Survey of IoT Security Standards

IoT security is being approached by many organizations and from different perspectives . In this post we give a birds eye view of the players.This is not intended to be comprehensive.  We will supplement  this in time with deeper dive at different layers of the ISO 7 layer model.

8669812466?profile=original

 

FTC

The US Federal Trade Commission has a mandate around products  sold in the USA and they have a position paper . They approach the issue from a manufacturer liability  and good practice point of view. https://www.ftc.gov/news-events/press-releases/2015/01/ftc-report-internet-things-urges-companies-adopt-best-practices

The Oct 21 2016 Dyn DDOS attack accelerated the FTC activity. In Jan 2017 they also launched a IoT Home Inspector challenge  for ideas on protecting smart homes.

NIST

 The National Institute of Standards and Technology (NIST) under  U.S. Department of Commerce publishes the FIPS standards applicable under the Federal Information Security Management Act (FISMA).NIST is actively developing a high level IoT guide covering organizational process and roles . See  https://www.nist.gov/programs-projects/nist-cybersecurity-iot-program.

 

IoT Security Foundation

 A new organization tries to holistically  address IoT security thru best practices guide and planned self certification schemes the Best Practice User Mark. They explicitly  reject the idea that the manufacturer  is solely responsible and are far more realistic about the roles of various players. For more check https://iotsecurityfoundation.org

8669812873?profile=original

IIC Industrial Internet Consortium

The Industrial Internet Consortium works on use cases for industrial IoT and vouhts all the global heavy hitters as members. Its initiatives to securely connect, control and integrate assets and systems of assets with people, processes and data using common architectures, interoperability and open standard, The Industrial Internet Security Framework (IISF) is the most in-depth cross-industry-focused security framework comprising expert vision, experience and security best practices. I

 

Prpl Foundation

The Prpl Foundation works on next generation  open source software  from data centre to device. prplwrt  complements open WRT with carrier grade features. They have a framework note   for IoT security, a guide for critical areas in  embedded computing and a 2016  report on Smart home security.  See https://prpl.works/application-note-july-2016/. Purple works is pragmatic about security and collaborating with CABA  in evolving IoT security .
 Continental Automated Buildings Association (CABA) is an international not-for-profit industry association dedicated to the advancement of intelligent home and intelligent building technologies

 

Read More: Top IT Security Conferences In The World )

Broadband Internet Technical Advisory Group (BITAG)

The Broadband Internet Technology Advisory Group’s report studies the plague of IoT insecurity and makes recommendations to deal with it.  It’s short, well-researched .The report motivates its recommendations with over 150 informative references and footnotes on IoT risks, vulnerabilities and remedies. It covers the home segment.

 

OWASP

The Open Web Application Security Project is well regarded for their work. The top 10 threats issued by OWASP have been very well received. They approach  cybersecurity  esp at the web applications  (HTTP, https) layer. Recently they have started a project for IoT. See

 https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project

 

IPSO

The IPSO Alliance has been working for some time on data and functions for  Smart Objects IPSO Smart Object Guidelines provide a common design pattern, an object model, that can effectively use the IETF CoAP protocol to provide high level interoperability between Smart Object devices and connected software applications on other devices and services.They have  broadened  work from smart objects to include security. See

 http://www.ipso-alliance.org/ipso-community/resources/technical-advisory-board/security-privacy-identity-working-group/

 

AllSeen

AllSeen alliance includes AllJoyn  and Open Connectivity Foundation. AllJoyn is an open source software framework that makes it easy for devices and apps to discover and communicate with each other. The The AllJoyn system provides a security framework for applications to authenticate each other and send encrypted data between them. The AllJoyn framework provides end-to-end application level security. 

 

 

OTA alliance

The online trust alliance (OTA) works on consumer trust and online brand reputation, including privacy, identity theft and internet governance. They are a successor to efforts to combat spam emails thru Email Senders and Provider Coalition (ESPC). They have developed a IoT trust framework .

IETF

The Internet Engineering Task Force makes the Internet work better by producing high quality, relevant technical documents that influence the way people design, use, and manage the Internet. They are responsible for numerous standards around security including X.509 Public key etc. The following draft or RFC are among interesting ones to watch

 

OtrF

Open Trust Protocol (OTrP), a protocol to install, update, and delete applications and to manage security configuration in a Trusted Execution Environment (TEE)
 

MUD

The draft Manufacturers  Usage Description is a RFC intended to help reduce the vulnerability surface using a simple network policy ( whitelisting approach). It aims to reduce scope for malware injection and over the air firmware updates being hijacked. It also tries to cover  devices no longer actively maintained by the original manufacturer.

DICE  Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things

ACE Authentication and Authorization for Constrained Environments (ace)

 

Author:

Arvind Tiwary, Chair- IoT Forum

https://www.linkedin.com/in/tiwaryarvind/

 

8669805055?profile=original 

 

 

You need to be a member of CISO Platform to add comments!

Join CISO Platform

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

CISO Discussion Conference

  • Description:

    The sessions will explain the Security Market Ecosystem, Problems that CISOs face when trying to purchase a product in that segment, the architecture, business impact & more.

  • Created by: pritha