Services

LoRaWAN Security Audit and Security Policy

How does your LoRaWAN Security policy stack up?

Protect your LoRaWAN network against a range of Attacks and Vulnerabilities

LoRaWAN Security is under the microscope as an expanding set of vulnerabilities emerge ..

What is a LoRaWAN Security Policy?

Your LoRaWAN Security Policy should be a comprehensive and detailed document prepared by a LoRaWAN Security specialist.

If you already have such as policy, then it’s wise to get it independently checked and enhanced.

Why do I need it?

Organisations have deployed LoRaWAN networks – as either trial networks or as unaudited live networks – that are not adequately protected against an increasing number of attack vectors.

As a start, check out our review of LoRaWAN Security Vulnerabilities.

Peace of mind

We’ll get your LoRaWAN Security Policy prepared quickly, comprehensively and cost-effectively.

What’s more, if we perform your LoRaWAN Security Audit, your new LoRaWAN Security Policy is automatically included.

Everything you need to know about LoRaWAN Security

LoRaWAN Security Essentials

Your LoRaWAN Security Policy and Audit should examine a wide range of factors - including at least:

  • Device activation
  • Key management
  • End-device security
  • Gateway security
  • Network Server security
  • Application Server security
  • Backend server security
  • Traffic and Payload security
  • Traffic security in the backend networks
  • DevEUIs, AppKeys, Session keys
  • Correct Join Server operation, isolation and key encryption
  • Access controls
  • Authentication, authentication tokens, APIs
  • Key rotation and revocation

Our LoRaWAN Security Policy and Auditing can include:

  • Training in LoRaWAN – for non-technical team members and for IT teams, covering LoRaWAN and IoT solutions Authoritatively - in Overview and In-Depth
  • Review of Operational and Policy Controls
  • Procedure assessment for secure LoRaWAN provisioning and decommissioning
  • Secure key storage and use
  • Checks on device hardware, firmware and security mechanisms
  • Server security (full stack analysis): Join, Network, Application, Identity
  • Data Network security
  • LoRaWAN packet capture and analysis
  • Event logging, log collation, monitoring, alerting, reporting
  • Security response procedures
  • Security auditing and reporting
  • Security policy update

Training in LoRaWAN for Technical and Non-technical teams

We deliver comprehensive training in LoRaWAN – covering the underlying technologies, LoRaWAN network Architecture, Planning, Design, Operation and Security. Our training delivers a fast-track and in-depth introduction to LoRaWAN, going far beyond the training available online. Examples include our LoRaWAN In-Depth training.

Let’s get connected

We’ll find the solution, performance guaranteed. Get in touch to find out more.

Get started

Some of our solutions

Today, due to the rapid evolution of LoRaWAN standards, software and hardware, and the relative newness of LoRaWAN to end-user organisations, many LoRaWAN networks are not adequately secured against the wide range of threats.

Many LoRaWAN networks have inadequate Security Policy that doesn’t mitigate today’s risk levels with effective countermeasures.

Your LoRaWAN Security Policy should be a comprehensive and detailed document prepared by a LoRaWAN Security specialist with a solid background in wireless systems, networking and IT security.

We’ll get your LoRaWAN Security Policy prepared quickly, comprehensively and cost-effectively, so that it forms the foundation of your revised LoRaWAN security posture.

Inadequately secured LoRaWAN networks – even when they are completely separate from existing corporate networks – pose a range of serious risks for the organisations that deploy them or depend on data from LoRaWAN sensors and applications.

If there’s any integration between LoRaWAN and your wider IT systems, the dangers increase significantly.

We’ll review – or write – your LoRaWAN Security Policy using our state-of-the-art methods, and help you secure your LoRaWAN network, putting in place effective systems to both detect and mitigate against a wide range of threats.

Penetration Testing and Auditing are not the same – nor is one an alternative to the other.

Most wireless penetration testing is inadequate, and this is not helped by the absence of standards for securing LoRaWAN networks.

