Built for you

For IoT security
consultancies

Run connected device, embedded firmware, radio protocol, mobile companion, and cloud backend pentests as structured records, not as a folder of UART captures, binwalk extractions, and tester scratchpads. Tag findings against IEC 62443, OWASP IoT Top 10, and the matching component-layer references, deliver through a branded portal scoped per device manufacturer or product owner, and keep the evidence chain durable across each new firmware version the client ships.

No credit card required. Free plan available forever.

A platform built for the firms that test connected devices end to end

Security consultancies that focus on connected devices carry a different operating burden than firms that test general SaaS or enterprise web. Every engagement crosses the silicon (the SoC, the secure element, the radio module, the debug interfaces), the firmware on the device, the radio protocols the device speaks, the mobile companion application that configures and pairs the device, and the cloud backend that supports the fleet. The deliverables sit alongside certification submissions (ISASecure, IoTSF Compliance Framework, ETSI EN 303 645 self-assessment, the Cyber Resilience Act conformity track), firmware build pipeline gates, and the security verification record the device product team already runs. The report has to map findings back to IEC 62443 component requirements, the matching OWASP IoT Top 10 category, and (for the cloud backend that supports the fleet) OWASP ASVS. The evidence chain has to survive a new firmware image the client ships without a missing link. Most IoT testing shops still run this delivery on a notes app, a screenshot folder, a hardware lab-bench photograph archive, and a spreadsheet that loses context the moment the engagement closes and the next firmware build version increments.

SecPortal gives IoT security consultancies one workspace for engagements, findings, evidence, retests, branded delivery, and invoicing. Findings carry CVSS scores from the moment they are opened, IEC 62443 and OWASP IoT tagging is part of the workflow, the client portal scopes secure-boot bypass material and firmware extraction artefacts behind authenticated access, and the AI-assisted reporting drafts the framework-aligned writeup the manufacturer is expecting. Whether the firm services a consumer device studio, a smart-home platform vendor, an industrial IoT manufacturer subject to IEC 62443 certification, a connected medical device maker under FDA premarket cybersecurity guidance, or an automotive supplier that ships connected ECUs, the platform scales without adding administrative overhead.

Capabilities IoT security consultancies actually use

Engagement records that carry the IoT scope

Each IoT engagement opens with the in-scope device models and hardware revisions, the firmware versions and image hashes under test, the radio protocols covered (BLE, Zigbee, Z-Wave, Thread, LoRaWAN, sub-GHz proprietary, NFC), the mobile companion application identifiers, the cloud backend endpoints the device talks to, the lab-bench rules of engagement for invasive hardware work (UART, JTAG, SWD, glitching, decapping), and the agreed safety constraints attached to the record. The next firmware version the client ships finds the same record waiting, instead of forcing a re-onboarding from a chat history.

Findings tagged to IEC 62443 and OWASP IoT Top 10

Log findings with CVSS 3.1 vectors, severity, and evidence, and tag them against the IEC 62443-4-2 component requirement they fail under, the OWASP IoT Top 10 category they fall in, and the ETSI EN 303 645 provision when consumer device certification is in scope. The exported report carries the references so the device team can attach the finding to the build pipeline and the verification record without re-keying every line.

Branded portal scoped per device manufacturer

Each manufacturer client receives a branded portal on a tenant subdomain. Reports, findings, retest evidence, and remediation status sit behind authenticated access scoped to the assessed product line. Secure boot bypass material, firmware extraction artefacts, signing key exposure, glitch attack waveforms, and adversarial radio captures stay off the generic file-share links that most IoT testing shops still default to.

Evidence fields tuned to IoT findings

Custom finding templates record the device model and hardware revision, the firmware version and image hash, the SoC and chipset family (Espressif, Nordic, Realtek, MediaTek, Qualcomm, NXP, STM32, Renesas), the static evidence (binwalk extract, decompiled function, secure boot configuration, partition table), the dynamic evidence (UART or JTAG capture, runtime hook output, debug console transcript), the radio capture (Wireshark BLE, Sigrok, GNU Radio recording), the mobile companion request and response pair when the chain crosses the app, and the cloud endpoint detail when the chain crosses the backend. The reproducibility evidence sits in the record so a senior tester can verify the finding against a clean device and a clean image without rebuilding the lab from a screenshot folder.

