官术网_书友最值得收藏!

Engaging with the research community

Verification and validation of IoT security functionality and posture is not limited to processes conducted by the development/test team. There is a rich IoT security research community that performs independent testing of IoT products and services. These researchers will often contact vendors to discuss vulnerabilities discovered during their research.

Make it easy for these researchers to communicate this information to you, and adopt an attitude of collaboration with the community. Show your willingness to accept their input. Provide a process for responsible disclosure that they can follow, and you will have a highly talented and resourceful community aiding you in your efforts to secure your products.

Another approach to employ is the use of bug bounties. You can set a bug bounty to reward researchers for identifying vulnerabilities in your products. It is important to be very specific on the rules of engagement, including what aspects of the product or implementation are within scope.

Although the hardware aspects of the IoT make it somewhat more difficult to coordinate, there are organizations that help facilitate IoT bug bounties. BugCrowd is one such organization, offering both privately—and publicly—scoped bug bounties.

主站蜘蛛池模板: 安龙县| 尚义县| 乌拉特后旗| 阿坝县| 屯昌县| 嘉鱼县| 义马市| 漳平市| 西丰县| 新巴尔虎左旗| 定南县| 青海省| 雅江县| 伊金霍洛旗| 凉城县| 通渭县| 拉萨市| 繁昌县| 迭部县| 林甸县| 湟源县| 锡林浩特市| 南江县| 微山县| 堆龙德庆县| 烟台市| 高尔夫| 兰西县| 巩义市| 舟山市| 邵武市| 仁寿县| 织金县| 昭觉县| 施甸县| 中方县| 招远市| 额济纳旗| 牡丹江市| 深泽县| 大港区|