Establishing Confidence in IoT Device Security: How do we get there?

May 14, 2021

The purpose of this draft paper is to start a conversation about what it means to have confidence in the cybersecurity of IoT devices used by individuals and organizations and the various ways of gaining that confidence. This paper describes the landscape of confidence mechanisms that are currently available for establishing the security of IoT devices in the marketplace.  In preparing this paper, NIST conducted extensive research on initiatives that can help to instill confidence in IoT device security and held a series of meetings with government and industry experts to glean information on the unique aspects and challenges in this space.

Spotlight

Webtorials

Information Technology platform for Information Technology professionals. Customer Engagement platform for Technology Sales professionals. Strategic Marketing platform for Technology Marketing professionals. Over 30,000 IT professionals from around the globe subscribe to Webtorials as opt-in recipients of our weekly email broadcasts highlighting our most recent research, analysis and reporting on current and emerging technologies, applications, and solutions offered by the world's leading technology providers, technology startups, technology enterprises, service providers and cable operators.

OTHER WHITEPAPERS
news image

SK Telecom 6G White Paper

whitePaper | June 13, 2023

6G requires setting achievable goals and continuous communication with the market and consumers.  Efforts of all participants in the new 6G ecosystem are required, such as expanding of 6G usage scenarios, selecting candidate spectrums, vitalizing open interfaces, e.g., Open RAN, and simple architecture options, etc.

Read More
news image

Doing more with your IoT data

whitePaper | March 10, 2022

Each connected sensor in your IoT solution can create thousands if not millions of data points every hour. A treasure trove of value exists in that raw data! But to leverage that value, your business needs to store data over time and process, organize and analyze your data properly.

Read More
news image

Tailoring IoT platforms to the requirements of specific use cases

whitePaper | April 13, 2021

The Internet of Things has evolved in the last 10-15 years from a long-term visionary idea to our current reality, present in more and more domains of our everyday lives. Many IoT architectures and platforms are being proposed today by various academic and industrial consortia, in domains as diverse as smart manufacturing, smart homes, smart cities or smart transport, to name just a few. These different IoT platforms have many things in common, as they all rely on connecting some smart sensor and actuator devices to each other and to the Internet, providing value-added services and applications to us, human users, either directly, or in an indirect manner. However, by closely analyzing their structure and operational focus, we can observe that these IoT architectures and platforms have also special features tailored to the requirements of different use cases.

Read More
news image

The Global Smart Industry Readiness Index Initiative: Manufacturing Transformation Insights Report 2022

whitePaper | February 14, 2022

The Smart Industry Readiness Index (SIRI) comprises a suite of frameworks and tools to help manufacturers – regardless of size or industry – start, scale and sustain their digital transformation journeys. The ongoing COVID-19 pandemic and the reshaping of production value chains globallyare spurring the manufacturing community to embrace digitalization with greater focus and urgency, motivated not only by potential gains in efficiency.

Read More
news image

The Right Approach to Zero Trust for IoT Devices

whitePaper | May 18, 2022

Networking and security teams have historically relied on protections at the network perimeter to secure the entire enterprise. The internal network was deemed trusted and secure. While everything outside was considered “dirty,” everything on the internal network was considered “clean,” and application traffic would flow unrestricted. However, recent and developing shifts in enterprise working models are having a far-reaching effect on the traditionally managed network perimeter for security.

Read More
news image

The IoT Trusted Zone

whitePaper | March 17, 2022

Among security best practices, system partitioning separates and isolates security-related hardware, software, and data in a “trusted zone” and tightly limits all attempts to access trusted content from outside the zone. Non-secure software cannot directly access secure resources. The Trusted Zone isolates security-related Microcontroller Unit (MCU) hardware, software, and external devices.

Read More

Spotlight

Webtorials

Information Technology platform for Information Technology professionals. Customer Engagement platform for Technology Sales professionals. Strategic Marketing platform for Technology Marketing professionals. Over 30,000 IT professionals from around the globe subscribe to Webtorials as opt-in recipients of our weekly email broadcasts highlighting our most recent research, analysis and reporting on current and emerging technologies, applications, and solutions offered by the world's leading technology providers, technology startups, technology enterprises, service providers and cable operators.

Events