Controls Recommendation

Recommended Practices

This page provides abstracts for existing recommended practices and links to the source documents. Additional supporting documents detailing a wide variety of control systems topics associated with cyber vulnerabilities and their mitigation have been developed and vetted by control systems SMEs.  These documents will be updated and topics added to address additional content and emerging issues.

Supporting Documents

Internet of Things Security Assessment

Secnic’s IoT Security Services

Whether you’re creating a new IoT product or deploying an IoT solution, our experienced and skilled consultants will help you identify risk and vulnerabilities, and apply solutions to mitigate security issues across your IoT ecosystem.

Threat modeling
Secnic understands the complexity of IoT and connected systems and will assess the highest risk systems and communications, so you can focus on the entry points that matter. Working closely with your team, we’ll develop comprehensive threat models of your entire system that can evolve and live with your complete product lifecycle and help you identify and mitigate the most critical issues, as well as provide a document of your product’s security posture.

Device design consulting
Designing hardware is often the first step of a major project and can determine your limitations and weaknesses. This service provides your engineers with one-on-one time with our security consultants during design time. We offer consulting from the ground up so that hardware issues don’t become the Achilles heel of your software security architecture.

IoT penetration testing
Our penetration and system analysis testing goes beyond basic analysis to consider the whole ecosystem of the IoT technology, covering every segment and how each impacts the security of the whole. Our testing includes the IoT mobile application, cloud APIs, communication and protocols, and embedded hardware and firmware.

Hardware testing
Secnic will examine the physical security and internal architecture of the device – including internal components – to determine the breadth and depth of its physical attack surface. This service may include component indication, firmware extraction, identification of test points, and reconfiguring the device’s hardware to bypass authentication, intercept traffic, and/or inject commands that may pose a significant risk to your organization and clients.

Protocol testing
Secnic will test communications to and from the device. This includes testing the cryptographic security of encrypted transmissions, the ability to capture and modify transmissions of data, and fuzzing of the communication protocols. We will assess the security of communication protocols and determine the risk to your organization and clients.

Firmware Analysis
Secnic will extract and examine the content of the firmware in an attempt to discover backdoor accounts, injection flaws, buffer overflows, format strings, and other vulnerabilities. We will also assess the device’s firmware upgrade process for vulnerabilities and perform a secure boot review process to ensure that public key encryption and upgrade functionality is secure.

Incident Response
After an attack, getting information from anything more than device logs can be a non-trivial task. Secnic hardware teams can assist in pulling information directly from a product. This service is focused mainly on criminal cases and law enforcement; often, IoT devices have tracking and recording capabilities not publicly exposed. Our incident response team can determine what information is available for use in an investigation.

Certified PCIDSS Auditor

Certified PCIDSS Auditor

The Payment Card Industry Data Security Standard – PCI DSS is an arrangement of centered thorough controls for dealing with the dangers encompassing installment card exchanges. It applies to all substances that procedure, store or transmit cardholder information. What’s more, further, it is ordered by the Reserve Bank of India.

This course is intended to present the PCI DSS group of measures, and after that do a profound plunge into the 12 Requirements and every control. The mentor will share an abundance of useful data, contextual investigations, and cases to clarify the controls. Learn More