Retests paired to the original finding across firmware versions

When the client ships a new firmware image, a new hardware revision, a new backend release, or a tightened secure boot configuration, the retest pairs to the same finding rather than opening a new record. Closure evidence records the firmware image hash, hardware revision, and backend release identifier that cleared the issue, so the trail shows when the issue was first found, when remediation took effect, and which version cleared it, all on one record the certification body, the manufacturer engineering team, and the next external assessment team can walk through.

AI-assisted reporting tuned to device manufacturer buyers

Generate executive summaries, technical writeups, and remediation roadmaps from the live findings record. Manufacturer buyers expect a deliverable that ties technical detail to the IEC 62443 component requirement their certification track already references and to the firmware version their release engineering team is shipping. The AI generates a draft against the tagged record, so the senior tester edits a draft instead of typing from a blank page on the day the engagement closes.

How an IoT security practice runs inside SecPortal

IoT security delivery is most defensible when one operating picture covers scope, evidence, finding-to-framework mapping, retest verification across firmware versions and hardware revisions, and the report. SecPortal supports the full delivery rather than a single phase of it.

  • Open the engagement against the right manufacturer record so the in-scope device models, the firmware versions and image hashes, the radio protocols covered, the companion app identifiers, the cloud backend endpoints the device depends on, and the agreed lab-bench rules of engagement are documented before a UART probe ever touches a test point.
  • Run hardware pentests, firmware reverse engineering, radio protocol analysis, mobile companion app testing, and cloud backend testing under one engagement, with the findings consolidated to a single record rather than scattered across separate notebooks, decompiled firmware directories, radio capture folders, and chat transcripts.
  • Track every finding through open, in-progress, fix-pending, retest-pending, and verified-closed states with a date and actor on each transition, so the audit trail covers what device manufacturer engineering, certification bodies (ISASecure, IoTSF, ETSI assessors), and external assessors expect to see.
  • Generate executive, technical, and remediation views from the same source data, so the same finding base produces the right artefact for the device product owner, the embedded engineer, the security lead, and the certification contact at the manufacturer.
  • Map findings to the IEC 62443-4-2 component requirement, the OWASP IoT Top 10 category, and the matching ETSI EN 303 645 provision (or the relevant Cyber Resilience Act essential cybersecurity requirement when the assessment supports CE marking) on the same record they live on.
  • Invoice the engagement against the same record the work was tracked against, so billing closes on the same source of truth the deliverable closed on.

From engagement kickoff to verified close, on one record

The leverage in IoT security delivery is the durability of the audit chain across firmware version changes, hardware revisions, and backend releases. SecPortal runs a single delivery flow that the next release, the next retest, and the next certification review can build against without reconstructing context from a lab-bench photograph archive.

  1. 1Open the IoT pentest engagement with assessed manufacturer entity, in-scope device models and hardware revisions, firmware versions and image hashes under test, radio protocols covered, companion app identifiers, cloud backend endpoints in scope, lab-bench rules of engagement (invasive hardware testing, glitching, decapping, supply-chain test fixtures), testers, and dates stamped against the record. The rules-of-engagement template populates the standard sections; the engagement record holds the bespoke IoT context.
  2. 2Run the IoT testing programme inside the engagement record. Hardware-side activity (UART discovery, JTAG and SWD reactivation, secure boot bypass attempts, fault injection, key extraction), firmware-side activity (image extraction, binwalk and unblob analysis, decompilation, hardcoded credential search, update mechanism review), radio-side activity (capture, replay, fuzzing, downgrade and pairing weakness analysis), companion app activity, and cloud backend activity all consolidate to the same findings database, with raw outputs attached to the finding they support.
  3. 3Tag each finding against the IEC 62443-4-2 component requirement, the OWASP IoT Top 10 category, and the matching ETSI EN 303 645 provision (or the relevant Cyber Resilience Act requirement) as it is logged. The tagging is part of the testing workflow, not a post-engagement reconciliation step.
  4. 4Generate the technical report, executive summary, and remediation roadmap with AI assistance from the live record. The deliverable lands in the client portal alongside the underlying finding-level evidence (binwalk extract, decompiled snippet, UART or JTAG capture, radio recording, request and response, photograph of the lab bench setup), so the report and the source-of-truth point at the same data.
  5. 5Run retests after the client ships the next firmware image, lifts the SoC family, tightens the secure boot configuration, ships a new hardware revision, or releases a new cloud backend version. Attach verification evidence to the same finding, record the firmware image hash, hardware revision, and backend release identifier that cleared the issue, and either close the issue with a status change actor recorded automatically or revert to open with regression notes captured in place. The audit chain stays intact for certification activities and for the next external assessment.

