaining
a secure system in a rapidly evolving field.
Applications
Applications running on devices may contain security holes. It is important to audit and sanitize these
programs to ensure a safe experience. The more programs running on a device, the larger the task of
auditing those programs for security.
Dependencies
Outside code dependencies such as libraries must be kept up to date and validated to comply with mod-
ern encryption and communication protocols. As with application security, a larger number of depen-
dencies requires more work to maintain.
Communication
All communications between the device and the cloud should be encrypted to ensure confidentiality,
integrity, and authenticity. This is critical to preventing man-in-the-middle or replay attacks against IoT
infrastructure.
Penetration Testing
Businesses can stay ahead of modern hacking techniques by repeatedly testing their systems with secu-
rity researchers and fixing potential vulnerabilities as they develop.
A comprehensive IoT platform with encrypted connectivity is critical to success. In an extremely risky
landscape, it is important to pick an experienced partner to help navigate security risks. The best part-
ners openly assess the evolving security risks unique to hardware, and provide insightful recommen-
dations based on experience. Whether you choose Particle or a different IoT partner, we hope you will
follow these essential recommendations in building a safe and secure connected product.
Particle’s platform is designed to be used at every stage of the product lifecycle, from prototyping to
production. Our state-of-the-art platform provides a secure, scalable infrastructure for IoT products, as
well as easy-to-use tools for managing your devices and the software that they run. Particle is the most
widely used Internet of Things platform, with a community of more than 100,000 companies, develop-
ers, and engineers deploying products in over 170 countries.
While some customers deploy products using the self-service tools, Particle also provides an array of
professional services to help customers develop and deploy products.
Software development and custom integrations
Support for preferred hardware architectures
Embedded software development
Design reviews
Project management and consulting services
Premium enterprise Support options
Particle’s TCP service uses an RSA handshake to establish a session key for a fast rotating AES-128-CBC
session. Each message is encrypted and is checked via a message id for replay attacks or out-of-order
messages. Any anomaly in the session causes it to immediately end. Although all Particle devices in-
clude hardware random number generators, the RSA/AES cloud handshake includes a cryptographically
random nonce, to ensure there is sufficient randomness on these low-power devices.
We believe that strong crypto should be based on established best practices and algorithms, and that the
use of these standards should be transparent. If a secure communications system can’t withstand public
scrutiny, then it’s not sufficiently secure. This is why we’ve open sourced our encryption protocols and
techniques. All the device communication source code is available here:
https://github.com/spark/firmware/tree/develop/communication/src
Additionally regardless of whether the device connects via Wi-Fi, Cellular, or other radio protocols, the
network authentication credentials are never transmitted to the cloud, and are only stored locally or on a
SIM card.
Particle services are designed from the ground-up to scale horizontally. This means that the Particle
Platform can scale infinitely to uniform machines in the face of an attack or large customer demands.
Businesses, developers, and customers depend on Particle to be available and responsive, and perfor-
mance is a crucial aspect of security. A fully instrumented and scalable Particle Cloud is also available
for private deployments when data and availability isolation are key to your IoT strategy.
Particle regularly hires professional penetration testing consultants to proactively prepare for any
emerging threat models. We also engage in an open dialogue with a large, security-conscious community
of developers and researchers. This active conversation helps us stay ahead of potential customer con-
cerns and improves the Particle Platform for all of our customers.
https://aws.amazon.com/security
We celebrate our security culture by playing security games and staying current with trends and best
practices. This creates a positive atmosphere and increases adoption of simple practices such as locking
your workstation, or not connecting an unknown / found device to a trusted network.
We encourage our community to practice ethical disclosure. This means they know they’ll be rewarded
and celebrated if they bring us new security risks first, instead of ignoring them, or keeping them secret
or selling them to another company. Every Particle employee knows to escalate anything resembling a
security bug or issue to the engineering team, and that team knows to evaluate and address that concern
as soon as possible.