Logical Device Penetration
Identifying security flaws in new networked devices
For any organization looking to implement a new technology, the potential risks can be incredibly high. While new devices may offer ﬁnancial incentives to encourage implementation, the potential vulnerabilities a device, both directly and indirectly, presents can outweigh any beneﬁt. Testing how emerging threats can target new technology is challenging because existing security assessment tools are often not sufficient.
RSM's adaptive logical device penetration testing methodology identifies vulnerabilities within new systems, so they can be properly mitigated. In addition, we evaluate the associated risks not directly caused by the device, including network permissions, cloud communications and remote maintenance. Our framework follows an iterative process of initial discovery, followed by prototyping and testing to learn about the system in scope, then creating tools to target and attack the system and its communications.
This unique logical device penetration testing methodology must be followed because many systems use custom protocols, and so few off-the-shelf tools exist to test these systems. Throughout this process, RSM works to understand the business process the device is supporting, so that sample attacks can be tailored to the system.
By working with RSM, you can learn what your risks are with new technology, and how to prevent or mitigate them before putting them into use.