IoT-specific finding classes the platform is built to handle

IoT engagements surface a class of findings that frequently cross the silicon, the firmware, the radio, the companion app, and the cloud backend at the same time. The encyclopedia entries below cover the most common adversarial cases, with reproducibility evidence and remediation guidance the manufacturer team can act on. Each one can be tagged into a SecPortal engagement and tracked through the same workflow as a traditional pentest finding.

  • Hardcoded device credentials, factory-default service accounts, and signing material baked into a firmware image fall under the hardcoded secrets entry and the default credentials entry.
  • Insecure data transfer over BLE, weak certificate validation on the device-to-cloud TLS channel, and downgraded cipher suites on local management protocols fall under the TLS and SSL misconfiguration entry, while custom radio cryptographic flaws, weak pairing schemes, and rolled-from-scratch ciphers on resource-constrained devices are tracked under the weak cryptography entry.
  • Insecure data storage in writable flash partitions, exposed file systems, and configuration logs that leak secrets are tracked under the sensitive data exposure entry.
  • Cloud backend authorisation gaps that the device or companion app exposes (per-device record access, tenant scoping, vertical privilege escalation between owner and installer roles) sit under the broken access control entry and the broken object level authorization entry.
  • Authentication bypass on local device management interfaces and bearer-token weaknesses on cloud APIs sit under the authentication bypass entry and the JWT vulnerabilities entry.
  • Vulnerable open-source components carried by the firmware (BusyBox, OpenSSL, lwIP, Mbed TLS, Linux kernel modules, vendor SDK forks) and stale third-party libraries on the cloud backend are tracked under the vulnerable dependencies entry.
  • Server-side request forgery against backend services accessible through device-to-cloud APIs is tracked under the server-side request forgery entry, and command injection through device shell endpoints, debug interfaces, or update handlers is captured by the command injection entry.

Where IoT security consultancies typically start

Most IoT-focused firms adopt the platform in three phases: bring the active manufacturer list and engagement records under one workspace, layer in finding-to-framework tagging and branded portal delivery, then consolidate retests, AI-assisted reporting, and invoicing onto the same record. The relevant capability and workflow pages explain each phase in detail.

SecPortal is built for IoT security consultancies that want one platform for the whole delivery: live engagements, framework-tagged findings, evidence, retests, branded portals, AI-assisted reporting, and invoicing. Manufacturer clients get a deliverable that ties to the IEC 62443 component requirements their certification track already references and to the firmware version their release engineering team is shipping, and the firm gets back the hours that used to disappear into post-engagement document production and capture-by-capture reconciliation across notebooks, lab-bench photograph archives, and chat transcripts.

If your firm is structured as a smaller partner-led practice between two and ten testers, the SecPortal for boutique security firms page covers the operating model that fits a specialist consultancy. If your firm runs a broader multi-vertical book of business, the SecPortal for cybersecurity firms page covers the multi-client delivery model. If your firm specialises in operational technology and industrial control system work, where active scanning is constrained and change windows cross plant maintenance schedules, the SecPortal for OT and ICS security consultancies page covers the IEC 62443 and NIST SP 800-82 assessment model that sits next to consumer and commercial IoT work. Firms that pair connected device work with mobile companion app review can read the SecPortal for mobile security consultancies page for the OWASP MASVS aligned delivery model, and firms that pair connected device work with AI and ML adversarial review (on-device models, edge inference, federated learning endpoints) can read the SecPortal for AI and ML security consultancies page for the technology specialism that overlaps when a connected device embeds an on-device model.

