Mapping of IoT Security Recommendations Guidance and Standards To CoP Oct 2018 PDF
Mapping of IoT Security Recommendations Guidance and Standards To CoP Oct 2018 PDF
October 2018
Department for Digital, Culture, Media and Sport 2
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for
Consumer IoT Security
Contents
Executive summary 3
Mapping statistics 6
Executive summary
This document maps the Code of Practice for Consumer IoT Security against published
standards, recommendations and guidance on IoT security and privacy from around the
world.1 Around 100 documents were reviewed from nearly 50 organisations. Whilst not
exhaustive, it represents one of the largest collections of guidance available to date in this
area.
The purpose of the mapping is to serve as a reference and tool for users of the Code of
Practice. Manufacturers and other organisations are already implementing a range of
standards, recommendations and guidance and will seek to understand the relationship
between the Code of Practice and existing material from industry and other interested
parties. The mapping makes that exercise easier and, therefore, implementation of the Code
of Practice more straightforward.
The mapping represents a snapshot in time. Security guidance across the IoT is rapidly
evolving. Whilst gathering the information, it was observed that some organisations have
merged and others are developing their work further, issuing updated versions regularly.
The intention was not to map the entire global technical standards and recommendations
space. The mapping was limited in scope to the documentation that claims to be IoT security
and privacy related. This means that the mapping does not include those standards and
regulations which might be classified as foundational or which underpin the IoT standards,
such as the General Data Protection Regulation (GDPR). Also, due to the variance in styles
between recommendations, functional equivalence is not possible and so the mappings
should be read as indicative only.
A separate mapping also identifies the relationships between organisations and material
based on common external references that have been used in their documentation. This
also gives an indication of references in specifications and guidance which may not be
specific to IoT.
The raw data of both the Code of Practice and the reference material mappings are also
available as open data in JavaScript Object Notation (JSON) format.2 This enables
organisations to use it within their own development processes.
The scope of the exercise was primarily contained to consumer-focused IoT, but there is a
large amount of crossover with other IoT domains such as automotive and medical
recommendations. This demonstrates that there is significant alignment for security and
privacy across different IoT domains of interest. Guidance, such as ‘I Am The Cavalry’s’
Hippocratic Oath for Connected Medical Devices, contain many recommendations which
would be regarded as relevant to consumer devices and services too.4 Where these
recommendations do not directly refer to medical devices, they have been included in the
mapping.
During the course of this mapping exercise, it was noted that some organisations had
already merged and some standards or recommendations were not accessible due to them
not being public documents. For example, the Online Trust Alliance (OTA) has merged with
the Internet Society (ISOC) and the AllSeen Alliance has merged with the Open Connectivity
Foundation (OCF). Some of the lists and documents that were investigated contained
broken links and older versions of material.
3 Material published after this date was not included, notably the ‘IoT Cybersecurity Certification
Program’ which was announced by CTIA, a US wireless industry association, in August 2018,
https://www.ctia.org/news/wireless-industry-announces-internet-of-things-cybersecurity-certification-
program
4 I Am The Cavalry, 2016, ‘Hippocratic Oath for Connected Medial Devices’,
https://www.iamthecavalry.org/domains/medical/oath/
Department for Digital, Culture, Media and Sport 5
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for
Consumer IoT Security
The living list of IoT Security and Privacy resources, maintained by David Rogers and
Copper Horse Solutions Ltd,5
Bruce Schneier’s Security and Privacy Guidelines for the Internet of Things,6
NTIA’s IoT security standards catalogue,7
W3C’s Web of Things project’s reference to existing best practices in related fields.8
Some of the documentation and guidance was judged to be out-of-scope, for example
recommendations that focused on the automotive sector. This data is retained for reference
in the mapping JSON file. The material that is referenced is largely at the same ‘level’ as the
Code of Practice - that is, requirements and guidance rather than bit-level specifications.
This avoided creating dependencies on other aspects as well as technology specific
references. Also included are other commonly referenced documents such as the US
Senate Bill: S.1691 - Internet of Things (IoT) Cybersecurity Improvement Act of 2017 and
industry whitepapers.9
Recommendations were mapped against the 13 guidelines in the Code of Practice. This
means that recommendations outside of that are deemed beyond the scope of this mapping.
Implementing a secure development lifecycle is seen as fundamental to meeting the Code of
Practice. Examples of documentation that can assist in this domain include the Fundamental
Practices for Secure Software Development developed by the SAFECode Forum,10 and
ISO/IEC 29147 for Coordinated Vulnerability Disclosure which is referenced in the Code of
Practice.
Also fundamental to meeting the Code of Practice are the already existing laws and
regulation related to data protection, security and consumer safety.
https://www.schneier.com/blog/archives/2017/02/security_and_pr.html
7 NTIA, 2017, ‘Multistakeholder Process; Internet of Things (IoT) Security Upgradability and Patching’,
https://www.ntia.doc.gov/other-publication/2016/multistakeholder-process-iot-security
8 W3C, 2017, ‘Web of Things (WoT) Security and Privacy Considerations’,
https://www.w3.org/TR/wot-security/#existing-security-best-practices-in-related-fields
9 US Congress, 2017, ‘Internet of Things (IoT) Cybersecurity Improvement Act of 2017’,
https://www.congress.gov/bill/115th-congress/senate-bill/1691
10 SAFECode Forum, 2011, ‘Fundamental Practices for Secure Software Development’,
http://safecode.org/wp-content/uploads/2014/09/SAFECode_Dev_Practices0211.pdf
Department for Digital, Culture, Media and Sport 6
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for
Consumer IoT Security
Mapping statistics
Across the entire Code of Practice, the following organisations and standards map to the
CoP guidance. The consolidated mapping data is available within the open data JSON file.
The most closely mapped recommendation across the Code of Practice was the IoT Security
Foundation’s IoT Security Compliance Framework 1.1. Also, a wide-range of
recommendations were mapped from the European Union Agency for Network and
Information Security (ENISA), GSMA, the Industrial Internet Consortium (IIC) and the Open
Web Application Security Project (OWASP). Some organisations split their
recommendations across a number of documents, which are also listed below.
Total number of
recommendations
mapped Organisation Standard / recommendation name
IoT Security Compliance Framework
159 IoT Security Foundation 1.1
European Union Agency for Network Baseline Security Recommendations
66 and Information Security (ENISA) for IoT
Industrial Internet of Things
55 Industrial Internet Consortium (IIC) Volume G4: Security Framework v1.0
IoT Security Guidelines Endpoint
39 GSMA Ecosystem
Open Web Application Security Project
37 (OWASP) IoT Security Guidance
33 IoT Security Initiative Security Design Best Practices
IoT Security & Privacy Trust
32 Online Trust Alliance (OTA) Framework v2.5
IoT Security Guidelines for Service
29 GSMA Ecosystems
Broadband Internet Technical Advisory Internet of Things (IoT) Security and
20 Group (BITAG) Privacy Recommendations
Security Guidance for Early Adopters
19 Cloud Security Alliance (CSA) of the Internet of Things (IoT)
Best Current Practices (BCP) for IoT
19 Internet Engineering Task Force (IETF) Devices
TR-0008-V2.0.1 Security (Technical
19 oneM2M Report)
US National Institute of Standards and NIST SP.800-160 Systems Security
17 Technology (NIST) Engineering
European Union Agency for Network Security and Resilience of Smart Home
16 and Information Security (ENISA) Environments
S.1691 - Internet of Things (IoT)
Cybersecurity Improvement Act of
14 US Senate 2017 (Bill)
13 IoT Security Initiative CyberSecurity Principles of IoT
Department for Digital, Culture, Media and Sport 7
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for
Consumer IoT Security
Total number of
recommendations
mapped Organisation Standard / recommendation name
Multistakeholder Process; Internet of
US National Telecommunications and Things (IoT) Security Upgradability and
13 Information Administration (NTIA) Patching
12 Microsoft IoT Security Best Practices
Strategic Principles for Securing The
12 U.S. Department of Homeland Security Internet of Things (IoT)
11 CableLabs A Vision for Secure IoT
11 Open Connectivity Foundation (OCF) OIC Security Specification v1.1.1
Future-proofing the connected world:
10 Cloud Security Alliance (CSA) 13 steps to Developing Secure IoT
Vulnerability Disclosure Best Practice
10 IoT Security Foundation Guidelines
Internet Research Task Force (IRTF)
Thing-to-Thing Research Group State-of-the-Art and Challenges for the
9 (T2TRG) Internet of Things Security
The CEO’s Guide to Securing the
8 AT&T Internet of Things
IoT Security Principles and Best
8 IEEE Practices
Alliance for Internet of Things Workshop on Security and Privacy in
6 Innovation (AIOTI) the Hyper connected World
International Electrotechnical IoT 2020: Smart and secure IoT
6 Commission (IEC) platform
Object Management Group (OMG)
Cloud Standards Customer Council
6 (CSCC) Cloud Customer Architecture for IoT
City of New York (NYC) Guidelines for
5 the Internet of Things Privacy + Transparency
5 GSMA GSMA IoT Security Assessment
Hippocratic Oath for Connected
5 I am the Cavalry Medical Devices
The Internet of Things: An Internet
5 Internet Society (ISOC) Society Public Policy Briefing
An Internet of Things Security
5 Symantec Reference Architecture
Atlantic Council Scowcroft Center for Smart Homes and the Internet of
4 Strategy and Security Things
City of New York (NYC) Guidelines for
4 the Internet of Things Security
Report on Workshop on Security &
4 European Commission and AIOTI Privacy in IoT
Policy Framework for the Internet of
4 Intel Things (IoT)
Department for Digital, Culture, Media and Sport 8
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for
Consumer IoT Security
Total number of
recommendations
mapped Organisation Standard / recommendation name
Open Web Application Security Project OWASP Secure Coding Practices
4 (OWASP) Quick Reference Guide
IERC-European Research Cluster on IoT Governance, Privacy and Security
3 the Internet of Things (IERC) Issues - IERC Position Paper
Dos and Don’ts of Client Authentication
3 MIT Laboratory for Computer Science on the Web
Alliance for Internet of Things AIOTI Digitisation of Industry Policy
2 Innovation (AIOTI) Recommendations
Alliance for Internet of Things Digitisation of Industry Policy
2 Innovation (AIOTI) Recommendations
IoT Security Guidelines for Network
2 GSMA Operators
Software and Information Industry Empowering the Internet of Things:
2 Association (SIIA) Benefits
Web of Things (WoT) Security and
2 W3C Privacy Considerations
Atlantic Council Scowcroft Center for Smart Homes and the Internet of
1 Strategy and Security Things (issue brief)
Future-proofing the connected world:
1 Cloud Security Alliance (CSA) 13 steps to Developing Secure IoT
1 GSMA Analytics-based Security
GSMA Coordinated Vulnerability
1 GSMA Disclosure Programme (CVD)
Connected Consumer Secure Design
1 IoT Security Foundation Best Practice Guidelines
Realizing the Potential of the Internet of
Telecommunications Industry Things: Recommendations to Policy
1 Association (TIA) Makers
Web of Things (WoT) Security and Minimize Network Interface
1 Privacy Considerations Functionality
Department for Digital, Culture, Media and Sport 9
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for
Consumer IoT Security
The data of this reference mapping is available in an open data JSON file which can be used
for further study. It is available on https://iotsecuritymapping.uk, which also hosts a
visualisation of this mapping.
The copyright of the original material quoted in the mapping remains that of the original
authors.
Department for Digital, Culture, Media and Sport 10
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
The CEO’s Guide Rather than permitting an easy-to-hack default password, each
to Securing the No default device should require the user to define a unique and reasonably https://www.business.att.com/cybersec
AT&T Internet of Things password secure password for access from a network interface. urity/docs/exploringiotsecurity.pdf
Security Guidance If your organization is writing your own applications, use appropriate https://downloads.cloudsecurityalliance
for Early Adopters authentication and authorization mechanisms. Scan for any .org/whitepapers/Security_Guidance_f
Cloud Security of the Internet of 5.3.2 first bullet passwords left in the clear in the application code (e.g. hardcoded or_Early_Adopters_of_the_Internet_of
Alliance (CSA) Things (IoT) point telnet logins or passwords that were left behind during testing). _Things.pdf
European
Union Agency
for Network
and Authentication mechanisms must use strong passwords or
Information Baseline Security personal identification numbers (PINs), and should consider using https://www.ENISA.europa.eu/publicati
Security Recommendations two-factor authentication (2FA) or multi-factor authentication (MFA) ons/baseline-security-
(ENISA) for IoT GP-TM-23 like Smartphones, Biometrics, etc., and certificates. recommendations-for-iot
European
Union Agency Ensure password recovery or reset mechanism is robust
for Network Baseline Security and does not supply an attacker with information indicating a valid https://www.ENISA.europa.eu/publicati
and Recommendations account. The same applies to key update and recovery ons/baseline-security-
Information for IoT GP-TM-26 mechanisms. recommendations-for-iot
Department for Digital, Culture, Media and Sport 11
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Security
(ENISA)
European
Union Agency
for Network
and
Information Baseline Security Avoid provisioning the same secret key in an entire https://www.ENISA.europa.eu/publicati
Security Recommendations product family, since compromising a single device would be ons/baseline-security-
(ENISA) for IoT GP-TM-49 enough to expose the rest of the product family. recommendations-for-iot
European
Union Agency
for Network
and Security and
Information Resilience of Smart Identification, authentication, authorization: strong authentication
Security Home methods must be used, as well as access control mechanisms. https://www.ENISA.europa.eu/publicati
(ENISA) Environments 5.2, fifth bullet point Passwords and sessions should be managed accordingly. ons/security-resilience-good-practices
IoT Security
Guidelines for Enforce Strong Password Policy. It is imperative that all https://www.gsma.com/iot/wp-
Service authentication systems enforce strong passwords where passwords content/uploads/2017/10/CLP.12-
GSMA Ecosystems CLP12_6.11 are required for user authentication. v2.0.pdf
IoT Security
Guidelines https://www.gsma.com/iot/wp-
Endpoint content/uploads/2017/10/CLP.13-
GSMA Ecosystem CLP13_6.9 Endpoint Password Management v2.0.pdf
Department for Digital, Culture, Media and Sport 12
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
IoT Security
Guidelines Where passwords are used, enforce the use of passwords that https://www.gsma.com/iot/wp-
Endpoint conform to best practices regarding password complexity and content/uploads/2017/10/CLP.13-
GSMA Ecosystem CLP13_6.12 length v2.0.pdf
IoT devices should not use easy-to-guess username/password
credentials, such as admin/admin. Devices should not use default
credentials that are invariant across multiple devices and should not
include back doors and debug-mode settings (secret credentials
established by the device's programmer) because, once guessed,
they can be used to hack many devices.
