ãä»å¾ãâã¢ãã®ã¤ã³ã¿ã¼ãããâï¼Internet of Thingsï¼ä»¥éIoTï¼ãæ´»ç¨ããåãã¯ã¾ãã¾ãçºå±ããã¨èããããåããã¤ã¹ã«ãããã»ãã¥ãªãã£ãèãããã¨ã®ã¿ãªããããããã¯ã¼ã¯ãã¯ã©ã¦ãã¨ã®é£æºãªã©ä¿¯ç°çãªè¦éã§æ§ç¯ãããã¨ã®éè¦æ§ã¯å¢ãã¦ããã¾ããã»ãã¥ãªãã£åå¦è ã®ã¿ãªãããå¤æ§ãªçµé¨ãããã¯ã°ã©ã¦ã³ããæã¤æ¹ã§ããåºç¤ãå«ãã¦è¦ç´ãã¦ããã ããã¨ã§IoTã«ãããã»ãã¥ãªãã£ã«é¢ããæ°ã¥ãããããã¨ã§ãããã
ã¯ããã«
ãIoTã§ã¯ã»ã³ãµã¼ã家é»ã¨ãã£ãã¢ãï¼Thingsï¼ãã¤ã³ã¿ã¼ãããã«ç¹ããã¾ããããã«ä¼´ããã»ã³ãµã¼ã®ãã¼ã¿ãæ´»ç¨ãããã家é»ã®èªåå¶å¾¡ãè¡ã£ããã¨ããã¾ãã¾ãªæ´»ç¨æ¹æ³ãèãããã¾ããArduinoãRaspberry Piã«ä»£è¡¨ããããããªã·ã³ã°ã«ãã¼ãã³ã³ãã¥ã¼ã¿ã®æ´»ç¨äºä¾ãå¢ãã¦ããããããã£ãå®ä¾¡ãªåºç¤ãç¨ãã¦ç°¡åã«IoTãæ§æã§ãããã¨ãæè¡çã«çºå±ãèããã¨äºæ¸¬ãããçç±ã§ãããã
ããã£ã¨èº«è¿ãªä¾ã§ã¯ãã¿ã³1ã¤ã§æ¥ç¨åã注æã§ããããèªåè»ã®é転ãã¼ã¿ãä¿éºæã«åæ ãããã¨ãã£ãäºä¾ãè¦ããã¾ããã¾ããã¯ã©ã¦ãäºæ¥è ã«ããIoTãµã¼ãã¹ã®æä¾ãé²ãã§ãã¾ããæè¿ã§ã¯ãå¾é課éã®å®ä¾¡ãªSIMãç»å ´ããéä¿¡ã®æ·å± ã大ããä¸ãã£ããã¨ãè¨æ¶ã«æ°ããã¨ããã§ãã
ãä¸æ¹ã§ãåããã¤ã¹ã«ãããã»ãã¥ãªãã£ã¯ååã§ãªãã±ã¼ã¹ãããã¾ããå®ä¾¡ãªããã¤ã¹ã§IoTãæ§æããå ´åãSSLãå©ç¨ããéä¿¡ã®æå·åå¦çã«ããé«è² è·ãé¿ããããAPIã¨ã®éä¿¡ãHTTPã§è¡ã£ã¦ãããã¢ã¸ã¥ã¼ã«ãã«ã¼ãã«ã®ãã¼ã¸ã§ã³ã¢ãããä¸ååã§ããã¨ãã£ãã±ã¼ã¹ãèãããã¾ãããããã®èå¼±æ§ã«ã¤ãã¦åèãããæ°ã¥ãããããããã®ãã£ããã¨ãã¦ããOWASP IoT TOP 10ãå½¹ã«ç«ã¡ã¾ãã
OWASP IoT TOP 10ã«ã¤ãã¦
ãOWASP IoT TOP 10ã¯2014å¹´ã«å ¬éããããã®ãç¾æç¹ã§ã®ææ°çã§ãããã®ããã¥ã¡ã³ãã¯æ§ç¯è ãè¨è¨è ãã¦ã¼ã¶ã®ããããã«ã¨ã£ã¦ã®åºæ¬ããããã¦ãããå¹ åºãèªè ã«ã¨ã£ã¦å½¹ç«ã¤ãã¨ã¯ééããªãã§ããããæ®å¿µãªããç¾æç¹ã§ã¯è±èªçã®ã¿ãå ¬è¡¨ããã¦ãããã¾ããOWASP IoT TOP 10ã«ã¤ãã¦è¨åããã¦ããæ¥æ¬èªè¨äºãããã»ã©å¤ãã¯ããã¾ãããããããªããæè¡çãªç¨èªãå¤ããæ¯è¼çç解ãããããã¨æãã¾ãã®ã§ããã²ä¸åº¦ç®ãéãã¦ããã ããã¨ããå§ããã¾ãã