Contact us to find out how we can Pen Test, Audit and Secure your LoRaWAN network and your associated IT infrastructure.

Since 2005, LEVER have defined how Wireless Security Auditing should be performed.

Our LoRaWAN audit methodology is tailored to compliment your existing IT security policies and resources, your LoRaWAN network deployment and your back-end services and applications.

We can combine both “White Box” LoRaWAN auditing with “Black Box” penetration testing.

Our detailed report will grade your security posture across a range of Risks, Threats and Mitigations, and will enable you to strengthen your LoRaWAN security posture to the appropriate level.

Wireless (in)Security

Here are just some of the wireless technologies that might be used in or around your organisation.

Does your organisation have devices that use or embed these wireless technologies? Are those devices secure, or are they offering direct or indirect access to your organisation’s systems and data?

How secure is your Wi-Fi network? Does it still use WPA2, WPA-PSK, MAC address filtering, SSID hiding or open / splash page captive portal access for guests?

LoRaWAN Security Policy

A well-executed LoRaWAN security policy is your organisation’s best weapon in defending against potential attacks, as well as providing confidence in your organisation’s ability to restore systems, networks and data should a breach occur.

As a recognised authority with more than 20 years experience in Wireless Security Policy, our industry-leading Wireless Security Policy and Auditing will help ensure the security of your systems and networks.

We define and write detailed wireless security policy document covering all applicable wireless systems, including 802.11 / Wi-Fi, Bluetooth, ZigBee, LoRaWAN and all wireless IoT protocols.

This Policy then forms the basis of your security tools, your wireless SIEM, your network implementation, segmentation, configuration, auditing, penetration testing and reporting.

Secure your organisation, and get peace of mind – speak to a member of our LoRaWAN Security team.

Testimonials

Don’t just take our word for it

“LEVER provided us a solution at a stadium in Yorkshire. We have worked with them over the last couple of years and have had regular weekly updates and reports with our team. LEVER are our choice for network solutions.”

“City of Lincoln Council approached LEVER to consult and advise on the development wireless CCTV camera system. At each stage LEVER have given impartial advice and feedback. We would recommend LEVER to anyone.”

“LEVER delivered a bespoke training course to our team in London. The trainer was personable and accurate. We are happy to recommend LEVER for your training.”

“Following LEVER’s recommendations, Wi-Fi service was improved across all venues. The average Wi-Fi service score of 43% was increased to 80% and 90% at most locations. Wi-Fi speeds increased between 5x times and 25x times following LEVER's intervention.”

“LEVER have delivered a series of successful Wi-Fi network projects for offices located outside N. America. LEVER's approach is professional, flexible and dependable, with all International surveys completed without a hitch. We look forward to working with LEVER on our future International Wi-Fi projects.”

“LEVER provided us a solution at a stadium in Yorkshire. We have worked with them over the last couple of years and have had regular weekly updates and reports with our team. LEVER are our choice for network solutions.”

“City of Lincoln Council approached LEVER to consult and advise on the development wireless CCTV camera system. At each stage LEVER have given impartial advice and feedback. We would recommend LEVER to anyone.”

“LEVER delivered a bespoke training course to our team in London. The trainer was personable and accurate. We are happy to recommend LEVER for your training.”

“Following LEVER’s recommendations, Wi-Fi service was improved across all venues. The average Wi-Fi service score of 43% was increased to 80% and 90% at most locations. Wi-Fi speeds increased between 5x times and 25x times following LEVER's intervention.”

“LEVER have delivered a series of successful Wi-Fi network projects for offices located outside N. America. LEVER's approach is professional, flexible and dependable, with all International surveys completed without a hitch. We look forward to working with LEVER on our future International Wi-Fi projects.”

Repair, Installation, Training & Support

Get Started

We’ll find the solution, performance guaranteed.
Get in touch to find out more.

Contact Us

Type something below and press return to search or click a related link:

X Close Search