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
A device that supports authentication SHOULD NOT be shipped in
a
condition that allows an unauthenticated client to use any function
of the device that requires authentication, or to change that
device's authentication credentials.
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Internet
Research
Task Force
(IRTF) Thing-
to-Thing State-of-the-Art and Flaws in the design and implementation of IoT devices and
Research Challenges for the networks can lead to security vulnerabilities. A common flaw is the
Group Internet of Things use of well-known or easy-to-guess passwords for configuration of https://datatracker.ietf.org/doc/draft-irtf-
(T2TRG) Security 5.11 IoT devices. t2trg-iot-seccons/
https://www.iotsecurityfoundation.org/w
IoT Security Where a wireless interface has an initial pairing process, the p-content/uploads/2017/12/IoT-
IoT Security Compliance passkeys are changed from the factory issued or reset password Security-Compliance-
Foundation Framework 1.1 2.4.7.9 prior to providing normal service. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance Where WPA2 WPS is used it has a unique, random key per device Security-Compliance-
Foundation Framework 1.1 2.4.7.11 and enforces exponentially increasing retry attempt delays. Framework_WG1_2017.pdf
Department for Digital, Culture, Media and Sport 15
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security Where a user interface password is used for login authentication, p-content/uploads/2017/12/IoT-
IoT Security Compliance the factory issued or reset password is unique to each device in the Security-Compliance-
Foundation Framework 1.1 2.4.8.3 product family. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance Security-Compliance-
Foundation Framework 1.1 2.4.8.4 The product does not accept the use of null or blank passwords. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance The product will not allow new passwords containing the user Security-Compliance-
Foundation Framework 1.1 2.4.8.5 account name with which the user account is associated. Framework_WG1_2017.pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
The product supports having any or all of the factory default user
login passwords, altered prior to normal service. This is to avoid the https://www.iotsecurityfoundation.org/w
IoT Security type of attacks where factory default logins and passwords are p-content/uploads/2017/12/IoT-
IoT Security Compliance published on the web, which allows attackers to mount very simple Security-Compliance-
Foundation Framework 1.1 2.4.8.13 scanning and dictionary attacks on devices. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security Where a web user interface password is used for login p-content/uploads/2017/12/IoT-
IoT Security Compliance authentication, the initial password or factory reset password is Security-Compliance-
Foundation Framework 1.1 2.4.10.4 unique to each device in the product family. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security Where an application’s user interface password is used for login p-content/uploads/2017/12/IoT-
IoT Security Compliance authentication, the initial password or factory reset password is Security-Compliance-
Foundation Framework 1.1 2.4.11.1 unique to each device in the product family. Framework_WG1_2017.pdf
Department for Digital, Culture, Media and Sport 17
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
IoT Security Security Design Do not code in "secret” login bypasses/access methods – even if https://www.iotsi.org/security-best-
Initiative Best Practices just for seemingly temporary Dev/Test purposes. practices
IoT Security Security Design If creating default credentials, create quality randomized and unique https://www.iotsi.org/security-best-
Initiative Best Practices passwords/symmetric-keys. practices
Include strong authentication by default, including providing unique,
system-generated or single use passwords; or alternatively use
IoT Security & secure certificate credentials. As necessary, require use of unique https://otalliance.org/system/files/files/i
Online Trust Privacy Trust passwords for administrative access, delineating between devices nitiative/documents/iot_trust_framewor
Alliance (OTA) Framework v2.5 13 and services and the respective impact of factory resets. k6-22.pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Open Web
Application
Security
Project IoT Security I6: Insecure Cloud https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Interface Ensure that users have the option to require strong passwords Security_Guidance
Open Web
Application
Security
Project IoT Security I7: Insecure Mobile https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Interface Ensure that any mobile application disallows weak passwords Security_Guidance
Open Web
Application
Security
Project IoT Security I7: Insecure Mobile https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Interface Ensure that users have the option to require strong passwords Security_Guidance
Open Web
Application
Security I8: Insufficient Ensure password security options are made available (e.g.
Project IoT Security Security Enabling 20 character passwords or enabling two-factor https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Configurability authentication) Security_Guidance
Enable security by default through unique, hard to crack default
user names and passwords. User names and passwords for IoT
devices supplied by the manufacturer are often never changed by
the user and are easily cracked. Botnets operate by continuously
U.S. Strategic Principles scanning for IoT devices that are protected by known factory default https://www.dhs.gov/sites/default/files/
Department of for Securing The user names and passwords. Strong security controls should be publications/Strategic_Principles_for_S
Homeland Internet of Things something the industrial consumer has to deliberately disable rather ecuring_the_Internet_of_Things-2016-
Security (IoT) than deliberately enable. 1115-FINAL....pdf
Department for Digital, Culture, Media and Sport 19
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
IN GENERAL.—A clause that requires the contractor providing the
Internet-connected device to provide written certification that the
S.1691 - Internet of device
Things (IoT)
Cybersecurity https://www.congress.gov/bill/115th-
Improvement Act of SEC.3 (a) (1) (A) (i) (IV) does not include any fixed or hard-coded credentials used for congress/senate-
US Senate 2017 (Bill) (IV) remote administration, the delivery of updates, or communication. bill/1691/text?format=txt
Department for Digital, Culture, Media and Sport 20
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Report on
Alliance for Workshop on https://aioti-space.org/wp-
Internet of Security and Accountability & Any data controller and processor to be accountable for regulatory, content/uploads/2017/03/AIOTI-
Things Privacy in the Risk Impact contractual and ethical compliance. If data is compromised, Workshop-on-Security-and-Privacy-in-
Innovation Hyper connected Assessment by disclosed, accessed or lost, clear statement by vendors, data the-Hyper-connected-World-Report-
(AIOTI) World Design controllers and data processors on impact is another prerequisite. 20160616_vFinal.pdf
Report on
Alliance for Workshop on Basic https://aioti-space.org/wp-
Internet of Security and Requirements on content/uploads/2017/03/AIOTI-
Things Privacy in the IoT HARDWARE Workshop-on-Security-and-Privacy-in-
Innovation Hyper connected AND Sharing information about incidents/potential vulnerabilities the-Hyper-connected-World-Report-
(AIOTI) World COMPONENTS between manufacturers 20160616_vFinal.pdf
Report on
Alliance for Workshop on https://aioti-space.org/wp-
Internet of Security and content/uploads/2017/03/AIOTI-
Things Privacy in the Basic Data should be encrypted on the application layer. End-to-End Workshop-on-Security-and-Privacy-in-
Innovation Hyper connected Requirements on Security, cryptographic principles and key management are the-Hyper-connected-World-Report-
(AIOTI) World APPLICATIONS extremely important and should be carefully described. 20160616_vFinal.pdf
Department for Digital, Culture, Media and Sport 21
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Atlantic
Council
Scowcroft
Center for Smart Homes and A published policy accepting help from willing allies acting in good http://www.atlanticcouncil.org/images/p
Strategy and the Internet of faith, such as customers and security researchers, who find and ublications/Smart_Homes_0317_web.
Security Things report flaws. pdf
Broadband
Internet
Technical Internet of Things http://www.bitag.org/documents/BITAG
Advisory (IoT) Security and Bug reporting system. Manufacturers should provide a bug _Report_-
Group Privacy reporting system with a well-defined bug submission mechanisms _Internet_of_Things_(IoT)_Security_a
(BITAG) Recommendations 7.1 and documented response policy. nd_Privacy_Recommendations.pdf
Broadband
Internet
Technical Internet of Things http://www.bitag.org/documents/BITAG
Advisory (IoT) Security and Report discovery and remediation of software vulnerabilities. _Report_-
Group Privacy Manufacturers should report discovery and remediation of software _Internet_of_Things_(IoT)_Security_a
(BITAG) Recommendations 7.10 vulnerabilities that pose security or privacy threats to consumers. nd_Privacy_Recommendations.pdf
Broadband
Internet Vulnerability reporting process. Manufacturers should provide a
Technical Internet of Things vulnerability reporting process with a welldefined, easy-to-locate, http://www.bitag.org/documents/BITAG
Advisory (IoT) Security and and secure vulnerability reporting form, as well as a documented _Report_-
Group Privacy response policy. Manufacturers should consider compliance with _Internet_of_Things_(IoT)_Security_a
(BITAG) Recommendations 7.10 ISO 30111 [108], a standard for vulnerability report handling. nd_Privacy_Recommendations.pdf
Department for Digital, Culture, Media and Sport 22
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Cable operators have widely deployed and continue to improve
systems that are designed to detect compromised customer-owned
devices controlled by botnets. These systems rely on (i) high-
quality, third-party data feeds that identify sources of malicious
traffic on the operator’s network, (ii) DNS based anomaly detection
systems, (iii) NetFlow detection systems that seek to identify
Detection and devices communicating with known command and control servers,
A Vision for Secure Identification and (iv) email metadata to identify compromised customer devices https://www.cablelabs.com/insights/visi
CableLabs IoT Systems originating SPAM on-secure-iot/
An IoT provider should have a well-defined procedure for receiving
reports of security issues for their devices. The procedure should
include status reporting and a timeline to address the problem that
is provided to the individual or entity that submitted the security
vulnerability. At a minimum, the IoT provider should publicly and
prominently disclose an email address, a telephone number, and a
website where security issues can be submitted to the company.
Once there is a remedy to the vulnerability, the IoT provider should
A Vision for Secure Vulnerability have a mechanism to publicly disclose the vulnerability and https://www.cablelabs.com/insights/visi
CableLabs IoT Management associated remedy. on-secure-iot/
Establish procedures for analysing and handling security incidents.
For any incident there should be a response to:
a) confirm the nature and extent of the incident;
European b) take control of the situation;
Union Agency c) contain the incident; and
for Network d) communicate with stakeholders
and
Information Baseline Security https://www.ENISA.europa.eu/publicati
Security Recommendations Establish management procedures in order to ensure a quick, ons/baseline-security-
(ENISA) for IoT GP-OP-05 effective and orderly response to information security incidents recommendations-for-iot
Department for Digital, Culture, Media and Sport 23
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
European Coordinated disclosure of vulnerabilities, including
Union Agency associated security practices to address identified vulnerabilities. A
for Network coordinated disclosure policy should involve developers,
and manufacturers, and service providers, and include information
Information Baseline Security regarding any vulnerabilities reported to a computer security https://www.ENISA.europa.eu/publicati
Security Recommendations incident ons/baseline-security-
(ENISA) for IoT GP-OP-06 response team (CSIRT). recommendations-for-iot
European
Union Agency
for Network Participate in information sharing platforms to report
and vulnerabilities and receive timely and critical information about
Information Baseline Security current cyber threats and vulnerabilities from public and private https://www.ENISA.europa.eu/publicati
Security Recommendations partners. Information sharing is a critical tool in ensuring ons/baseline-security-
(ENISA) for IoT GP-OP-07 stakeholders are aware of threats as they arise. recommendations-for-iot
European
Union Agency
for Network
and Create a publicly disclosed mechanism for vulnerability
Information Baseline Security reports. Bug Bounty programs, for example, rely on crowdsourcing https://www.ENISA.europa.eu/publicati
Security Recommendations methods to identify vulnerabilities that companies’ own internal ons/baseline-security-
(ENISA) for IoT GP-OP-08 security teams may not catch. recommendations-for-iot
Vendors’ awareness
IoT vendors shall keep track of vulnerabilities in other IoT products,
especially in the context of Smart Home Environments. For that
purpose, vendors can hire or train security experts to understand
European security vulnerabilities in IoT, as they can only get worse with a
Union Agency wider adoption of the products. It is also important to consider early
for Network warnings on security issues provided by users and researchers, as
and Security and they contribute to reducing the attack surface on devices and
Information Resilience of Smart services.
Security Home By raising the awareness level of IoT companies to security, https://www.ENISA.europa.eu/publicati
(ENISA) Environments 8.3 product security will be improved and vendors will reduce the ons/security-resilience-good-practices
Department for Digital, Culture, Media and Sport 24
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
threats they face and associated reputation issues. It is particularly
true for vendors with limited experience in security.
GSMA Coordinated
Vulnerability
Disclosure
GSMA Programme (CVD) See GSMA Coordinated Vulnerability Disclosure Programme https://www.gsma.com/security
I acknowledge that vulnerabilities will persist, despite best efforts. I
will invite disclosure of potential safety or security issues, reported
in good faith.
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance A policy has been established for dealing with both internal and Security-Compliance-
Foundation Framework 1.1 2.4.3.5 third party security researcher(s) on the products or services Framework_WG1_2017.pdf
Processes and plans are in place based upon the IoTSF https://www.iotsecurityfoundation.org/w
IoT Security “Vulnerability Disclosure Guidelines” or a similar recognised p-content/uploads/2017/12/IoT-
IoT Security Compliance process to deal with the identification of a security vulnerability or Security-Compliance-
Foundation Framework 1.1 2.4.3.7 compromise when they occur. Framework_WG1_2017.pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security There is a secure notification process based upon the IoTSF p-content/uploads/2017/12/IoT-
IoT Security Compliance “Vulnerability Disclosure Guidelines” or a similar recognised Security-Compliance-
Foundation Framework 1.1 2.4.3.9 process, for notifying partners/users of any security updates. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance As part of the Security Policy develop specific contact web pages Security-Compliance-
Foundation Framework 1.1 2.4.3.11 for Vulnerability Disclosure reporting. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security As part of the Security Policy provide a dedicated security email p-content/uploads/2017/12/IoT-
IoT Security Compliance address and/or secure webform for Vulnerability Disclosure Security-Compliance-
Foundation Framework 1.1 2.4.3.12 communications. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance As part of the Security Policy develop a conflict resolution process Security-Compliance-
Foundation Framework 1.1 2.4.3.13 for Vulnerability Disclosures. Framework_WG1_2017.pdf
Department for Digital, Culture, Media and Sport 28
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance As part of the Security Policy publish the organisation’s conflict Security-Compliance-
Foundation Framework 1.1 2.4.3.13 resolution process for Vulnerability Disclosures. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance As part of the Security Policy develop response steps and Security-Compliance-
Foundation Framework 1.1 2.4.3.14 performance targets for Vulnerability Disclosures. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance As part of the Security Policy develop security advisory notification Security-Compliance-
Foundation Framework 1.1 2.4.3.15 steps. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance The Security Policy shall be compliant with ISO 30111 or similar Security-Compliance-
Foundation Framework 1.1 2.4.3.16 standard. Framework_WG1_2017.pdf
Department for Digital, Culture, Media and Sport 29
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
The following is some proposed text for inclusion on a Vulnerability
Disclosure page on a company website, to be approved by the
company’s legal team. Some companies also choose to specify
what they consider to be unacceptable security research (such as
that which would lead to the disclosure of customer data):
Thank You
Thanks to the following people who have helped make our products https://www.iotsecurityfoundation.org/w
Vulnerability and services more secure by making a coordinated disclosure with p-
IoT Security Disclosure Best us: content/uploads/2017/12/Vulnerability-
Foundation Practice Guidelines 2.2 [Name/alias, Twitter handle]” Disclosure_WG4_2017.pdf
Department for Digital, Culture, Media and Sport 30
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
The email address
securityalert@<companydomain>
or security@<companydomain>
is a de facto standard for researchers who disclose vulnerabilities to
organisations. We recommend that organisations create and
monitor both of these email addresses where possible.