ãã§ã¯æ©éã§ãããOWASP IoT TOP 10ã§æ±ããã¦ããèå¼±æ§ãè¦ã¦ã¿ã¾ãããã
é çª | è±ã¿ã¤ãã« | æ¥æ¬èªã¿ã¤ãã« |
---|---|---|
I1 | Insecure Web Interface | å®å ¨ã§ãªãWebã¤ã³ã¿ã¼ãã§ã¼ã¹ |
I2 | Insufficient Authentication/Authorization | ä¸ååãªèªè¨¼ã»èªå¯ |
I3 | Insecure Network Services | å®å ¨ã§ãªããããã¯ã¼ã¯ç°å¢ |
I4 | Lack of Transport Encryption | 転éã«ãããæå·åã®æªå®è£ |
I5 | Privacy Concerns | å人æ å ±ã®æ¸å¿µ |
I6 | Insecure Cloud Interface | å®å ¨ã§ãªãã¯ã©ã¦ãã»ã¤ã³ã¿ã¼ãã§ã¼ã¹ |
I7 | Insecure Mobile Interface | å®å ¨ã§ãªãã¢ãã¤ã«ã»ã¤ã³ã¿ã¼ãã§ã¼ã¹ |
I8 | Insufficient Security Configurability | ã»ãã¥ãªãã£ãååèæ ®ããã¦ããªãè¨å® |
I9 | Insecure Software/Firmware | å®å ¨ã§ãªãã½ããã¦ã§ã¢ã»ãã¡ã¼ã ã¦ã§ã¢ |
I10 | Poor Physical Security | 貧弱ãªç©çã»ãã¥ãªã㣠|
ã表1ã«ç¤ºããããããã®èå¼±æ§ã«ã¤ãã¦ãOWASP IoT TOP 10ã§ã¯è©³ç´°ã«èª¬æãã¦ãã¾ãããã®ç« ç«ã¦ã¯ãOWASPã§ãã«ãã¤ã³ã»ã»ãã¥ãªãã£ç¬¬ä¸åã®è¨äºã§ä»²ç°ãããç´¹ä»ãããOWASP TOP 10ã¨ã»ã¼åãã¨ãªã£ã¦ãããå³1ã«ç¤ºããããªæ§æã¨ãªã£ã¦ãã¾ãã
é çª | 大é ç® | å°é ç® | å 容 |
---|---|---|---|
1 | èå¼±æ§ã®æ¦è¦ | è å¨ã¨ãªã人 | ãã®èå¼±æ§ãæªç¨ããããã¨ã§ã©ã®ãããªäººã被害ãåããå¯è½æ§ããããã示ãã¦ãã¾ãã |
æ»æææ³ | æªç¨å¯è½ãªæ»æãæç«ãããããã®é£æ度ããEASYããAVERAGEããDIFFICULTãã®3段éã§å®ç¾©ãã¦ãã¾ãã | ||
èå¼±æ§ã®æ®å度 | èå¼±æ§ã®ä½ããã¾ããããããCOMMONããUNCOMMONãã®2段éã§å®ç¾©ãã¦ãã¾ãã | ||
æ¤åºé£æ度 | ãã¹ãã¾ãã¯ã³ã¼ã解æã«ããèå¼±æ§ã®æ¤åºã®é£æ度ãå®ç¾©ãã¦ãã¾ããç¾å¨ã®IoT Top 10ã§ã¯ãEASYããAVERAGEãã®ã¿ã§ããããDIFFICULTãå«ã3段éã§è©ä¾¡ããã¾ãã | ||
æè¡çå½±é¿ | èå¼±æ§ãå©ç¨ãã¦æ³å®ããã被害ã®ç¯å²ãå®ç¾©ãã¦ãã¾ããç¾å¨ã®IoT Top 10ã§ã¯ãSEVEREããMODERATEãã®ã¿ã§ããããMinorãã®3段éè©ä¾¡ã§ã | ||
