Internet of Things (IoT) is any smart device that has Internet connectivity, this could be a car, camera, washing machine, microwave, watch, child’s toy, webcam or anything in-between.
Many manufacturers have enabled smart IP technology on devices, but these may not be securely configured. For example, children’s toys or webcams could be used to spy on the end user. We can provide IoT security testing services for a broad range of software and hardware devices.
IoT security testing is an essential service to ensure the device or the software used to control the IoT hardware is not vulnerable to security weaknesses that could allow the device to become compromised and data obtained.
It is important for organisations manufacturing devices and developing software to ensure their product is safe and secure before release and it is also sensible to regularly check that previously released products continue to remain secure.
IoT security testing can provide assurance that the security controls tested have been developed and configured in line with security best practice and that there are no common or publicly known vulnerabilities found at the time of the test. If vulnerabilities are found these can be rectified before an attack or security breach occurs.
IoT security testing will enable you to:
- Manage vulnerabilities
- Avoid extra cost and reputation damage from a security breach
- Provide evidence of compliance with regulatory and certification standards
- Provide assurance to customers and suppliers that their data is secure
Armadillo Sec are a CREST certified testing body and we are accredited to operate as a CHECK service provider. All of our testers are certified by CREST and our senior consultants are certified by CREST to the highest CCT Level. Our testers are also CHECK Team Leaders (CTL’s) or CHECK Team Members (CTM’s) and are approved to conduct government CHECK testing.
Our team have many years experience conducting a broad range of government and commercial tests and always aim to go the extra mile for our customers.
Frequently Asked Questions
All our testers are certified by CREST and our senior consultants are certified by CREST to the highest CCT level.
|CREST Certifications||Certified Testers|
|Practitioner Security Analysts||Yes|
|Registered Penetration Testers||Yes|
|Certified Web Application Testers||Yes|
|Certified Infrastructure Testers||Yes|
|Certified Simulated Attack Specialist||Yes|
|Certified Simulated Attack Manager||Yes|
Our CREST member status can be viewed, along with the certified tester types we have on the below link:
Our testers are also CHECK Team Leaders (CTL's) or CHECK Team Members (CTM's) and are approved to conduct government CHECK testing.
|CHECK Status||Certified Testers|
|CHECK Team Member (CTM)||Yes|
|CHECK Team Leader (CTL) - Infrastructure||Yes|
|CHECK Team Leader (CTL) - Applications||Yes|
Our CHECK status can be viewed on the below link:
It is recommended that IoT testing should be conducted annually as cyber threats are constantly evolving.
If major changes or new devices are made to the IoT applications or systems, then it is recommended that additional testing is conducted. This ensures that any recent changes are not introducing new vulnerabilities into the environment.
IoT testing prices are based on the number and type of system that are required to be reviewed, therefore there is not an off-the-shelf price for IoT testing.
For each project we will technically scope your requirements and establish the time needed to complete the work. We will then provide a detailed proposal and breakdown of costs and options.
We have a full methodology for all testing services we provide, which is supplied with each project proposal. This outlines the testing steps and all the requirements in order to deliver the test.
We supply a full testing report, which covers the following:
- Executive management summary - Non technical overview of issues for management board level
- Detailed technical findings - A complete list of all issues identified
- Risk level - Impact, likelihood and overall risk ratings are listed for each issue
- Examples - Output or screenshots to demonstrate the issue
- Recommendations - Recommendations of how to remediate the issues, including any reference to documents that can assist
A sample report can be supplied upon request.