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
It is likely that at some point, there are going to be issues where
both parties disagree. The Organisation for Internet Safety
guidelines [OIS] included recommendations on how to resolve such
conflicts in the context of an organisation’s published vulnerability
disclosure process. In summary:
• Leave the process only after exhausting reasonable efforts to https://www.iotsecurityfoundation.org/w
Vulnerability resolve the disagreement; p-
IoT Security Disclosure Best • Leave the process only after providing notice to the other party; content/uploads/2017/12/Vulnerability-
Foundation Practice Guidelines 2.5 • Resume the process once the disagreement is resolved. Disclosure_WG4_2017.pdf
The text on your security contact web page should state in what
time frame the security researcher can expect a response; this will
typically be a few days, perhaps up to a week. It is good practice to
send an automatic acknowledgement for email sent to the contact
email address including the same details on the expected response
time. The following response should then further clarify https://www.iotsecurityfoundation.org/w
Vulnerability expectations regarding the timing of further communications and, p-
IoT Security Disclosure Best once a problem has been confirmed, in what time frame a patch, fix content/uploads/2017/12/Vulnerability-
Foundation Practice Guidelines 2.6 or other remediation is expected to be made available. Disclosure_WG4_2017.pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Successful vulnerability disclosure management must involve a
nominated responsible person. It is suggested that this should be
the CISO, or a Head of Security Response if one is appointed. In
addition to this, it is recommended that confirmed disclosure emails
sent to the disclosure email address are distributed to a list of
senior staff that should be aware of disclosures that are underway.
The remaining steps should continue as per the standard internal
security incident handling processes of the organisation, with the
added aspects of communicating with the security researcher on a
regular basis to update and possibly asking for additional https://www.iotsecurityfoundation.org/w
Vulnerability information or assistance. The final step is the creation of the p-
IoT Security Disclosure Best security advisory and agreeing the “go public” date with the content/uploads/2017/12/Vulnerability-
Foundation Practice Guidelines 3 researcher. Disclosure_WG4_2017.pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Control Systems (ICS)-CERT, and other CSIRTs provide regular
technical alerts, including after major incidents, which provide
information about vulnerabilities and mitigation.
U.S. Strategic Principles Consider creating a publicly disclosed mechanism for using https://www.dhs.gov/sites/default/files/
Department of for Securing The vulnerability reports. Bug Bounty programs, for example, rely on publications/Strategic_Principles_for_S
Homeland Internet of Things crowdsourcing methods to identify vulnerabilities that companies’ ecuring_the_Internet_of_Things-2016-
Security (IoT) own internal security teams may not catch. 1115-FINAL....pdf
S.1691 - Internet of
Things (IoT) (bb) include any mitigation actions that may limit or eliminate the
Cybersecurity ability for an adversary to exploit the vulnerability; and https://www.congress.gov/bill/115th-
Improvement Act of SEC.3 (a) (1) (A) congress/senate-
US Senate 2017 (Bill) (ii) (II) bill/1691/text?format=txt
Department for Digital, Culture, Media and Sport 35
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
(cc) include a justification for secure use of the device
notwithstanding the persisting vulnerability.
S.1691 - Internet of (III) APPROVAL.—If the head of the purchasing executive agency
Things (IoT) approves the waiver, the head of the purchasing executive agency
Cybersecurity shall provide the contractor a written statement that the executive https://www.congress.gov/bill/115th-
Improvement Act of SEC.3 (a) (1) (A) agency accepts such risks resulting from use of the device with the congress/senate-
US Senate 2017 (Bill) (ii) (III) known vulnerability as represented by the contractor. bill/1691/text?format=txt
B) NOTIFICATION REQUIRED.—A clause that requires the
S.1691 - Internet of contractor providing the Internet-connected device software or
Things (IoT) firmware component to notify the purchasing agency of any known
Cybersecurity security vulnerabilities or defects subsequently disclosed to the https://www.congress.gov/bill/115th-
Improvement Act of vendor by a security researcher or of which the vendor otherwise congress/senate-
US Senate 2017 (Bill) SEC.3 (a) (1) (B) becomes aware for the duration of the contract. bill/1691/text?format=txt
(1) IN GENERAL.—Not later than 60 days after the date of the
enactment of this Act, the National Protection and Programs
Directorate, in consultation with cybersecurity researchers and
S.1691 - Internet of private-sector industry experts, shall issue guidelines for each
Things (IoT) agency with respect to any Internet-connected device in use by the
Cybersecurity United States Government regarding cybersecurity coordinated https://www.congress.gov/bill/115th-
Improvement Act of disclosure requirements that shall be required of contractors congress/senate-
US Senate 2017 (Bill) SEC.3 (b) (1) providing such software devices to the United States Government. bill/1691/text?format=txt
Department for Digital, Culture, Media and Sport 36
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
(2) CONTENTS.—The guidelines required to be issued under
paragraph (1) shall—
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
S.1691 - Internet of
Things (IoT) The Director of NIST shall ensure that NIST establishes, maintains,
Cybersecurity and uses best practices in the identification and tracking of https://www.congress.gov/bill/115th-
Improvement Act of vulnerabilities for purposes of the National Vulnerability Database of congress/senate-
US Senate 2017 (Bill) SEC.4 NIST. bill/1691/text?format=txt
Department for Digital, Culture, Media and Sport 38
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Alliance for
Internet of https://aioti.eu/wp-
Things Digitisation of Promote that over the life cycle of any products and services there content/uploads/2017/03/AIOTI-
Innovation Industry Policy 3.32 (i) Third bullet is regular updating of security measures, including to address Digitisation-of-Ind-policy-doc-Nov-
(AIOTI) Recommendations point emerging threats. 2016.pdf
Every network-connected device should have a means for
authorized operators to update the device’s software and firmware
(e.g. softwareover- the-air/SOTA and firmware-over-the air/FOTA).
The CEO’s Guide Ideally, the updating process will be highly automated while still
to Securing the Software/firmware providing cryptographic checks to allow updates from an authorized https://www.business.att.com/cybersec
AT&T Internet of Things update capability source. urity/docs/exploringiotsecurity.pdf
Atlantic
Council
Scowcroft
Center for Smart Homes and A secure, prompt, and agile response to security or other flaws http://www.atlanticcouncil.org/images/p
Strategy and the Internet of greatly reduces support costs, increases consistency of experience, ublications/Smart_Homes_0317_web.
Security Things and allows feature improvements over time. pdf
IoT Devices Should Ship with Reasonably Current Software.
BITAG recommends that IoT devices should ship to customers or
retail outlets with reasonably current software that does not contain
Broadband severe, known vulnerabilities. However, software bugs are
Internet Internet of Things somewhat of a “fact of life” and it is not uncommon for new http://www.bitag.org/documents/BITAG
Technical (IoT) Security and vulnerabilities to be discovered while devices are on the shelf. _Report_-
Advisory Privacy Hence it is critical for an IoT device to have a mechanism by which _Internet_of_Things_(IoT)_Security_a
Group (BITAG) Recommendations devices receive automatic, secure software updates nd_Privacy_Recommendations.pdf
Department for Digital, Culture, Media and Sport 39
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
IoT Devices Should Have a Mechanism for Automated, Secure
Software Updates. BITAG recommends that manufacturers of IoT
devices or IoT service providers should therefore design their
Broadband devices and systems based on the assumption that new bugs and
Internet Internet of Things vulnerabilities will be discovered over time. They should design http://www.bitag.org/documents/BITAG
Technical (IoT) Security and systems and processes to ensure the automatic update of IoT _Report_-
Advisory Privacy device software, without requiring or expecting any type of user _Internet_of_Things_(IoT)_Security_a
Group (BITAG) Recommendations 7.1 action or even user opt-in. nd_Privacy_Recommendations.pdf
Use Libraries That Are Actively Maintained and Supported.
Many of the recommendations in this report require implementing
secure communications channels. Yet, home-grown
Broadband implementations of cryptographic protocols and secure
Internet Internet of Things communications channels can themselves introduce vulnerabilities. http://www.bitag.org/documents/BITAG
Technical (IoT) Security and BITAG recommends that, when implementing the recommendations _Report_-
Advisory Privacy in this report, device manufacturers use libraries and frameworks _Internet_of_Things_(IoT)_Security_a
Group (BITAG) Recommendations 7.2 that are actively supported and maintained whenever possible. nd_Privacy_Recommendations.pdf
IoT security requires vigilance throughout the life of the device –
vulnerabilities will be discovered and new threats will emerge after
the consumer purchases the device. IoT providers must make
lifecycle management a central consideration in the design of every
connected device and clearly disclose the key considerations to
consumers prior to sale. Specifically, IoT providers must, with
limited exception for ephemeral devices, provide secure,
automated, software updates during the disclosed security support
period. In addition, IoT providers must publicly disclose vulnerability
A Vision for Secure Lifecycle remedies and changes to functionality at end-of-life (EOL)/end-of- https://www.cablelabs.com/insights/visi
CableLabs IoT Management support (EOS). on-secure-iot/
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
the reality that vulnerabilities are discovered in devices after they
are deployed and that software updates can mitigate the risks
associated with these vulnerabilities
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Life cycle controls for IoT edge devices require the management
and monitoring of assets to ensure that they are authorized, and
Security Guidance secure and regularly updated with the latest firmware, software and https://downloads.cloudsecurityalliance
for Early Adopters patches. In addition, organization’s must have a documented .org/whitepapers/Security_Guidance_f
Cloud Security of the Internet of method for securely disposing of IoT assets at the end of the life- or_Early_Adopters_of_the_Internet_of
Alliance (CSA) Things (IoT) 5.5 cycle. Define a life-cycle management approach for IoT devices. _Things.pdf
Making sure that these updates are legitimate and haven’t been
tampered with is just as important as with traditional computing
Security Guidance technology. System Administrators should outline a process for https://downloads.cloudsecurityalliance
for Early Adopters validating the authenticity and integrity of all updates, and ensure .org/whitepapers/Security_Guidance_f
Cloud Security of the Internet of that the end-to-end process for retrieving, storing and then updating or_Early_Adopters_of_the_Internet_of
Alliance (CSA) Things (IoT) 5.5.3.1 IoT devices is secured. _Things.pdf
If the organization is using any third party or open source libraries,
then it is recommended to maintain an inventory of those libraries
and keep them updated. Also, check the version and the
Security Guidance corresponding vulnerabilities in those versions so that you can https://downloads.cloudsecurityalliance
for Early Adopters avoid using those vulnerable versions. This will ensure that security .org/whitepapers/Security_Guidance_f
Cloud Security of the Internet of 5.3.2 first bullet patches can be applied to the third party or open source libraries or_Early_Adopters_of_the_Internet_of
Alliance (CSA) Things (IoT) point used. _Things.pdf
Department for Digital, Culture, Media and Sport 42
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Take care regarding the sources of the update files and how they
were transported. Make sure you scan the files or check for its
integrity prior to installing them into your device. Check the
“reputation” of a file, which can be done in a number of ways. Every
computer file has a unique checksum—a relatively short
Security Guidance mathematical value for the file. Another reputational characteristic https://downloads.cloudsecurityalliance
for Early Adopters of a file is how widely it has been used. Such assessments create a .org/whitepapers/Security_Guidance_f
Cloud Security of the Internet of 5.3.3 first bullet context for the file, indicating whether it is known to be good or bad or_Early_Adopters_of_the_Internet_of
Alliance (CSA) Things (IoT) point or whether it is an unknown risk that should be monitored closely. _Things.pdf
http://ec.europa.eu/information_society
Report on /newsroom/image/document/2017-
European Workshop on 15/final_report_20170113_v0_1_clean
Commission Security & Privacy Life Time Protection – give security, safety and privacy protection _778231E0-BC8E-B21F-
and AIOTI in IoT 1) 5) over the full life time 18089F746A650D4D_44113.pdf
http://ec.europa.eu/information_society
Report on /newsroom/image/document/2017-
European Workshop on 15/final_report_20170113_v0_1_clean
Commission Security & Privacy Updatability – trusted and transparent updates only by authorised _778231E0-BC8E-B21F-
and AIOTI in IoT 1) 6) parties, not by malicious actors 18089F746A650D4D_44113.pdf
Department for Digital, Culture, Media and Sport 43
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
European Control the installation of software on operational
Union Agency systems, to prevent unauthenticated software and files being
for Network loaded
and onto it. In the event that the product is intended to allow
Information Baseline Security unauthenticated https://www.ENISA.europa.eu/publicati
Security Recommendations software, such software should only be run with ons/baseline-security-
(ENISA) for IoT GP-TM-05 limited permissions and/or sandbox. recommendations-for-iot
European
Union Agency
for Network
and
Information Baseline Security GP-TM-06: Restore Secure State - Enable a system to return to a https://www.ENISA.europa.eu/publicati
Security Recommendations state that was known to be secure, after a security breach has ons/baseline-security-
(ENISA) for IoT GP-TM-06 occured or if an upgrade has not been successful. recommendations-for-iot
Ensure the device software/firmware, its configuration
and its applications have the ability to update Over-The-Air (OTA),
that the update server is secure, that the update file is transmitted
via a secure connection, that it does not contain sensitive data (e.g.
hardcoded credentials), and that it is signed by an authorised trust
entity and encrypted using accepted encryption methods, and that
the update package has its digital signature, signing certificate and
European signing certificate chain, verified by the device before the update
Union Agency process begins.
