Establishing Confidence in IoT Device Security: How do we get there?

May 14, 2021

The purpose of this draft paper is to start a conversation about what it means to have confidence in the cybersecurity of IoT devices used by individuals and organizations and the various ways of gaining that confidence. This paper describes the landscape of confidence mechanisms that are currently available for establishing the security of IoT devices in the marketplace.  In preparing this paper, NIST conducted extensive research on initiatives that can help to instill confidence in IoT device security and held a series of meetings with government and industry experts to glean information on the unique aspects and challenges in this space.

Spotlight

Definitive Logic

Definitive Logic serves as trusted advisors to our government and commercial clients, providing objective, no-nonsense, vendor- and technology- neutral IT and management consulting services. Our comprehensive services help our clients use technology and data to maximize their performance and business processes. We employ high-caliber individuals that solve real business challenges through expert financial management, real estate and health IT solutions.

OTHER WHITEPAPERS
news image

Wi-Fi 6: Leveling Up the Technology

whitePaper | October 17, 2022

The IEEE 802.11 working group, established in 1990, published its first Wi-Fi standard in 1997. Since that time, the rapid adoption of Wi-Fi-enabled devices, streaming services, and applications has provided users with innovative solutions to participate in nearly all facets of daily living—from anywhere and at any time.

Read More
news image

The Industrial IoT Landscape

whitePaper | December 30, 2019

Our mission is to design and demonstrate an Industrial Internet of Things (IIoT). We will develop the guidance needed to securely connect and profitably deploy intelligent systems across devices, edge, and cloud.

Read More
news image

Tailoring IoT platforms to the requirements of specific use cases

whitePaper | April 13, 2021

The Internet of Things has evolved in the last 10-15 years from a long-term visionary idea to our current reality, present in more and more domains of our everyday lives. Many IoT architectures and platforms are being proposed today by various academic and industrial consortia, in domains as diverse as smart manufacturing, smart homes, smart cities or smart transport, to name just a few. These different IoT platforms have many things in common, as they all rely on connecting some smart sensor and actuator devices to each other and to the Internet, providing value-added services and applications to us, human users, either directly, or in an indirect manner. However, by closely analyzing their structure and operational focus, we can observe that these IoT architectures and platforms have also special features tailored to the requirements of different use cases.

Read More
news image

Threat detection and response in cloud environments

whitePaper | August 1, 2022

Cloud environments change fundamental assumptions in how to perform threat detection and response. The highly dynamic inventory of cloud workloads means systems come and go in seconds. When system configuration errors are introduced during a build, they can be exacerbated and amplified when automation replicates the errors across many workloads. Shared responsibility with the cloud service provider (CSP) creates potential threat detection gaps in the attack lifecycle.

Read More
news image

IoT Signals- Edition 3 (Microsoft)

whitePaper | October 5, 2021

The Internet of Things (IoT) is rapidly changing the world around us, transforming a huge range of physical objects through digital intelligence. Beyond our ubiquitous smart personal devices, IoT is revolutionizing the way companies do business – helping them become faster, smarter, safer, and more efficient.

Read More
news image

Why Wi-Fi 6 goeshand-in-hand with cellular to enable thehyper-connected enterprise future

whitePaper | August 22, 2022

Wi-Fi 6 is increasingly seen as a complementary to cellular technologies such as LTE-M and even 5G –when it becomes widely available. In private networks, the performance uplift of Wi-Fi 6 over Wi-Fi 5 is substantial and more than sufficient to support innovative use cases such as automated guided vehicles, industrial robots and many other applications.

Read More

Spotlight

Definitive Logic

Definitive Logic serves as trusted advisors to our government and commercial clients, providing objective, no-nonsense, vendor- and technology- neutral IT and management consulting services. Our comprehensive services help our clients use technology and data to maximize their performance and business processes. We employ high-caliber individuals that solve real business challenges through expert financial management, real estate and health IT solutions.

Events