Step 2 – create a system/architecture overview

This step provides a solid foundation for understanding not only the expected functionality of the IoT system, but also the potential misuse of the system. There are three sub-steps to this part of the threat modeling process:

  1. Start with documenting expected functionality.
  2. Create an architectural diagram that details the new IoT system. During this process, trust boundaries in the architecture should be established. Trust boundaries should elucidate the trust between actors and their directionality.
  3. Identify technologies used within the IoT system.

Documentation of system functionality is best accomplished by creating a set of use cases such as those that follow:

Use case 1: Customer pays ...

Get Practical Internet of Things Security - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.