IoT Threat Modeling Cheat Sheet

Track:Threat Model
When:Thu AM-1
Where:Kings
OrganizersSteven Wierckx Steven Wierckx
ParticipantsFraser Scott Fraser Scott , Peter Turczak Peter Turczak , Stephanie Vanroelen Stephanie Vanroelen , Stuart Winter-Tear Stuart Winter-Tear , Tash Norris Tash Norris

Why

We all love Cheat Sheets. They are great to use when you need it but they are also great to learn because they force us to summarize the most important points.

What

  • What are the main Threats against an IoT device/deployment?
  • Can we find common Threats that apply to IoT devices/deployments?
  • Are there generic Threats we could check for applicability?
  • Could we organize the Threats in Risk Patterns for IoT devices/deployments?
  • Can they be summarized on a Cheat Sheet form?

Outcomes

A Cheat Sheet covering most common threats against IoT devices/deployments.

Register as participant

To register as participant add IoT Threat Modeling Cheat Sheet to either:

  1. the sessions metadata field from your participant's page (find your participant page and look for the edit link).
  2. or the participants metadata field from this git session page


Back to list of all Working Sessions