ãã¸ãã¹ã¸ã®å½±é¿ | ãã¸ãã¹ä¸ã®è©å¤ã®ä½ä¸ãããªã«ããªã«ãããã³ã¹ãå¢ãªã©èæ ®ãã¹ããã¸ãã¹ã¸ã®å½±é¿ã示ãã¦ãã¾ãã | ||
2 | èå¼±æ§æç¡ã®ç¢ºèª | åºæ¬çã«ã¯ãã¹ã¿ã¼åãã«èå¼±æ§æç¡ã確èªãããã¤ã³ãã示ãã¦ãã¾ãããéçºè åãã«èå¼±æ§ãä½ããã¾ãªãããã«ããããã®æ¦å¿µã示ãã¦ãããã®ãããã¾ãã | |
3 | é²æ¢æ¹æ³ | éçºè åãã«èå¼±æ§ãä½ããã¾ãªãããã«ããããã®å ·ä½çãªæ¹æ³ã示ãã¦ãã¾ãã | |
4 | æ»æã·ããªãªã®ä¾ | æ³å®ãããæ»æã·ããªãªã示ããã¦ãã¾ããOWASP TOP 10ã¨åæ§ã«å ·ä½çãªä¾ãè¨è¼ããã¦ãããéçºè ããã¹ã¿ã¼ã«ã¨ã£ã¦æ»æãã¤ã¡ã¼ã¸ããããå½¢ã¨ãªã£ã¦ãã¾ãã | |
5 | åèè³æ | é¢é£ããOWASPã³ãã¥ããã£ã®ä»ã®ææç©ã«å ããä»ã®å£ä½ãªã©ãå ¬è¡¨ãã¦ããé¢é£è³æãæ²è¼ããã¦ãã¾ãã |
ãä¾ãã°ãI1å®å ¨ã§ãªãã¦ã§ãã¤ã³ã¿ã¼ãã§ã¼ã¹ãã§ã¯åèè³æã¨ãã¦OWASP TOP 10ã®ãA1 ã¤ã³ã¸ã§ã¯ã·ã§ã³ããA3 ã¯ãã¹ãµã¤ãã¹ã¯ãªããã£ã³ã°ããA8 ã¯ãã¹ãµã¤ããªã¯ã¨ã¹ããã©ã¼ã¸ã§ãªããæãããã¦ãããè¤æ°ã®ä¸è¬çãªèå¼±æ§ãåå¨ããããã¨ã示ããã¦ãã¾ãããããã¯ããããOWASP TOP 10ã§ç´¹ä»ããã¦ãããã®ã§ãããIoTã«ããã¦ãã¦ã§ãã»ãã¥ãªãã£ã®ç¥èãä¸å¯æ¬ ã§ãããã¨ã示ãã¦ããã¨è¨ãã¾ãã
ãå ãã¦ãIoTã§ã¯ã¯ã©ã¦ããã¢ãã¤ã«ã¨ãã£ãè¤æ°ã®ã¤ã³ã¿ã¼ãã§ã¼ã¹ãåå¨ãããã¨ãæ³å®ããã¦ãã¾ããããããã®ã¤ã³ã¿ã¼ãã§ã¼ã¹ã§ã»ãã¥ãªãã£ãæ ä¿ããå¿ è¦ããããã¨ã¯ãOWASP IoT TOP 10ã§è¤æ°ã®ã¤ã³ã¿ã¼ãã§ã¼ã¹ã«ãããèå¼±æ§ï¼I1, I6, I7ï¼ãåå¥ã«åãä¸ãããã¦ãããã¨ãããåããã¾ãã
ãã¾ã ãI5 å人æ å ±ã®æ¸å¿µãã«é¢ãã¦ã¯ã FTCï¼ã¢ã¡ãªã«é£é¦åå¼å§å¡ä¼ï¼ãçºè¡¨ãã¦ããã¬ãã¼ããã¬ã¤ãã³ã¹ã«ãªã³ã¯ããã¦ãããIoTã«ããã¦å人æ å ±ãé©åã«ç®¡çãããªã¹ã¯ã«å¯¾ãã対çã«åãçµãå¿ è¦æ§ã示ããã¦ãã¾ããããã¯OWASP TOP 10ã«ããã ãA6 æ©å¯ãã¼ã¿ã®é²åºãã«ç¸å½ãã¾ããã API ãã·ã³ãã«ã«å®è£ ããããã¨ãå¤ããªã©ã®çç±ã§ãIoTã§ã¯ããéè¦åº¦ãé«ãã¨å¤æããã¦ãã¾ããä¸è¬çãªã¦ã§ããµã¼ãã¹ã¨æ¯è¼ãã¦ãæ»æã®é£æ度ãä½ãå¾åã«ãããããããæ éã«å人æ å ±ãå®ãå¿ è¦ãããã¾ãã