Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Review and create attack flow (Frederic Bourdelier Submission) #4

Open
pbjason9 opened this issue May 31, 2022 · 0 comments
Open

Review and create attack flow (Frederic Bourdelier Submission) #4

pbjason9 opened this issue May 31, 2022 · 0 comments

Comments

@pbjason9
Copy link
Collaborator

Make sure the data output from the sensors as well as control inputs are encrypted at rest and in motion, making sure the handshake/initialization process doesn't leak and/or allow man-in-the-middle, target-spoof, protocol spoof, etc. Need to be sure that source(s) and target(s) are positively identifiable. If the identification or data exchange process for any part of the system (even logging, ID verification, usage billing, maintenance data, etc.) use 3rd party address resolution, then that address resolution must be part of the system testing. If the endpoints are sufficiently verified, then that eliminates the usefulness of any "in-the-middle-redirection" attacks - but that means positive identity of all endpoints within the system scope must be validated from "power on" to "power off" - that means continuous validation protocols are required

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant