Welcome to the official website of ESTL!
Follow WeChat
Current location: Home > News > Certification news > Technical information
Service Hotline
+86 13925582920Phone: +86-0769-85075888 to 6617
Fax: +86-0769-85075898
Mailbox: net03@gtggroup.com
Address: 2st floor, B Area, Jinbaisheng Industrial Park, Headquarters 2 Road, Songshan Lake Hi-tech Industrial Development Zone, Dongguan City, Guangdong Pr., China.
Editor:ESTL Category:Technical information Release time:2026-04-20 Click volume:8
When conducting IoT security assessments, you will face a hard truth:80% of vulnerabilities are not sophisticated attacks — they are simply “doors left unlocked” on the device.
Default passwords, exposed debug ports, hardcoded keys, unsigned firmware…These classic mistakes result in immediate failure under almost any international security standard.
Although JC-STAR (Japan Cyber-STAR) is a Japanese security benchmark,its device-level (hardware & firmware) requirements align closely with global mainstream IoT security standards.Its core goal is to minimize risks in the device’s default state and eliminate the “I don’t think anyone will find this” mindset among engineers.
This article fully breaks down all key device-side requirements in JC-STAR.
All global IoT standards share one iron rule:no default passwords and no weak passwords allowed.
Eliminate default passwords completely
admin/admin across all devices.Enforce strong password policies
123456, password, qwerty.Clean up account management
root login via Telnet/SSH.In one sentence:Default passwords are a red line that causes 100% immediate failure in compliance audits.
As a national-level security framework, JC-STAR emphasizes sustainable security, with firmware updates at its core.
Support for legitimate update methods
Integrity protection for update packages
Secure update process
An unsigned update system is an open buffet for supply chain attacks.
All standards treat debug interfaces as high-risk points.
Telnet must be disabled
SSH must use key-based authentication and restrict root
root with empty passwords.UART / JTAG must be secured
Debug mode must be turned off
This is the most critical checkpoint in IoT security.
Hardcoding = guaranteed full compromise.
Secure storage for certificates and keys
Key update mechanisms
International standards generally require devices to log:
Mandatory logged events
Log requirements
Security event reporting (cloud‑connected devices)
The following issues result in automatic failure in any compliance system.Manufacturers will be heavily penalized by testing labs for these mistakes.
Weak / default passwords
root/123456, admin/admin, default WiFi 12345678Leftover debug modes
debug=1debug=TrueHardcoded sensitive information
Hardcoded or expired certificates
Unencrypted communication
Simple test:If a amateur hacker can compromise the device using only binwalk + strings,it is definitely non‑compliant.
Device security seems messy and complicated, but the core logic fits in one sentence:
Don’t expose what you don’t need to.Don’t hardcode what can be stored securely.Don’t trust anything you don’t have to.
Disable default passwords, close debug ports, manage keys properly, sign your firmware —and your device security will improve dramatically.
At its heart, JC-STAR’s device-side requirements remind manufacturers:The device is the weakest link in the attack chain.If you don’t strengthen it first, all the cloud security in the world is useless.
Label: secure OTA firmware update JC-STAR device security IoT security red lines hardcoded key red line IoT device compliance default password ban debug port security
Focus on Wechat
Public Number