for Network
and
Information Baseline Security Failing to build in OTA update capabilities will leave devices https://www.ENISA.europa.eu/publicati
Security Recommendations exposed ons/baseline-security-
(ENISA) for IoT GP-TM-18 to threats and vulnerabilities for the entirety of their lifetimes recommendations-for-iot
Department for Digital, Culture, Media and Sport 44
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
European
Union Agency Offer an automatic firmware update mechanism. Devices
for Network should be configured to check for the existence of firmware updates
and at frequent intervals. Automatic firmware updates should be
Information Baseline Security enabled https://www.ENISA.europa.eu/publicati
Security Recommendations by default. A device may offer an option to disable automatic ons/baseline-security-
(ENISA) for IoT GP-TM-19 firmware updates and require authentication for it. recommendations-for-iot
European
Union Agency Backward compatibility of firmware updates. Automatic
for Network firmware updates should not change network protocol interfaces in
and any way that is incompatible with previous versions. Updates and
Information Baseline Security patches should not modify user-configured preferences, security, https://www.ENISA.europa.eu/publicati
Security Recommendations and/or privacy settings without user notification. Users should have ons/baseline-security-
(ENISA) for IoT GP-TM-20 the ability to approve, authorise or reject updates. recommendations-for-iot
European
Union Agency Develop an end-of-life strategy for IoT products. Security
for Network patches and updates will eventually be discontinued for some IoT
and devices. Therefore, developers should prepare and communicate a
Information Baseline Security product sunset plan from the initial stages to ensure that https://www.ENISA.europa.eu/publicati
Security Recommendations manufacturers and consumers are aware of the risks posed to a ons/baseline-security-
(ENISA) for IoT GP-OP-01 device beyond its expected expiry date recommendations-for-iot
European
Union Agency
for Network
and Disclose the duration and end-of-life security and patch
Information Baseline Security support (beyond product warranty). Such disclosures should be https://www.ENISA.europa.eu/publicati
Security Recommendations aligned to the expected lifespan of the device and communicated to ons/baseline-security-
(ENISA) for IoT GP-OP-02 the consumer prior to purchase. recommendations-for-iot
Department for Digital, Culture, Media and Sport 45
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
European
Union Agency Monitor the performance and patch known vulnerabilities
for Network up until the “end-of-support|” period of of a product’s lifecycle. Due
and to the limited life cycle of many IoT devices, critical, publicly known
Information Baseline Security security or privacy bugs will pose a risk to consumers using https://www.ENISA.europa.eu/publicati
Security Recommendations outdated ons/baseline-security-
(ENISA) for IoT GP-OP-03 devices. recommendations-for-iot
Security updates provide protection against vulnerabilities found
during the life of a device or application. However this comes at a
cost, since support of this functionality also provides an entry point
for an attacker. In particular vendors should:
• Provide automatic and timely security updates.
European • Protect the updates (typically via encryption and digital
Union Agency signature). The update files must not contain sensitive data. The
for Network signature must be verified before the update is applied.
and Security and • Protect the application of an update on the device. An
Information Resilience of Smart attacker should not be able to trigger a firmware installation without
Security Home an authorization. https://www.ENISA.europa.eu/publicati
(ENISA) Environments 7.2.2 • Protect the security update interface against attacks. ons/security-resilience-good-practices
IoT Security
Guidelines https://www.gsma.com/iot/wp-
Endpoint content/uploads/2017/10/CLP.13-
GSMA Ecosystem CLP13_7.4 Over The Air Application Updates v2.0.pdf
Every system that is deployed by an organization, and every tier
used, has a lifetime. Even if
the same product or service is deployed by the organization for
decades, the technologies
used to drive that product or service will change. Thus, there must
IoT Security not only be a plan for
Guidelines for designing and implementing the product or service, there must be a https://www.gsma.com/iot/wp-
Service plan to sunset that content/uploads/2017/10/CLP.12-
GSMA Ecosystems CLP12_5.10 product or service. v2.0.pdf
Department for Digital, Culture, Media and Sport 46
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Updating an execution environment, application image, or TCB is a
challenging process. Consider the following example model that
simplifies the overall process:
• For each layer of the execution platform, define a network
resource such as a unique URL for the new application image
• Generate a signing key for each specific layer
• For all new, authorized versions of each layer, generate an image
of that layer
• Include metadata describing the image (version, timestamp,
identity, etc.) in the layer image
• Sign the layer image with the signing key
• Make the image, the signature, and the public key available,
possibly via the unique network resource, or through a update
service
When a new system is deployed it should:
IoT Security • For each layer:
Guidelines for o Retrieve the version(s) to be deployed https://www.gsma.com/iot/wp-
Service o Cryptographically verify the image content/uploads/2017/10/CLP.12-
GSMA Ecosystems CLP12_6.6 o Deploy the image layer on the system v2.0.pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Industrial Industrial Internet ENDPOINT PROTECTION. Endpoint Secure Configuration and https://www.iiconsortium.org/pdf/IIC_P
Internet of Things 7.3 management controls updates of security policy and configuration UB_G4_V1.00_PB-3.pdf
Department for Digital, Culture, Media and Sport 48
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Consortium Volume G4: at the endpoint, including upgrades and patches of known
(IIC) Security vulnerabilities.
Framework v1.0
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
vulnerabilities that affect the integrity of the over-the-air process
should be addressed first.
Especially for any device for which a firmware update would disrupt
operation, the device SHOULD be configurable to allow the
operator to
control the timing of firmware updates.
Internet
Engineering Best Current If enabling or disabling or changing the timing of the automatic
Task Force Practices (BCP) for update feature is controlled by a network protocol, the device MUST https://tools.ietf.org/html/draft-moore-
(IETF) IoT Devices 2.4.2 require authentication of any request to control those features. iot-security-bcp-01
Automatic firmware updates SHOULD NOT change network
protocol
Internet interfaces in any way that is incompatible with previous versions. A
Engineering Best Current vendor MAY offer firmware updates which add new features as long
Task Force Practices (BCP) for as https://tools.ietf.org/html/draft-moore-
(IETF) IoT Devices 2.4.3 those updates are not automatically initiated. iot-security-bcp-01
Department for Digital, Culture, Media and Sport 50
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
To prevent widespread simultaneous failure of all instances of a
Internet particular kind of device due to a bug in a new firmware release,
Engineering Best Current automatic firmware updates SHOULD be phased-in over a short
Task Force Practices (BCP) for time https://tools.ietf.org/html/draft-moore-
(IETF) IoT Devices 2.4.4 interval rather than updating all devices at once iot-security-bcp-01
Firmware updates MUST be authenticated and the integrity of such
updates assured before the update is installed. Unauthenticated
updates or updates where the authentication or integrity checking
fails MUST be rejected.
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Internet
Research Task IoT devices are often expected to stay functional for several years
Force (IRTF) and decades even though they might operate unattended with
Thing-to-Thing State-of-the-Art direct Internet connectivity. Software updates for IoT devices are
Research and Challenges for therefore not only required for new functionality, but also to
Group the Internet of eliminate security vulnerabilities due to software bugs, design flaws, https://datatracker.ietf.org/doc/draft-irtf-
(T2TRG) Things Security 5.4 or deprecated algorithms. t2trg-iot-seccons/
Like all commercial devices, IoT devices have a given useful
lifetime. The term end-of-life (EOL) is used by vendors or network
Internet operators to indicate the point of time in which they limit or end
Research Task support for the IoT device. This may be planned or unplanned (for
Force (IRTF) example when the manufacturer goes bankrupt, when the vendor
Thing-to-Thing State-of-the-Art just decides to abandon a product, or when a network operator
Research and Challenges for moves to a different type of networking technology). A user should
Group the Internet of still be able to use and perhaps even update the device. This https://datatracker.ietf.org/doc/draft-irtf-
(T2TRG) Things Security 5.5 requires for some form of authorization handover. t2trg-iot-seccons/
https://www.iotsecurityfoundation.org/w
IoT Security Where remote software upgrade can be supported by the device, p-content/uploads/2017/12/IoT-
IoT Security Compliance there should be a published /transparent and auditable policy and Security-Compliance-
Foundation Framework 1.1 2.4.3.25 schedule of actions to fix any vulnerabilities found. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security Where remote software upgrade can be supported by the device, p-content/uploads/2017/12/IoT-
IoT Security Compliance the software images are digitally signed by the organisation’s Security-Compliance-
Foundation Framework 1.1 2.4.5.2 approved signing authority. Framework_WG1_2017.pdf
Department for Digital, Culture, Media and Sport 52
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security A software update package has its digital signature, signing p-content/uploads/2017/12/IoT-
IoT Security Compliance certificate and signing certificate chain verified by the device before Security-Compliance-
Foundation Framework 1.1 2.4.5.3 the update process begins. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance If remote software upgrade is supported by a device, software Security-Compliance-
Foundation Framework 1.1 2.4.5.4 images shall be encrypted whilst being transferred to it. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance The product has protection against reverting the software to an Security-Compliance-
Foundation Framework 1.1 2.4.5.8 earlier and potentially less secure version. Framework_WG1_2017.pdf
The cryptographic key chain used for signing production software is https://www.iotsecurityfoundation.org/w
IoT Security different from that used for any other test, development or other p-content/uploads/2017/12/IoT-
IoT Security Compliance software images, to prevent the installation of non-production Security-Compliance-
Foundation Framework 1.1 2.4.5.9 software onto production devices. Framework_WG1_2017.pdf
Department for Digital, Culture, Media and Sport 53
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security Development software versions have any debug functionality p-content/uploads/2017/12/IoT-
IoT Security Compliance switched off if the software is operated on the product outside of the Security-Compliance-
Foundation Framework 1.1 2.4.5.11 product vendors’ trusted environment. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security Where remote update is supported, there is an established p-content/uploads/2017/12/IoT-
IoT Security Compliance process/plan for validating and delivering updates on an on-going or Security-Compliance-
Foundation Framework 1.1 2.4.6.2 remedial basis. Framework_WG1_2017.pdf
Implement reliable and securely managed software/firmware update
mechanisms throughout the solution that are link authenticated,
IoT Security Security Design encrypted as needed, and verified for authenticity and integrity https://www.iotsi.org/security-best-
Initiative Best Practices before implementation on system. practices
IoT Security Security Design Ship with, and maintain, security updated open source libraries https://www.iotsi.org/security-best-
Initiative Best Practices used in products and services created. practices
Department for Digital, Culture, Media and Sport 54
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
IoT Security CyberSecurity A device with a system classification of "Gateway" implements https://www.iotsi.org/iot-cybersecurity-
Initiative Principles of IoT PRINCIPLE 16 Remote-Network-Automatic firmware updates. principles
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
deployment. Devices should ship with current software and/or on
first boot push automatic updates to address any known critical
vulnerabilities.
Open Secure download and boot – To prevent the loading and execution
Connectivity of malicious software, where it is practical, it is recommended that
Foundation OIC Security Secure Download and Secure Boot methods that authenticate a https://openconnectivity.org/specs/OIC
(OCF) Specification v1.1.1 15.1.1.3 binary’s source as well as its contents be used. _Security_Specification_v1.1.1.pdf
Open Web
Application
Security
Project IoT Security I9: Insecure Ensure all system devices have update capability and can be https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Software/Firmware updated quickly when vulnerabilities are discovered Security_Guidance
Open Web
Application IoT Security I9: Insecure Ensure update files are encrypted and that the files are also https://www.owasp.org/index.php/IoT_
Security Guidance Software/Firmware transmitted using encryption Security_Guidance
Department for Digital, Culture, Media and Sport 57
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Project
(OWASP)
Open Web
Application
Security
Project IoT Security I9: Insecure Ensure that update files are signed and then validated by the device https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Software/Firmware before installing Security_Guidance
Open Web
Application
Security
Project IoT Security I9: Insecure https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Software/Firmware Ensure update servers are secure Security_Guidance
Open Web
Application
Security
Project IoT Security I9: Insecure https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Software/Firmware Ensure the product has the ability to implement scheduled updates Security_Guidance
IoT systems must have update capabilities built into them from the
beginning. Failing to build in OTA update capabilities will leave
devices exposed to threats and vulnerabilities for the entirety of
their lifetimes. Of course, such update capabilities can be used to
manage device configurations, security content, credentials and
much more. Similarly, such update capabilities can be used to push
functionality and collect telemetry in addition to collecting software
An Internet of inventory information and pushing security patches. However, with
Things Security or without such additional functionality, basic update capabilities https://www.symantec.com/content/da
Reference and the ability to manage the security posture of each device must m/symantec/docs/white-papers/iot-
Symantec Architecture be built into the device from the beginning. security-reference-architecture-en.pdf
Department for Digital, Culture, Media and Sport 58
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
U.S. Strategic Principles Consider ways in which to secure the device over network https://www.dhs.gov/sites/default/files/
Department of for Securing The connections or through automated means. Ideally, patches would publications/Strategic_Principles_for_S
Homeland Internet of Things be applied automatically and leverage cryptographic integrity and ecuring_the_Internet_of_Things-2016-
Security (IoT) authenticity protections to more quickly address vulnerabilities. 1115-FINAL....pdf
Develop an end-of-life strategy for IoT products. Not all IoT devices
U.S. Strategic Principles will be indefinitely patchable and updateable. Developers should https://www.dhs.gov/sites/default/files/
Department of for Securing The consider product sunset issues ahead of time and communicate to publications/Strategic_Principles_for_S
Homeland Internet of Things manufacturers and consumers expectations regarding the device ecuring_the_Internet_of_Things-2016-
Security (IoT) and the risks of using a device beyond its usability date. 1115-FINAL....pdf
Secure System Modification.The principle of secure system
modification states that system modification must maintain system
security with respect to the security requirements and risk tolerance
US National of stakeholders. Upgrades or modifications to systems can
Institute of transform a secure system into an insecure one. The procedures for
Standards and NIST SP.800-160 system modification must ensure that, if the system is to maintain
Technology Systems Security its trustworthiness, the same rigor that was applied to its initial https://nvlpubs.nist.gov/nistpubs/Speci
(NIST) Engineering F.3.3 development is applied to any changes. alPublications/NIST.SP.800-160.pdf
Department for Digital, Culture, Media and Sport 59
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Mitigations: Signing the update payload cryptographically protects
the integrity of the payload, including from undetected intentional
modification by a bad actor. It also provides authenticity in the
provenance of the payload. This is different from a more traditional
approach of using noncryptographic hash such as a cyclic
redundancy check (CRC) or a checksum. These noncryptographic
hashes can validate the integrity against naturally occurring
US National Multistakeholder corruption of the payload, but can be easily subverted by bad
Telecommunic Process; Internet of actors. Similarly, failure to use a strong enough cryptographic
ations and Things (IoT) signature or hash function also fails to completely mitigate these
Information Security risks. For older, weaker hash functions, an attacker with sufficient
Administration Upgradability and motivation and resources could generate a malicious update that https://www.ntia.doc.gov/files/ntia/publi
(NTIA) Patching generated the same hash as the legitimate update. cations/ntia_iot_capabilities_oct31.pdf
US National Multistakeholder
Telecommunic Process; Internet of
ations and Things (IoT) Mitigation: Encryption of the update before transmission and
Information Security decryption of the update on the device can reduce the risk of
Administration Upgradability and exposure during transmission regardless of the communications https://www.ntia.doc.gov/files/ntia/publi
(NTIA) Patching path(s) of the update deliverable. cations/ntia_iot_capabilities_oct31.pdf
US National Multistakeholder Basic Implementation: Transport-layer encryption, such as TLS or
Telecommunic Process; Internet of BLE 4.2+, can provide widely-accepted levels of security between
ations and Things (IoT) the endpoints. Using features such as pinning of certificates in TLS
Information Security can authenticate the source, and user-pairing of devices in BLE can
Administration Upgradability and authenticate endpoints. VPNs also offer confidentiality and integrity https://www.ntia.doc.gov/files/ntia/publi
(NTIA) Patching of data in motion. cations/ntia_iot_capabilities_oct31.pdf
US National Multistakeholder
Telecommunic Process; Internet of
ations and Things (IoT) The device receives the update.
