Site Search

Case Study: IoT Service Security Review

Implementation theme

Improve quality by verifying the system's security

Conducting comprehensive security verification across devices, applications and cloud platforms to contribute to improving security quality

Background of the initiative

In this case, a company that provides a data aggregation and analysis platform to the industrial automotive industry undertook an effort to verify improvements to the security quality of the entire system prior to starting to offer the platform to major customers and the global market.
For this platform, which provides everything from edge devices to cloud applications, a major challenge was to conduct a comprehensive vulnerability check of the entire platform, not just the devices and applications, to ensure consistent and robust security.

Details of the initiative

Conduct threat analysis of the entire target system

・ A desktop threat analysis was conducted for the entire target system (web applications, mobile applications, IoT devices, and platforms). Based on the current configuration and security measures, a comprehensive analysis was conducted to determine what types of attack risks (= threats) could be considered. In addition, vulnerability diagnosis methods and security testing methods required to verify whether these threats could actually occur were extracted in a manner that linked them to each threat, which also contributed to the formulation of a verification plan.

-Threat List

Conducting a known vulnerability assessment

・ A thorough vulnerability assessment was carried out on the entire target system (web apps, mobile apps, IoT devices, and platforms). Based on the results of the assessment, known vulnerabilities were comprehensively identified and effective measures were implemented to improve the security quality of the system. Specifically, regular updates and patch applications were carried out to prepare a system that can respond to the latest attack vectors.

Confirmation of the effectiveness of existing countermeasures through penetration testing

・ Penetration testing was conducted based on the results of the threat analysis to verify the effectiveness of existing security measures. In the penetration testing, the same methods as actual attackers are used to search for vulnerabilities in the system and evaluate the effectiveness of existing measures. In addition, new measures were proposed and implemented to address any shortcomings, further strengthening security.

-Penetration test plan image

Confirmation of the effectiveness of existing countermeasures through penetration testing

Establishing a secure development process

・In order to maintain and improve the security quality of all the Company products, we standardized the entire process from threat analysis to penetration testing so that it can be applied to in-house development projects. We also educated and trained developers to improve their security awareness.

Main Results

Improving security quality

・Through the implementation of vulnerability diagnosis and penetration testing, the security quality of the entire target system was significantly improved, and early detection and countermeasures for vulnerabilities were realized. Through a wide range of diagnosis and countermeasures, technical reliability was significantly ensured, resulting in improved attack resistance and stability of the entire system.

Peace of mind for global expansion

・By implementing security measures, we gained the trust of our customers and improved their satisfaction in providing services to major clients and the global market. Meeting high security standards strengthened relationships with business partners and contributed to the creation of new business opportunities. We also improved our competitiveness in the global market, and were able to build a system for expanding our market share in the long term.

Establishing an efficient development process

・By standardizing the process from threat analysis to penetration testing, the same security approach can now be adopted seamlessly, improving overall work efficiency. In addition, by using the implemented security measures as a reference in the development process, high security standards can now be applied immediately to new projects. This is expected to lead to shorter development times and reduced costs in the future.


-Incorporating various security activities into the V-shaped process (examples)


Please feel free to contact us first

Related Links