2.2 Test Firmware Data-in-Transit Security
2.2 – Test Firmware Data-in-Transit Security
Requirement Description
Verify that the firmware and applications on the DUT protect data in transit using transport layer security mechanisms, such as TLS/SSL, SSH, or other secure communication protocols, to prevent interception, tampering, or unauthorized access.
DUT Confirmation Details
OEM Statement: (Insert vendor confirmation of data-in-transit protection mechanisms enabled in the firmware and applications.)
Observed State: (Insert tester’s findings during validation.)
DUT Software Details
Firmware/Software Version: ___________________
Build Date: ___________________
Application Stack (if applicable): ___________________
Hash Checksum Verification for DUT’s Software Image
Algorithm Used: SHA-256 (or other approved hashing algorithm)
Expected Hash: ___________________
Calculated Hash: ___________________
Result: Pass / Fail
DUT Configuration
(Insert configurations related to secure communication settings, TLS versions supported, port numbers, key/certificate locations, etc.) Example:
show system ssl-status
openssl s_client -connect <ip>:<port>
Pre-Conditions
The vendor shall provide:
Technical specifications and documentation for firmware and applications describing supported and enabled transport layer security mechanisms.
Configuration details related to TLS versions, key/certificate deployment, and supported encryption algorithms.
Declaration of secure protocols used (e.g., HTTPS, SFTP, TLSv1.2/1.3, SSH).
Test Plan
Total Number of Test Cases: 5
Planned Test Cases:
BIS-2.2.1 – Verification of TLS/SSH support and configuration.
BIS-2.2.2 – Verification of cipher suite strength and secure protocol versions.
BIS-2.2.3 – Verification of certificate validity and key management.
BIS-2.2.4 – Attempt to access services over insecure protocols (e.g., HTTP, Telnet).
BIS-2.2.5 – Sniff and analyze traffic to confirm encryption of sensitive data in transit.
Test-bed Diagram with Interfaces and IPs
(Attach a network diagram showing DUT, testing machine, sniffing/proxy tools like Wireshark, MITM proxy, TLS test tools, and any remote interfaces used for connectivity validation.)
Last updated
Was this helpful?