Information Security No design risks are specifically associated with the required step.
Administration Upgradability and However normal good security hygiene practices should be https://www.ntia.doc.gov/files/ntia/publi
(NTIA) Patching followed, such as mitigations against buffer overflow cations/ntia_iot_capabilities_oct31.pdf
Department for Digital, Culture, Media and Sport 60
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Basic implementation: In addition to the signature and encryption
features above, a monotonic versioning system can prevent a
downgrade attack.
US National Multistakeholder Further security considerations: A system capable of disallowing
Telecommunic Process; Internet of previous versions requires an additional step for a manufacturer-
ations and Things (IoT) driven rollback update, and can make user-driven rollbacks more
Information Security complex. Alternatively, the device can securely validate the path
Administration Upgradability and and source of the update to ensure that the older version is not https://www.ntia.doc.gov/files/ntia/publi
(NTIA) Patching coming from an untrustworthy source cations/ntia_iot_capabilities_oct31.pdf
Basic Implementation: Manufacturer should consider the use and
installation of a device to determine the optimal approach to
automatic updates, user control, and uptime criticality.
Depending on the context and use case, there will likely be a need
for a balance between giving a user a choice in the updating of
devices and pushing an update after a period of time for the good of
the user and everyone else on the internet. For more on the
question of end user approval of updates, see “Communicating IoT
Device Security Update Capability to Improve Transparency for
Consumers” by the Working Group on Communicating
Upgradability.
US National Multistakeholder
Telecommunic Process; Internet of
ations and Things (IoT) Further Security Considerations: If the user does not take action to
Information Security update the device, the manufacturer or device administrator may
Administration Upgradability and wish to take further actions at a future date. How to address a non- https://www.ntia.doc.gov/files/ntia/publi
(NTIA) Patching updated device is outside the scope of this document. cations/ntia_iot_capabilities_oct31.pdf
Department for Digital, Culture, Media and Sport 61
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Basic Implementation: Update image remains encrypted and
integrity protected while in motion if traveling across exposed
transport media. Support is provided for multiple of layers of
systems, devices, or CPUs to be targeted.
US National Multistakeholder
Telecommunic Process; Internet of
ations and Things (IoT) Further Security Considerations: The adversary might still be able
Information Security to try to compromise nonexposed internal communication channels.
Administration Upgradability and To address this residual risk, the update image should remain https://www.ntia.doc.gov/files/ntia/publi
(NTIA) Patching encrypted while in motion. cations/ntia_iot_capabilities_oct31.pdf
Similar to the “Check” step above, however this may be performed
on a target in a lower “child” relationship, if a hierarchical
relationship between update targets is implemented.
US National Multistakeholder
Telecommunic Process; Internet of Basic Implementation: Each target validates the integrity of the plain
ations and Things (IoT) text update image using a cryptographic hash signature. Each
Information Security target decrypts its specific update image, if encrypted.
Administration Upgradability and https://www.ntia.doc.gov/files/ntia/publi
(NTIA) Patching cations/ntia_iot_capabilities_oct31.pdf
During this step, any activities necessary to performing the update
on the device can occur, including functions such as erasing flash
US National Multistakeholder memory, placing the device in a “safe mode” of operation, ensuring
Telecommunic Process; Internet of sufficient battery life to complete the operation, etc.
ations and Things (IoT)
Information Security
Administration Upgradability and Basic Implementation: No security features are assumed; https://www.ntia.doc.gov/files/ntia/publi
(NTIA) Patching manufacturer may define them in specific contexts. cations/ntia_iot_capabilities_oct31.pdf
Department for Digital, Culture, Media and Sport 62
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
The actual update process occurs. This includes writing to a file
structure, updating the binary program space in flash memory, etc.
US National Multistakeholder Basic Implementation: Each target vets the integrity of the installed
Telecommunic Process; Internet of update.
ations and Things (IoT)
Information Security
Administration Upgradability and Further Security Considerations: Potentially use cryptographic https://www.ntia.doc.gov/files/ntia/publi
(NTIA) Patching hashing. cations/ntia_iot_capabilities_oct31.pdf
Department for Digital, Culture, Media and Sport 63
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Once the code has been verified, it is actually enabled, and
execution path switches to the new, updated code. No additional
risks are incurred during this step.
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
(C) UPDATES.—A clause that requires such Internet-connected
device software or firmware component to be updated or replaced,
consistent with other provisions in the contract governing the term
S.1691 - Internet of of support, in a manner that allows for any future security
Things (IoT) vulnerability or defect in any part of the software or firmware to be
Cybersecurity patched in order to fix or remove a vulnerability or defect in the https://www.congress.gov/bill/115th-
Improvement Act of software or firmware component in a properly authenticated and congress/senate-
US Senate 2017 (Bill) SEC.3 (a) (1) (C) secure manner. bill/1691/text?format=txt
(D) TIMELY REPAIR.—A clause that requires the contractor to
provide a repair or replacement in a timely manner in respect to any
S.1691 - Internet of new security vulnerability discovered through any of the databases
Things (IoT) described in subparagraph (A)(i)(I) or from the coordinated
Cybersecurity disclosure program described in subsection (b) in the event the https://www.congress.gov/bill/115th-
Improvement Act of vulnerability cannot be remediated through an update described in congress/senate-
US Senate 2017 (Bill) SEC.3 (a) (1) (D) subparagraph (C). bill/1691/text?format=txt
(E) CONTINUATION OF SERVICES.—A clause that requires the
contractor to provide the purchasing agency with general
information on the ability of the device to be updated, such as—
S.1691 - Internet of (iii) formal notification when security support has ceased; and
Things (IoT)
Cybersecurity https://www.congress.gov/bill/115th-
Improvement Act of (iv) any additional information recommended by the National congress/senate-
US Senate 2017 (Bill) SEC.3 (a) (1) (E) Telecommunications and Information Administration. bill/1691/text?format=txt
Department for Digital, Culture, Media and Sport 65
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Broadband
Internet
Technical Internet of Things http://www.bitag.org/documents/BITAG
Advisory (IoT) Security and Encrypt Local Storage of Sensitive Data. BITAG recommends _Report_-
Group Privacy that any sensitive or confidential data (e.g., private key, pre-shared _Internet_of_Things_(IoT)_Security_a
(BITAG) Recommendations 7.2 key, user or facility information) reside in encrypted storage. nd_Privacy_Recommendations.pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Identifying the cryptographic algorithms and key sizes to support
within an IoT device is only one aspect of the cryptographic puzzle.
These algorithms must be able to operate within a trusted
environment and keys must be stored within secure containers.
Within larger systems, designers often employ Hardware Security
Security Guidance Modules (HSM) for key storage and operations, however HSMs are https://downloads.cloudsecurityalliance
for Early Adopters often not viable for the IoT. Instead designers must explore other .org/whitepapers/Security_Guidance_f
Cloud Security of the Internet of options, such as the Trusted Execution Environment (TEE) and or_Early_Adopters_of_the_Internet_of
Alliance (CSA) Things (IoT) 5.4 Trusted Platform Module (TPM). _Things.pdf
Depending on the complexity of the IoT device, many application-
specific data elements may need to be encrypted when not actively
used in executable processes. The device should encrypt these
parameters using a DAR encryption key securely stored in a
physically hardened, locked down cryptographic module resident in
the device. In addition to sensitive application data, all secret and
Security Guidance private keys, authentication, access control and other security https://downloads.cloudsecurityalliance
for Early Adopters configurations should be stored encrypted if possible. DAR security .org/whitepapers/Security_Guidance_f
Cloud Security of the Internet of is designed to protect private information (e.g., medical data) in the or_Early_Adopters_of_the_Internet_of
Alliance (CSA) Things (IoT) 5.4.1.1 event of device theft or loss. _Things.pdf
European
Union Agency Employ a hardware-based immutable root of trust. The Hardware
for Network Root of Trust is a trusted hardware component which receives
and control at power-on. It then extends the chain of trust to other
Information Baseline Security hardware, firmware, and software components. The Root of Trust https://www.ENISA.europa.eu/publicati
Security Recommendations should then be attestable by software agents running within and ons/baseline-security-
(ENISA) for IoT GP-TM-01 throughout the infrastructure. recommendations-for-iot
Ensure a proper and effective use of cryptography to protect the
European confidentiality, authenticity and/or integrity of data and information
Union Agency (including control messages), in transit and in rest. Ensure the
for Network Baseline Security proper selection of standard and strong encryption algorithms and https://www.ENISA.europa.eu/publicati
and Recommendations strong keys, and disable insecure protocols. Verify the robustness ons/baseline-security-
Information for IoT GP-TM-34 of the implementation recommendations-for-iot
Department for Digital, Culture, Media and Sport 68
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Security
(ENISA)
European
Union Agency
for Network
and Cryptographic keys must be securely managed. Encryption is only
Information Baseline Security as robust as the ability for any encryption based system to keep the https://www.ENISA.europa.eu/publicati
Security Recommendations encryption key hidden. Cryptographic key management includes ons/baseline-security-
(ENISA) for IoT GP-TM-35 key generation, distribution, storage, and maintenance. recommendations-for-iot
European
Union Agency
for Network Build devices to be compatible with lightweight encryption and
and security techniques (including entities secure identification, secure
Information Baseline Security configuration, etc.) that can, on the one hand, be usable on https://www.ENISA.europa.eu/publicati
Security Recommendations resource-constrained devices, and, on the other hand, be scalable ons/baseline-security-
(ENISA) for IoT GP-TM-36 so to minimise the management effort and maximise their usability recommendations-for-iot
European
Union Agency Guarantee the different security aspects -confidentiality
for Network (privacy), integrity, availability and authenticity- of the information in
and transit on the networks or stored in the IoT application or in the
Information Baseline Security Cloud, using data encryption methods to minimise network threats https://www.ENISA.europa.eu/publicati
Security Recommendations such as replay, interception, packet sniffing, wiretapping, or ons/baseline-security-
(ENISA) for IoT GP-TM-38 eavesdropping. recommendations-for-iot
European
Union Agency
for Network Baseline Security https://www.ENISA.europa.eu/publicati
and Recommendations Ensure credentials are not exposed in internal or external network ons/baseline-security-
Information for IoT GP-TM-40 traffic. recommendations-for-iot
Department for Digital, Culture, Media and Sport 69
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Security
(ENISA)
https://www.gsma.com/iot/wp-
GSMA IoT Security content/uploads/2017/10/CLP.13-
GSMA Assessment CLP13_6.2 Utilise a Trust Anchor v2.0.pdf
Endpoint devices must be enabled with cryptographically unique
identities to ensure that adversaries, competitors, and hobbyists
can’t impersonate other users or devices in production
IoT Security environments. To accomplish this adequately, the personalization
Guidelines process must be performed at fabrication. This can be done either https://www.gsma.com/iot/wp-
Endpoint through the manufacturer of the particular TCB solution, or during content/uploads/2017/10/CLP.13-
GSMA Ecosystem CLP13_6.6 the Printed Circuit Board Assembly (PCB/A) process. v2.0.pdf
Where possible, processors should use internal CPU memory for
the processing of core secrets and cryptographic keys not
IoT Security contained within a trust anchor. This will ensure that if an adversary
Guidelines is monitoring, or capable of manipulating, the memory bus, they will https://www.gsma.com/iot/wp-
Endpoint not obtain core secrets, but will only see the effects of the use of content/uploads/2017/10/CLP.13-
GSMA Ecosystem CLP13_7.1 these secrets on a running application. v2.0.pdf
IoT Security
Guidelines Do not place private cryptographic components in insecure storage https://www.gsma.com/iot/wp-
Endpoint on Endpoints, such as SSH private keys, TLS private keys, or content/uploads/2017/10/CLP.13-
GSMA Ecosystem CLP13_6.12 passwords Screen reader support enabled. v2.0.pdf
Department for Digital, Culture, Media and Sport 70
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
A cold boot attack is a physical attack strategy against computer
systems that extracts secrets from a running computer by removing
the physical memory from the computer, and placing the memory in
a secondary system controlled by the adversary. The benefit of this
IoT Security attack is that the Attacker can run a custom operating system that
Guidelines dumps the contents of RAM to permanent storage. This will allow https://www.gsma.com/iot/wp-
Endpoint the Attacker to comb through the retrieved data and determine if content/uploads/2017/10/CLP.13-
GSMA Ecosystem CLP13_9.4 there are security related tokens that can be used. v2.0.pdf
An Organizational Root of Trust is a certificate or public-key based
system for authenticating computing platform entities in an
organization. Each computing platform in a Service Ecosystem
must be cryptographically authenticated during network
communications. This diminishes the ability for an insider, or
someone within a privileged network position, to impersonate or
otherwise abuse the trust of a privileged system.
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
CREDENTIAL MANAGEMENT PHASE. After the enrollment
phase, the credential management phase comprises a number of
steps broken down into two categories. The first category
comprises the steps required to generate credentials, bind them to
an entity, and issue them to the entity to which the credential should
be issued. The second category comprises the steps for storing
credentials, and end-of-life as well as extending the useful life of the
credential.