For broader context on how device findings hold up after the engagement closes, the aging pentest findings research and the severity calibration research cover what happens after the report ships and the manufacturer starts shipping new firmware images, new hardware revisions, and new backend releases the original findings need to be re-evaluated against.

The problems you face

And how SecPortal solves each one.

IoT pentest findings live across UART logs, binwalk extracts, JTAG debug sessions, decompiled firmware notes, BLE sniffer captures, mobile companion app traces, and cloud API dumps that nobody can re-walk after the engagement closes

Each engagement opens a structured findings database with CVSS 3.1 vectors, severity, evidence attachments, and remediation guidance. Hardware findings (debug interfaces, secure boot bypasses, key extraction, glitch attacks), firmware findings (hardcoded credentials, weak update integrity, insecure storage), radio findings (replay, weak pairing, downgrade), companion app findings, and cloud backend findings all land on one record rather than across five disconnected toolchains.

Reports do not map findings to IEC 62443 component requirements, OWASP IoT Top 10 categories, or ETSI EN 303 645 provisions the manufacturer is being assessed against

Tag each finding against the relevant IEC 62443-4-2 component requirement, the OWASP IoT Top 10 category (weak passwords, insecure network services, insecure ecosystem interfaces, lack of secure update, insecure default settings, insecure data transfer, insecure data storage, lack of device management, lack of physical hardening, insecure design and development), and the matching ETSI EN 303 645 provision when consumer device certification is in scope. The exported report carries the references so the device team can attach the finding to the build and the verification record without re-keying every line.

Hardware, firmware, radio, mobile companion, and cloud backend produce findings the same testing template was not designed for, and the audit chain breaks at the boundary between layers

Custom finding templates capture device model and revision, firmware version and image hash, hardware component (SoC, BLE module, radio, secure element), the static evidence (binwalk extract, decompiled function, secure boot configuration), the dynamic evidence (UART or JTAG capture, runtime hook output, radio capture), the mobile companion request and response when the chain crosses the app, and the cloud endpoint when the chain crosses the backend. The reproducibility evidence sits on the record so a second tester can verify the finding without rebuilding the lab from a notes app and a chat thread.

Each new firmware version, hardware revision, or cloud backend release the manufacturer ships breaks the audit chain and retests start from a blank document

Retests pair to the original finding rather than opening a new record. Closure evidence records the firmware image hash, hardware revision, and backend release identifier that cleared the issue, so the trail shows when the issue was first found, when remediation took effect, and which version closed it. The product cadence does not break the engagement record.

Email and shared drives are the wrong delivery channel for findings that include secure boot bypass material, firmware extraction artefacts, signing key exposure, glitch attack waveforms, and adversarial radio captures

Each device manufacturer client gets a branded portal on a tenant subdomain. Reports, findings, retest evidence, and remediation status sit behind authenticated access scoped to the assessed product line, not on a generic file-share link that ages out and leaks through forwarded threads. Sensitive hardware-attack evidence stays inside the engagement record where it belongs.

Multi-product manufacturers running connected devices plus cloud platforms plus companion apps need findings consolidated across the device, the radio, the cloud, and the mobile client

Authenticated DAST against the cloud backend, SAST and SCA via the Git provider connection on the firmware and cloud repositories, manually logged hardware and radio findings, and companion app findings all consolidate on the same engagement record. Deduplication runs across the consolidated set so the engagement closes with one defensible findings list instead of four parallel reports per layer.

Run IoT pentest delivery on one platform

Hardware, firmware, radio, companion app, and cloud backend findings on one engagement record with IEC 62443 and OWASP IoT tagging, branded portals, and retest workflows. Free plan to start.

No credit card required. Free plan available forever.