Skip to content

Commit 74dbff5

Browse files
authored
Update At-Risk-Requirements.md
Walked through in arch call on Jan 12th until the marked up section
1 parent 50abc4f commit 74dbff5

File tree

1 file changed

+32
-9
lines changed

1 file changed

+32
-9
lines changed

testing/At-Risk-Requirements.md

+32-9
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,41 @@
11

2-
- [31: arch-security-consideration-communication-platform](https://w3c.github.io/wot-architecture#arch-security-consideration-communication-platform) :
2+
## [31: arch-security-consideration-communication-platform](https://w3c.github.io/wot-architecture#arch-security-consideration-communication-platform) :
3+
34
When generating TDs for an IoT ecosystem not covered by the WoT Binding Templates,
45
TD creators SHOULD ensure that all the security requirements of the IoT Platform are satisfied.
5-
- This should be a pass for Oracle, Ditto, Philips hue and pretty much any TD bound to a platform
6-
- [34: arch-security-consideration-avoid-direct](https://w3c.github.io/wot-architecture#arch-security-consideration-avoid-direct) The WoT Runtime SHOULD NOT directly expose native device interfaces to the script developers.
7-
- dart_wot should pass this. @JKRhb
86

7+
* Implementation requirements: No new requriements, should be already passed for Oracle, Ditto, Philips hue and pretty much any TD bound to a platform
8+
9+
## [34: arch-security-consideration-avoid-direct](https://w3c.github.io/wot-architecture#arch-security-consideration-avoid-direct)
10+
11+
The WoT Runtime SHOULD NOT directly expose native device interfaces to the script developers.
12+
13+
* Implementation requirements: Most implementations (e.g. Node, Python, Java) will have an abstraction layer or a sandbox that abstracts the hardware due to the underyling runtime environment. Virtual things would satidsfy that by default because of no hardware.
14+
15+
## [35: arch-security-consideration-use-hal](https://w3c.github.io/wot-architecture#arch-security-consideration-use-hal)
16+
17+
A WoT Runtime implementation SHOULD provide a hardware abstraction layer for accessing the native device interfaces.
18+
19+
* Implementation requirements: Most implementations (e.g. Node, Python, Java) have an abstraction layer or a sandbox that abstracts the hardware due to the underyling runtime environment.
20+
21+
## [36: arch-security-consideration-hal-refuse-unsafe](https://w3c.github.io/wot-architecture#arch-security-consideration-hal-refuse-unsafe)
22+
23+
Hardware abstraction layers SHOULD refuse to execute commands that might put the device (or environment) to an unsafe state.
24+
25+
* Implementation requirements: Example - restrict a robot to operate withing certain areas of it's envelope. Prevent hardware to go to conditions that are out bounds of normal operation conditions, e.g. not make a light so bright that it exceeds it's power requirements.
26+
27+
# cut-off here in call on Jan 12th
28+
29+
## [37: arch-security-consideration-secure-update](https://w3c.github.io/wot-architecture#arch-security-consideration-secure-update)
30+
31+
Post-manufacturing provisioning or update of scripts, the WoT Runtime itself or any related data SHOULD be done in a secure fashion.
32+
33+
## [43: arch-security-consideration-segmented-network](https://w3c.github.io/wot-architecture#arch-security-consideration-segmented-network)
934

10-
- [35: arch-security-consideration-use-hal](https://w3c.github.io/wot-architecture#arch-security-consideration-use-hal)A WoT Runtime implementation SHOULD provide a hardware abstraction layer for accessing the native device interfaces.
11-
- [36: arch-security-consideration-hal-refuse-unsafe](https://w3c.github.io/wot-architecture#arch-security-consideration-hal-refuse-unsafe) Hardware abstraction layers SHOULD refuse to execute commands that might put the device (or environment) to an unsafe state.
12-
- [37: arch-security-consideration-secure-update](https://w3c.github.io/wot-architecture#arch-security-consideration-secure-update) Post-manufacturing provisioning or update of scripts, the WoT Runtime itself or any related data SHOULD be done in a secure fashion.
35+
In the case of implicit access control via access to a common network a segmented network SHOULD be used.
36+
1337

14-
- [43: arch-security-consideration-segmented-network](https://w3c.github.io/wot-architecture#arch-security-consideration-segmented-network) In the case of implicit access control via access to a common network a segmented network SHOULD be used.
15-
- This is very specific to deployments. Philips Hue passes this since it is in a specific network setup. We can pass this even though it is a bit weird.
38+
- This is very specific to deployments. Philips Hue passes this since it is in a specific network setup. We can pass this even though it is a bit weird.
1639

1740
- [44: arch-security-consideration-use-psk](https://w3c.github.io/wot-architecture#arch-security-consideration-use-psk) : In commercial and industrial environments, explicit installation of pre-shared keys SHOULD be used to allow browsers to access local services while using TLS.
1841
- This is difficult to understand. This means how to establish TLS without a certificate authority.

0 commit comments

Comments
 (0)