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
ne existing solution to prevent such data leaks is the use of asecure
element, a tamper-resistant device that is capable of securely
Internet hosting applications and their confidential data. Another potential
Research solution is the usage of of Physical Unclonable Function (PUFs)
Task Force that serves as unique digital fingerprint of a hardware device. PUFs
(IRTF) Thing- can also enable other functionalities such as secure key storage.
to-Thing State-of-the-Art and Protection against such data leakage patterns is non-trivial since
Research Challenges for the devices are inherently resource-constrained. An open question is
Group Internet of Things whether there are any viable techniques to protect IoT devices and https://datatracker.ietf.org/doc/draft-irtf-
(T2TRG) Security 5.10 the data in the devices in such an adversarial model. t2trg-iot-seccons/
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance The product’s software signing root of trust is stored in tamper Security-Compliance-
Foundation Framework 1.1 2.4.5.7 resistant memory. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance Security-Compliance-
Foundation Framework 1.1 2.4.5.19 The production software signing keys are under access control. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance Files and directories are set to appropriate access privileges on a Security-Compliance-
Foundation Framework 1.1 2.4.6.4 need to access basis. Framework_WG1_2017.pdf
Department for Digital, Culture, Media and Sport 73
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance Passwords file(s) are owned by and are only accessible to and Security-Compliance-
Foundation Framework 1.1 2.4.6.5 writable by the Devices’ OS’s most privileged account. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security The product’s OS kernel and its functions are prevented from being p-content/uploads/2017/12/IoT-
IoT Security Compliance called by external product level interfaces and unauthorised Security-Compliance-
Foundation Framework 1.1 2.4.6.8 applications. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance Security-Compliance-
Foundation Framework 1.1 2.4.6.9 Applications are operated at the lowest privilege level possible. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance All the applicable security features supported by the OS are Security-Compliance-
Foundation Framework 1.1 2.4.6.10 enabled. Framework_WG1_2017.pdf
Department for Digital, Culture, Media and Sport 74
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance The OS is separated from the application(s) and is only accessible Security-Compliance-
Foundation Framework 1.1 2.4.6.11 via defined secure interfaces. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance All network communications keys are stored securely, in Security-Compliance-
Foundation Framework 1.1 2.4.7.12 accordance with industry standards such as FIPS 140 [5] or similar. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security Where the product has a secure source of time there is a method of p-content/uploads/2017/12/IoT-
IoT Security Compliance validating its integrity, such as Secure NTP. Security-Compliance-
Foundation Framework 1.1 2.4.8.2 https://www.ntpsec.org/. Framework_WG1_2017.pdf
Department for Digital, Culture, Media and Sport 75
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security The product securely stores any passwords using an industry p-content/uploads/2017/12/IoT-
IoT Security Compliance standard cryptographic algorithm, compliant with an industry Security-Compliance-
Foundation Framework 1.1 2.4.8.8 standard such as NIST SP800-63b [26] or similar. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance The product supports access control measures to the root account Security-Compliance-
Foundation Framework 1.1 2.4.8.9 to restrict access to sensitive information or system processes. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security If the product has a password recovery or reset mechanism, an p-content/uploads/2017/12/IoT-
IoT Security Compliance assessment has been made to confirm that this mechanism cannot Security-Compliance-
Foundation Framework 1.1 2.4.8.14 readily be abused by an unauthorised party. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance The product allows an authorised factory reset of the device’s Security-Compliance-
Foundation Framework 1.1 2.4.8.16 authorisation information. Framework_WG1_2017.pdf
Department for Digital, Culture, Media and Sport 76
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance There is a secure method of key insertion that protects keys against Security-Compliance-
Foundation Framework 1.1 2.4.9.4 copying. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance The product stores all sensitive unencrypted parameters, (e.g. Security-Compliance-
Foundation Framework 1.1 2.4.9.7 keys), in a secure, tamper-resistant location. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance The product securely stores any passwords using an industry Security-Compliance-
Foundation Framework 1.1 2.4.11.5 standard cryptographic algorithm, for example see FIPS 140 [5]. Framework_WG1_2017.pdf
Department for Digital, Culture, Media and Sport 77
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security All the related servers and network elements store any passwords p-content/uploads/2017/12/IoT-
IoT Security Compliance using a cryptographic implementation using industry standard Security-Compliance-
Foundation Framework 1.1 2.4.13.16 cryptographic algorithms, for example see FIPS 140 [5]. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security All the related servers and network elements support access control p-content/uploads/2017/12/IoT-
IoT Security Compliance measures to restrict access to sensitive information or system Security-Compliance-
Foundation Framework 1.1 2.4.13.17 processes to privileged accounts. Framework_WG1_2017.pdf
IoT Security Security Design Make use of chip-level security and virtualization capabilities, and https://www.iotsi.org/security-best-
Initiative Best Practices utilize crypto coprocessors for key creation and storage. practices
All stored secrets are vulnerable to compromise with enough time
IoT Security Security Design and/or resources – ALL. Design and mitigate weakness per risk https://www.iotsi.org/security-best-
Initiative Best Practices tolerance. practices
Utilize trusted platform modules (TPM), secure elements (SE), and
IoT Security Security Design other hardware security modules (HSM) for storing and processing https://www.iotsi.org/security-best-
Initiative Best Practices cryptographic secrets. practices
IoT Security Security Design Use high-iteration, heavy-salt, key derivation functions such as https://www.iotsi.org/security-best-
Initiative Best Practices scrypt/jane, bcrypt and PBKDF2 for storing account passwords. practices
IoT Security Security Design Use sufficiently large, as well as high quality, entropy for encryption https://www.iotsi.org/security-best-
Initiative Best Practices routines. practices
IoT Security Security Design When in question over possible data sensitivity or privacy, just https://www.iotsi.org/security-best-
Initiative Best Practices encrypt. practices
Department for Digital, Culture, Media and Sport 78
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
During deployment, each device requires device IDs and
associated authentication keys generated by the cloud service.
Keep Keep these keys physically safe even after the deployment. Any https://docs.microsoft.com/en-
IoT Security Best authentication keys compromised key can be used by a malicious device to us/azure/iot-fundamentals/iot-security-
Microsoft Practices safe masquerade as an existing device. best-practices
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Secure storage refers to the physical method of housing sensitive
or confidential data (“Sensitive Data”). Such data could include but
not be limited to symmetric or asymmetric private keys, certificate
Open data, network access credentials, or personal user information.
Connectivity Sensitive Data requires that its integrity be maintained, whereas
Foundation OIC Security Critical Sensitive Data requires that both its integrity and https://openconnectivity.org/specs/OIC
(OCF) Specification v1.1.1 15.1.1 confidentiality be maintained. _Security_Specification_v1.1.1.pdf
Hardware secure storage is recommended for use with critical
Sensitive Data such as symmetric and asymmetric private keys,
Open access credentials, personal private data. Hardware secure storage
Connectivity most often involves semiconductor-based non-volatile memory
Foundation OIC Security (“NVRAM”) and includes countermeasures for protecting against https://openconnectivity.org/specs/OIC
(OCF) Specification v1.1.1 15.1.1.1 unauthorized access to Critical Sensitive Data. _Security_Specification_v1.1.1.pdf
It is generally NOT recommended to rely solely on software and
unsecured memory to store Sensitive Data even if it is encrypted.
Critical Sensitive Data such as authentication and encryption keys
should be housed in hardware secure storage whenever possible.
Open Sensitive Data stored in volatile and non-volatile memory shall be
Connectivity encrypted using acceptable algorithms to prevent access by
Foundation OIC Security unauthorized parties through methods described in section https://openconnectivity.org/specs/OIC
(OCF) Specification v1.1.1 15.1.1.2 15.1.1.1. _Security_Specification_v1.1.1.pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Execution environment elements. Execution environment within a
computing device has many components. To perform security
functions in a robustness manner, each of these components has to
be secured as a separate dimension. For instance, an execution
environment performing AES cannot be considered secure if the
input path entering keys into the execution engine is not secured,
even though the partitions of the CPU, performing the AES
encryption, operate in isolation from other processes. Different
dimensions referred to as elements of the execution environment
are listed below. To qualify as a secure execution environment
(SEE), the corresponding SEE element must qualify as secure.
• (secure) Storage
• (Secure) Execution engine
• (trusted) Input/output paths
Open • (Secure) Time Source/clock
Connectivity • (random) number generator
Foundation OIC Security • (approved) cryptographic algorithms https://openconnectivity.org/specs/OIC
(OCF) Specification v1.1.1 15.1 • Hardware Tamper (protection) _Security_Specification_v1.1.1.pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
IoT Devices Should Follow Security & Cryptography Best
Practices. BITAG recommends that IoT device manufacturers
secure communications using Transport Layer Security (TLS) or
Lightweight Cryptography (LWC) [96,97,98]. Some devices can
perform symmetric key encryption in near-real time. In addition,
Lightweight Cryptography (LWC) provides additional options for
securing traffic to and from resourceconstrained devices. If devices
rely on a public key infrastructure (PKI), then an authorized entity
must be able to revoke certificates when they become
compromised, as web browsers and PC operating systems do
[99,100,101,102,103,104,105]. Cloud services can strengthen the
integrity of certificates issued by certificate authorities through, for
example, participating in Certificate Transparency [106]. Finally,
manufacturers should take care to avoid encryption methods,
protocols, and key sizes with known weaknesses.
Broadband
Internet
Technical Internet of Things Vendors who rely on cloud-hosted support for IoT devices should http://www.bitag.org/documents/BITAG
Advisory (IoT) Security and configure their servers to follow best practices, such as configuring _Report_-
Group Privacy the TLS implementation to only accept the latest TLS protocol _Internet_of_Things_(IoT)_Security_a
(BITAG) Recommendations 7.2 versions. nd_Privacy_Recommendations.pdf
Broadband
Internet
Technical Internet of Things Encrypt Configuration (Command & Control) Communications http://www.bitag.org/documents/BITAG
Advisory (IoT) Security and By Default. BITAG recommends that all communication for device _Report_-
Group Privacy management take place over an authenticated and secured _Internet_of_Things_(IoT)_Security_a
(BITAG) Recommendations 7.2 channel. nd_Privacy_Recommendations.pdf
Broadband
Internet
Technical Internet of Things Secure Communications To and From IoT Controllers. If IoT http://www.bitag.org/documents/BITAG
Advisory (IoT) Security and devices use a centralized controller to facilitate over-the-Internet _Report_-
Group Privacy communication with a cloud service, then BITAG recommends this _Internet_of_Things_(IoT)_Security_a
(BITAG) Recommendations 7.2 communications channel be secured in both directions. nd_Privacy_Recommendations.pdf
Department for Digital, Culture, Media and Sport 84
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Future-proofing the
connected world: Critical national https://downloads.cloudsecurityalliance
13 steps to infrastructure can .org/assets/research/internet-of-
Cloud Security Developing Secure rely on the IoT things/future-proofing-the-connected-
Alliance (CSA) IoT ecosystem - 3 Implement secure interface connectivity within your IoT products world.pdf
Security Guidance The encryption of data during transport must be able to take into https://downloads.cloudsecurityalliance
for Early Adopters consideration the resource constrained devices and hence must .org/whitepapers/Security_Guidance_f
Cloud Security of the Internet of 5.3.2 eighth bullet have a small footprint be lightweight instead of the traditional ones or_Early_Adopters_of_the_Internet_of
Alliance (CSA) Things (IoT) point to avoid performance bottlenecks. _Things.pdf
Data-in-Transit refers to the sending or receiving of data
(application, management commands, status, etc.) over a link or
network. Whenever possible, DIT protections should include
cryptographic confidentiality (encryption), integrity and
Security Guidance authentication algorithms executed by a properly integrated https://downloads.cloudsecurityalliance
for Early Adopters cryptographic module. Well-validated network and/or application .org/whitepapers/Security_Guidance_f
Cloud Security of the Internet of security protocols should be utilized to provide end-to-end DIT or_Early_Adopters_of_the_Internet_of
Alliance (CSA) Things (IoT) 5.4.1.2 security whenever possible. _Things.pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
European
Union Agency
for Network
and Security and
Information Resilience of Smart
Security Home https://www.ENISA.europa.eu/publicati
(ENISA) Environments 2 Industry actors should support security-driven business models ons/security-resilience-good-practices
Use proven solutions, i.e. well known communications
protocols and cryptographic algorithms, recognized by the scientific
community, etc. Certain proprietary solutions, such as custom
cryptographic algorithms, should be avoided. Purely proprietary
European approaches and standards limit interoperability and can severely
Union Agency hamper the potential of the Digital Single Market. Common open
for Network standards will help users access new innovative services,
and especially
Information Baseline Security for SMEs, the public sector and the scientific community. In https://www.ENISA.europa.eu/publicati
Security Recommendations particular, the portability of applications and data between different ons/baseline-security-
(ENISA) for IoT GP-OP-04 providers is essential to avoid lock-in. recommendations-for-iot
European
Union Agency
for Network Use protocols and mechanisms able to represent and
and manage trust and trust relationships. Each communication channel
Information Baseline Security must be trustworthy to a level commensurate with the security https://www.ENISA.europa.eu/publicati
Security Recommendations dependencies it supports (i.e., how much it is trusted by other ons/baseline-security-
(ENISA) for IoT GP-TM-07 components to perform its security functions). recommendations-for-iot
European
Union Agency Ensure a proper and effective use of cryptography to protect the
for Network confidentiality, authenticity and/or integrity of data and information
and (including control messages), in transit and in rest. Ensure the
Information Baseline Security proper selection of standard and strong encryption algorithms and https://www.ENISA.europa.eu/publicati
Security Recommendations strong keys, and disable insecure protocols. Verify the robustness ons/baseline-security-
(ENISA) for IoT GP-TM-34 of the implementation recommendations-for-iot
Department for Digital, Culture, Media and Sport 87
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
European
Union Agency
for Network Support scalable key management schemes. It has to be
and considered that tiny sensor nodes cannot provide all security
Information Baseline Security features because they have lots of system limitations. Thus, the https://www.ENISA.europa.eu/publicati
Security Recommendations sensed data carried over infrastructure networks may not have ons/baseline-security-
(ENISA) for IoT GP-TM-37 strong encryption or security protection. recommendations-for-iot
European
Union Agency Guarantee the different security aspects -confidentiality
for Network (privacy), integrity, availability and authenticity- of the information in
and transit on the networks or stored in the IoT application or in the
Information Baseline Security Cloud, using data encryption methods to minimise network threats https://www.ENISA.europa.eu/publicati
Security Recommendations such as replay, interception, packet sniffing, wiretapping, or ons/baseline-security-
(ENISA) for IoT GP-TM-38 eavesdropping. recommendations-for-iot
European
Union Agency
for Network
and
Information Baseline Security https://www.ENISA.europa.eu/publicati
Security Recommendations Ensure that communication security is provided using state-of-the- ons/baseline-security-
(ENISA) for IoT GP-TM-39 art, standardised security protocols, such as TLS for encryption. recommendations-for-iot
European
Union Agency
for Network
and
Information Baseline Security https://www.ENISA.europa.eu/publicati
Security Recommendations Ensure credentials are not exposed in internal or external network ons/baseline-security-
(ENISA) for IoT GP-TM-40 traffic. recommendations-for-iot
Department for Digital, Culture, Media and Sport 88
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
European
Union Agency
for Network Guarantee data authenticity to enable trustable exchanges (from
and data emission to data reception - both ways). Data is often stored,
Information Baseline Security cached, and processed by several nodes; not just sent from point A https://www.ENISA.europa.eu/publicati
Security Recommendations to point B. For these reasons, data should always be signed ons/baseline-security-
(ENISA) for IoT GP-TM-41 whenever and wherever the data is captured and stored. recommendations-for-iot
European
Union Agency
for Network
and Ensure web interfaces fully encrypt the user session, from
Information Baseline Security the device to the backend services, and that they are not https://www.ENISA.europa.eu/publicati
Security Recommendations susceptible ons/baseline-security-
(ENISA) for IoT GP-TM-52 to XSS, CSRF, SQL injection, etc. recommendations-for-iot
European
Union Agency
for Network
and Security and
Information Resilience of Smart
Security Home 5.2, second bullet Communication protection: communication should be protected https://www.ENISA.europa.eu/publicati
(ENISA) Environments point against disclosure, modification, replay and denial of service. ons/security-resilience-good-practices
European
Union Agency
for Network
and Security and Cryptography: Confidentiality, integrity and authenticity must be
Information Resilience of Smart protected by using strong and standard cryptography. Keys must be
Security Home 5.2, third bullet managed securely, and the use of a trust infrastructure (such as https://www.ENISA.europa.eu/publicati
(ENISA) Environments point PKI) is encouraged. ons/security-resilience-good-practices
Department for Digital, Culture, Media and Sport 89
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
IoT Security This section contains recommendations and best practices for https://www.gsma.com/iot/wp-
Guidelines for network authentication and link encryption for different wide area content/uploads/2017/10/CLP.14-
GSMA Network Operators CLP14_5.2 networks. v2.0.pdf
IoT Security
Guidelines Once a root of trust has been established within the TCB, a protocol https://www.gsma.com/iot/wp-
Endpoint must be used that incorporates the TCB’s capabilities and the root content/uploads/2017/10/CLP.13-
GSMA Ecosystem CLP13_6.4 of trust effectively. v2.0.pdf
IoT Security
Guidelines https://www.gsma.com/iot/wp-
Endpoint Enforce confidentiality and integrity on the administrative content/uploads/2017/10/CLP.13-
GSMA Ecosystem CLP13_6.12 communications channel v2.0.pdf
Department for Digital, Culture, Media and Sport 90
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
IoT Security
Guidelines Diminish the potential for replay of administrative commands by https://www.gsma.com/iot/wp-
Endpoint ensuring the communications protocol has adequate entropy by content/uploads/2017/10/CLP.13-
GSMA Ecosystem CLP13_6.12 using an industry standard communications protocol v2.0.pdf
All communications to and from the trust anchor should be
authenticated and should enforce confidentiality and integrity. The
only exception to this model is if the trust anchor is internal to the
core of the processor. Any external trust anchor, such as a UICC,
can only be trusted if the messages received and sent can be
trusted.
IoT Security To do this, choose trust anchors that are capable of authentication
Guidelines and encryption and validate that all messages containing answers https://www.gsma.com/iot/wp-
Endpoint to challenges are sent confidentially and, where possible, with content/uploads/2017/10/CLP.13-
GSMA Ecosystem CLP13_7.4 verifiable integrity. v2.0.pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
In the 3GPP model, only Endpoints (called User Equipment in
3GPP) are authenticated. Endpoints do not authenticate the base
stations they connect to. Thus, any base station can claim to serve
on behalf of any Cellular carrier. Individuals capable of manipulating
or building a Cellular base station may then impersonate any
Cellular carrier of their choosing. A custom Cellular base station
currently costs under 1,000 USD to build, but the resultant power
only allows the interception of messages in the local area. Once the
fake tower is built, the base station can impersonate a local Cellular
carrier, and intercept phone calls, text messages, and even data,
from Endpoints in the local area
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Bringing up Cellular interrogators helps summarize this section
quite adequately by touching on the idea that communications
security is not absolute. It only protects the communication channel
between two entities. These entities, however, act as gates allowing
data to pass in and out of the ecosystems these entities are
connected to.
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Endpoints, especially Gateways, or Endpoints acting as Gateways,
must be capable of enforcing communications security even in
environments where connectivity to the back-end network is
unavailable. Regardless of whether this lack of connectivity is
temporary or not, the Gateway or Endpoint must be capable of
enforcing security as if the back-end system were available.
To achieve this, the TCB must be used to authenticate all peers that
the Endpoint must communicate privacy-centric, configuration, or
command data to. The TCB can be used to ensure that messages
IoT Security sent and received from peers are being sent and received from an
Guidelines entity that has been provisioned by the same organization. This https://www.gsma.com/iot/wp-
Endpoint reduces the likelihood that an adversarial device is being content/uploads/2017/10/CLP.13-
GSMA Ecosystem CLP13_8.9 communicated with. v2.0.pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
SECURITY MODEL AND POLICY. The Security Policy includes
policies for the system and sub-policies for the endpoint protection,
communications and connectivity protection, security monitoring
and analysis, security configuration and management and data
protection (see individual sections 7.3 to 7.7). The system threat
analysis enables the creation of the security objectives for the
system, derived from regulations and standards. From these
objectives, the applicable security policies are selected based on
the industry vertical, customer base, geographic location and other
considerations. The security policy describes the overall business-
risk considerations and defines the guidelines for securing the day-
to-day proper functioning of the system. This policy is then
Industrial Internet transformed into a security model, and determines and drives
Industrial of Things requirements to the functionality of the building blocks of the
Internet Volume G4: security framework. For example, each machine-level security
Consortium Security policy specifically covers the security policies associated with the https://www.iiconsortium.org/pdf/IIC_P
(IIC) Framework v1.0 7.8 endpoint and the devices it may be connected to or in control of. UB_G4_V1.00_PB-3.pdf
Department for Digital, Culture, Media and Sport 97
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
found to be flawed within a short time.
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Internet
Engineering Best Current If a device supports encryption and use of encryption is optional,
Task Force Practices (BCP) for the device SHOULD be configurable to require encryption, and this https://tools.ietf.org/html/draft-moore-
(IETF) IoT Devices 2.3.2 SHOULD be the default. iot-security-bcp-01
If public key cryptography is used by the device to authenticate
itself to other devices or parties, each device MUST be instantiated
with its own unique private key or keys. In many cases it will be
necessary for the vendor to sign such keys or arrange for them to
be
signed by a trusted party, prior to shipping the device.
Internet
Engineering Best Current Per-device private keys SHOULD be generated on the device and
Task Force Practices (BCP) for never https://tools.ietf.org/html/draft-moore-
(IETF) IoT Devices 2.5 exposed outside the device. iot-security-bcp-01
Internet
Research Services such as confidentiality and integrity protection on packet
Task Force data, message authentication codes or encryption are typically used
(IRTF) Thing- to provide end-to-end security. These protection methods render
to-Thing State-of-the-Art and the protected parts of the packets immutable as rewriting is either
Research Challenges for the not possible because a) the relevant information is encrypted and
Group Internet of Things inaccessible to the gateway or b) rewriting integrity-protected parts https://datatracker.ietf.org/doc/draft-irtf-
(T2TRG) Security 5.1.3 of the packet would invalidate the end-to-end integrity protection. t2trg-iot-seccons/
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
The Internet Society believes that IoT security is the collective
responsibility of all who develop and use IoT devices. Participants
in the IoT space should adopt a collaborative approach to security
among its broad, multistakeholder community by assuming
responsibility, sharing best practices and lessons learned,
encouraging security dialog, and emphasizing the development of
flexible, shared security solutions that can adapt and evolve as
threats change over time. IoT security policy should focus on
The Internet of Encourage a empowering players to address security issues close to where they
Internet Things: An Internet collaborative occur, rather than centralizing IoT security among a few, while also https://www.internetsociety.org/wp-
Society Society Public approach to IoT preserving the fundamental properties of the Internet and user content/uploads/2017/09/ISOC-
(ISOC) Policy Briefing security rights. PolicyBrief-IoT.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance The device remains secure and maintains state during a side Security-Compliance-
Foundation Framework 1.1 2.4.5.22 channel attack. Framework_WG1_2017.pdf
Department for Digital, Culture, Media and Sport 103
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security The product prevents unauthorised connections to it or other p-content/uploads/2017/12/IoT-
IoT Security Compliance devices the product is connected to. For example is there a firewall Security-Compliance-
Foundation Framework 1.1 2.4.7.1 on each interface and internet layer protocol. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security The network component and firewall (if applicable) configuration p-content/uploads/2017/12/IoT-
IoT Security Compliance has been reviewed and documented for the required/defined secure Security-Compliance-
Foundation Framework 1.1 2.4.7.2 behaviour Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance Insecure and unauthenticated application layer protocols (such as Security-Compliance-
Foundation Framework 1.1 2.4.7.5 TELNET, FTP, HTTP, SMTP and NTP < v4) are not used. Framework_WG1_2017.pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security For any WiFi connection, WPA2 with AES or a similar strength p-content/uploads/2017/12/IoT-
IoT Security Compliance encryption has been used and insecure protocols such as WPA and Security-Compliance-
Foundation Framework 1.1 2.4.7.10 TKIP are disabled. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance Where WPA2 WPS is used it has a unique, random key per device Security-Compliance-
Foundation Framework 1.1 2.4.7.11 and enforces exponentially increasing retry attempt delays. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance All network communications keys are stored securely, in Security-Compliance-
Foundation Framework 1.1 2.4.7.12 accordance with industry standards such as FIPS 140 [5] or similar. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance Where the MQTT protocol is used, it is protected by a TLS Security-Compliance-
Foundation Framework 1.1 2.4.7.13 connection with no known cipher vulnerabilities. Framework_WG1_2017.pdf
Department for Digital, Culture, Media and Sport 105
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance Where the CoAP protocol is used, it is protected by a DTLS Security-Compliance-
Foundation Framework 1.1 2.4.7.14 connection with no known cipher vulnerabilities. Framework_WG1_2017.pdf
Where cryptographic suites are used such as TLS, all cipher suites
shall be listed and validated against the current security https://www.iotsecurityfoundation.org/w
IoT Security recommendations such as NIST 800-131A 2] or OWASP. Where p-content/uploads/2017/12/IoT-
IoT Security Compliance insecure ciphers suites are identified they shall be removed from Security-Compliance-
Foundation Framework 1.1 2.4.7.15 the product. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance Where there is a loss of communications it shall not compromise Security-Compliance-
Foundation Framework 1.1 2.4.7.17 the integrity of the device. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security The product only enables the communications interfaces, network p-content/uploads/2017/12/IoT-
IoT Security Compliance protocols, application protocols and network services necessary for Security-Compliance-
Foundation Framework 1.1 2.4.7.18 the products’ operation. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security Communications protocols should be at the most secure versions p-content/uploads/2017/12/IoT-
IoT Security Compliance available and/or appropriate for the product. For example, Bluetooth Security-Compliance-
Foundation Framework 1.1 2.4.7.19 4.2 rather than 4.0. Framework_WG1_2017.pdf
Department for Digital, Culture, Media and Sport 106
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security Post product launch communications protocols should be p-content/uploads/2017/12/IoT-
IoT Security Compliance maintained to the most secure versions available and/or appropriate Security-Compliance-
Foundation Framework 1.1 2.4.7.20 for the product. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security A true random number generator source is exclusively used for all p-content/uploads/2017/12/IoT-
IoT Security Compliance relevant cryptographic operations including nonce, initialisation Security-Compliance-
Foundation Framework 1.1 2.4.9.1 vector and key generation algorithms. NIST SP 800-90A [3] Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security The true random number generator source has been validated for p-content/uploads/2017/12/IoT-
IoT Security Compliance true randomness using an NIST SP800-22 [4], FIPS 140-2 [5] or Security-Compliance-
Foundation Framework 1.1 2.4.9.2 similar compliance process. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security There is a process for secure provisioning of keys that includes p-content/uploads/2017/12/IoT-
IoT Security Compliance generation, distribution, revocation and destruction. For example in Security-Compliance-
Foundation Framework 1.1 2.4.9.3 compliance with FIPS140-2 [5] or similar process. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance There is a secure method of key insertion that protects keys against Security-Compliance-
Foundation Framework 1.1 2.4.9.4 copying Framework_WG1_2017.pdf
Department for Digital, Culture, Media and Sport 107
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security All the product related cryptographic functions have no publicly p-content/uploads/2017/12/IoT-
IoT Security Compliance known unmitigated weaknesses, for example MD5 and SHA-1 are Security-Compliance-
Foundation Framework 1.1 2.4.9.5 not used, e.g. those stipulated in NIST SP800-131A [2]. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security All the product related cryptographic functions are sufficiently p-content/uploads/2017/12/IoT-
IoT Security Compliance secure for the lifecycle of the product, e.g. those stipulated in NIST Security-Compliance-
Foundation Framework 1.1 2.4.9.6 SP800- 131A [2]. ]. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance The product stores all sensitive unencrypted parameters, (e.g. Security-Compliance-
Foundation Framework 1.1 2.4.9.7 keys), in a secure, tamper-resistant location. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security Where the application communicates with a product related remote p-content/uploads/2017/12/IoT-
IoT Security Compliance server(s) or device it does so over a secure connection such as a Security-Compliance-
Foundation Framework 1.1 2.4.11.4 TLS connection using certificate pinning. Framework_WG1_2017.pdf
Department for Digital, Culture, Media and Sport 108
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance The product/service ensures that all Personal Information is Security-Compliance-
Foundation Framework 1.1 2.4.12.2 encrypted at rest and in transit. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security All the product related web servers’ TLS certificate(s) are signed by p-content/uploads/2017/12/IoT-
IoT Security Compliance trusted certificate authorities; are within their validity period; and Security-Compliance-
Foundation Framework 1.1 2.4.13.4 processes are in place for their renewal. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance The product related web servers have repeated renegotiation of Security-Compliance-
Foundation Framework 1.1 2.4.13.7 TLS connections disabled. Framework_WG1_2017.pdf
Department for Digital, Culture, Media and Sport 109
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
IoT Security Security Design Restrict system and network communications to only known, https://www.iotsi.org/security-best-
Initiative Best Practices authorized system components where able. practices
IoT Security Security Design Utilize two-factor authenticated and encrypted remote management https://www.iotsi.org/security-best-
Initiative Best Practices services. practices
IoT Security Security Design Do not build your own encryption functions – and have encryption https://www.iotsi.org/security-best-
Initiative Best Practices implementations security-reviewed. practices
IoT Security Security Design Whitelist and control both ingress and egress of device/system https://www.iotsi.org/security-best-
Initiative Best Practices communications where able. practices
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
IoT Security Security Design When in question over possible data sensitivity or privacy, just https://www.iotsi.org/security-best-
Initiative Best Practices encrypt. practices
MIT Dos and Don’ts of
Laboratory for Client 3.1 Use Use of cryptography is critical to providing authentication. Without
Computer Authentication on cryptography the use of cryptography, it is not possible to protect a system from http://pdos.csail.mit.edu/papers/webaut
Science the Web appropriately the weakest of adversaries. h:sec10.pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
TR-0008-V2.0.1 http://www.onem2m.org/images/files/d
Security (Technical The security association between communicating entities uses eliverables/Release2A/TR-0008-
oneM2M Report) 8.2.8 protocols which are proven to resist man-in-the-middle attacks. Security-v_2_0_1.pdf
TR-0008-V2.0.1 http://www.onem2m.org/images/files/d
Security (Technical Ensure appropriate strong standard algorithms and strong keys are eliverables/Release2A/TR-0008-
oneM2M Report) 8.2.24 used, and key management is in place. Security-v_2_0_1.pdf
Department for Digital, Culture, Media and Sport 112
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Ensure devices and associated applications support current
generally accepted security and cryptography protocols and best
practices. All personally identifiable data in transit and in storage
IoT Security & must be encrypted using current generally accepted security https://otalliance.org/system/files/files/i
Online Trust Privacy Trust standards. This includes but is not limited to wired, Wi-Fi, and nitiative/documents/iot_trust_framewor
Alliance (OTA) Framework v2.5 2 Bluetooth connections k6-22.pdf
All IoT support websites must fully encrypt the user session from
the device to the backend services. Current best practices include
HTTPS and HTTP Strict Transport Security (HSTS) by default, also
IoT Security & known as AOSSL or Always On SSL. Devices should include https://otalliance.org/system/files/files/i
Online Trust Privacy Trust mechanisms to reliably authenticate their backend services and nitiative/documents/iot_trust_framewor
Alliance (OTA) Framework v2.5 3 supporting applications. 1 k6-22.pdf
End-user communications, including but not limited to email and
SMS, must adopt authentication protocols to help prevent
spearphishing and spoofing. Domains should implement SPF,
IoT Security & DKIM and DMARC for all security and privacy-related https://otalliance.org/system/files/files/i
Online Trust Privacy Trust communications and notices as well as for parked domains and nitiative/documents/iot_trust_framewor
Alliance (OTA) Framework v2.5 34 those that never send email.5 k6-22.pdf
IoT vendors using email communication should adopt transport-
level confidentiality, including generally accepted security
IoT Security & techniques to aid in securing communications and enhancing the https://otalliance.org/system/files/files/i
Online Trust Privacy Trust privacy and integrity of the message (also referred to as nitiative/documents/iot_trust_framewor
Alliance (OTA) Framework v2.5 36 “Opportunistic TLS for email”). 7 k6-22.pdf
Department for Digital, Culture, Media and Sport 113
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
An important aspect of security of the entire ecosystem is the
robustness of publicly vetted and peer-reviewed (e.g. NIST-
approved) cryptographic algorithms. Security is not achieved by
obscurity of the cryptographic algorithm. To ensure both
interoperability and security, not only widely accepted cryptographic
algorithms must be used, but also a list of approved cryptographic
functions must be specified explicitly. As new algorithms are NIST
Open approved or old algorithms are deprecated, the list of approved
Connectivity algorithms must be maintained by OIC. All other algorithms (even if
Foundation OIC Security they deemed stronger by some parties) must be considered non- https://openconnectivity.org/specs/OIC
(OCF) Specification v1.1.1 15.1.5 approved. _Security_Specification_v1.1.1.pdf
FIPS Random Number Generator (“RNG”) – Insufficient
randomness or entropy in the RNG used for authentication
Open challenges can substantially degrade security strength. For this
Connectivity reason, it is recommended that a FIPS 800-90A-compliant RNG
Foundation OIC Security with a certified noise source be used for all authentication https://openconnectivity.org/specs/OIC
(OCF) Specification v1.1.1 15.1.1.3, 1) challenges. _Security_Specification_v1.1.1.pdf
All cryptographic functions used to protect secrets from the
application user must be implemented on a trusted system (e.g.,
The server)
Protect master secrets from unauthorized access
Cryptographic modules should fail securely
All random numbers, random file names, random GUIDs, and
random strings should be generated
using the cryptographic module’s approved random number
generator when these random values are intended to be un-
guessable
Open Web Cryptographic modules used by the application should be compliant
Application OWASP Secure to FIPS 140-2 or an equivalent standard. (See
Security Coding Practices http://csrc.nist.gov/groups/STM/cmvp/validation.html) https://www.owasp.org/images/0/08/O
Project Quick Reference Cryptographic Establish and utilize a policy and process for how cryptographic WASP_SCP_Quick_Reference_Guide
(OWASP) Guide Practices keys will be managed _v2.pdf
Department for Digital, Culture, Media and Sport 114
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Open Web
Application
Security
Project IoT Security I1: Insecure Web Ensure that any web interface has the ability to use HTTPS to https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Interface protect transmitted information Security_Guidance
Open Web
Application
Security I4: Lack of Ensure all communication between system components is
Project IoT Security Transport encrypted as well as encrypting traffic between the system or https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Encryption device and the internet Security_Guidance
Open Web
Application
Security I4: Lack of
Project IoT Security Transport Use recommended and accepted encryption practices and avoid https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Encryption proprietary protocols Security_Guidance
Open Web
Application
Security I4: Lack of
Project IoT Security Transport Ensure SSL/TLS implementations are up to date and properly https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Encryption configured Security_Guidance
Open Web
Application
Security I4: Lack of
Project IoT Security Transport https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Encryption Consider making a firewall option available for the product Security_Guidance
Open Web
Application
Security
Project IoT Security I6: Insecure Cloud https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Interface Ensure that all cloud interfaces use transport encryption Security_Guidance
Department for Digital, Culture, Media and Sport 115
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Open Web
Application
Security
Project IoT Security I7: Insecure Mobile https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Interface Ensure that any mobile application uses transport encryption Security_Guidance
Open Web
Application
Security I8: Insufficient
Project IoT Security Security Ensure encryption options are made available (e.g. Enabling AES- https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Configurability 256 where AES-128 is the default setting) Security_Guidance
Security rests on fundamentals. Encryption, authentication, and
“key management” are invariably the foundation of meaningfully
resilient security. Fortunately, some great open source libraries
perform encryption really well, even in resource constrained IoT
devices. Unfortunately, most companies still take dangerous risks
attempting to do the key management for IoT entirely on their own.
In contrast, roughly $4 billion per day of e-commerce transactions
are protected by a simple but strong trust model serving billions of
An Internet of users, and serving over a million companies worldwide. This “trust
Things Security model” helps their systems safely authenticate systems of other https://www.symantec.com/content/da
Reference companies and safely start encrypted communications with those m/symantec/docs/white-papers/iot-
Symantec Architecture systems. security-reference-architecture-en.pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Trusted Communication Channels. The principle of trusted
communication channels states that when composing a system
where there is a potential threat to communications between
US National components (i.e., the interconnections between components), each
Institute of communication channel must be trustworthy to a level
Standards and NIST SP.800-160 commensurate with the security dependencies it supports (i.e., how
Technology Systems Security much it is trusted by other components to perform its security https://nvlpubs.nist.gov/nistpubs/Speci
(NIST) Engineering F.1.18 functions). alPublications/NIST.SP.800-160.pdf
IN GENERAL.—A clause that requires the contractor providing the
Internet-connected device to provide written certification that the
device—(III) uses only non-deprecated industry-standard protocols
and technologies for functions such as—
S.1691 - Internet of
Things (IoT) (bb) encryption; and
Cybersecurity https://www.congress.gov/bill/115th-
Improvement Act of SEC.3 (a) (1) (A) (i) congress/senate-
US Senate 2017 (Bill) (III) (cc) interconnection with other devices or peripherals; and bill/1691/text?format=txt
Web of Things
(WoT) Security and Use Secure Transports. When defining protocols for APIs https://www.w3.org/TR/wot-
Privacy exposed by a TD, it is often important to use secure protocols security/#recommended-security-
W3C Considerations 4.1.2 guaranteeing data authenticity and confidentiality. practices
Department for Digital, Culture, Media and Sport 117
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Atlantic
Council A published commitment to integrating security throughout the
Scowcroft development, manufacturing, and deployment life cycle. Key
Center for Smart Homes and elements, such as adversarial threat modeling,32 resilience testing, http://www.atlanticcouncil.org/images/p
Strategy and the Internet of and reduced elective complexity, lower costs and shorten the ublications/Smart_Homes_0317_web.
Security Things (issue brief) timeline of securing IoT devices. pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
City of New All data should be protected in transit and at rest, and systems
York (NYC) should be secured against unauthorized access or operation. Data
Guidelines for storage mechanisms must not be easily removed from devices and
the Internet of systems must not have vulnerable external interfaces (e.g.
Things Security 4.4 unsecured USB ports). https://iot.cityofnewyork.us/security/
Future-proofing the
connected world: The low price point https://downloads.cloudsecurityalliance
13 steps to increases the .org/assets/research/internet-of-
Cloud Security Developing Secure potential adversary Consider physical safeguards such as tamper detection to guard things/future-proofing-the-connected-
Alliance (CSA) IoT pool - 1 against physical access to sensitive internals world.pdf
Future-proofing the
connected world: The low price point https://downloads.cloudsecurityalliance
13 steps to increases the .org/assets/research/internet-of-
Cloud Security Developing Secure potential adversary Lock-down physical ports (including test ports) on the product using things/future-proofing-the-connected-
Alliance (CSA) IoT pool - 2 passwords world.pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
European
Union Agency
for Network Ensure that the device cannot be easily disassembled and
and that the data storage medium is encrypted at rest and cannot be
Information Baseline Security easily removed. There should be mechanisms to control device https://www.ENISA.europa.eu/publicati
Security Recommendations security settings, such as remotely locking or erasing contents of a ons/baseline-security-
(ENISA) for IoT GP-TM-32 device if the device has been stolen. recommendations-for-iot
European Ensure that devices only feature the essential physical
Union Agency external ports (such as USB) necessary for them to function and
for Network that
and the test/debug modes are secure, so they cannot be used to
Information Baseline Security maliciously access the devices. In general, lock down physical ports https://www.ENISA.europa.eu/publicati
Security Recommendations to ons/baseline-security-
(ENISA) for IoT GP-TM-33 only trusted connections. recommendations-for-iot
European
Union Agency
for Network
and
Information Baseline Security https://www.ENISA.europa.eu/publicati
Security Recommendations ons/baseline-security-
(ENISA) for IoT GP-TM-50 Ensure only necessary ports are exposed and available. recommendations-for-iot
European
Union Agency
for Network
and Risk Segmentation - Splitting network elements into
Information Baseline Security separate components to help isolate security breaches and https://www.ENISA.europa.eu/publicati
Security Recommendations minimise overall risk. Networks can be divided into isolated ons/baseline-security-
(ENISA) for IoT GP-TM-47 subnetworks to boost performance and improve security. recommendations-for-iot
Department for Digital, Culture, Media and Sport 122
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
European
Union Agency
for Network
and
Information Baseline Security Disable specific ports and/or network connections for https://www.ENISA.europa.eu/publicati
Security Recommendations selective connectivity. If necessary, provide users with guidelines to ons/baseline-security-
(ENISA) for IoT GP-TM-45 perform this process in the final implementation. recommendations-for-iot
European
Union Agency
for Network Make intentional connections. Prevent unauthorised connections to
and it or other devices the product is connected to, at all levels of the
Information Baseline Security protocols. IoT devices must provide notice and/or request a user https://www.ENISA.europa.eu/publicati
Security Recommendations confirmation when initially pairing, onboarding, and/or connecting ons/baseline-security-
(ENISA) for IoT GP-TM-44 with other devices, platforms or services. recommendations-for-iot
Since some devices, gateways, etc. are required to be managed
remotely rather than operated manually in the field, measures for
tamper protection and detection are needed. Detection and reaction
European to hardware tampering should not rely on network connectivity.
Union Agency
for Network
and Hardware tampering means that an attacker has physical control of
Information Baseline Security the device for some period of time. Broadly speaking, hardware https://www.ENISA.europa.eu/publicati
Security Recommendations tampering might occur at any of the different periods in the life cycle ons/baseline-security-
(ENISA) for IoT GP-TM-31 of a device. recommendations-for-iot
European
Union Agency
for Network Protection of remote monitoring interfaces is crucial since they often
and Security and provide a highly-privileged entry point into a device. This protection
Information Resilience of Smart includes access control and authentication mechanisms, as
Security Home described in good practices on Identification, authentication, https://www.ENISA.europa.eu/publicati
(ENISA) Environments 7.2.3 authorisation. ons/security-resilience-good-practices
Department for Digital, Culture, Media and Sport 123
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
IoT Security The physical device should not only be tamper resistant at the chip
Guidelines level, it should also be tamper resistant at the product level. The https://www.gsma.com/iot/wp-
Endpoint case used in the product should provide protection from adversarial content/uploads/2017/10/CLP.13-
GSMA Ecosystem CLP13_7.3 or curious users. v2.0.pdf
Department for Digital, Culture, Media and Sport 124
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Applications running on an Endpoint typically do not require super-
user privileges. Most often, applications require access to device
drivers or a network port. While some of these devices, ports, or
other objects may require super-user privileges to initially access
them, the super-user privileges are not required to perform
subsequent operations. Thus, it is best practice to only use super-
user privileges at the start of the application to gain access to these
resources. Then, super-user privileges should be dropped.
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Programming languages have varying degrees of security,
depending on the purpose of the language and how high level it is.
Some languages provide constructs for limiting access to raw
memory, and enforce constraints around how memory is used. The
engineering team should identify a language that is capable of
providing security to the application run-time or resultant binary.
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
While the Organizational Root of Trust and its services will define
authentication technologies that secure the network communication
layer, the user, administration, and partner authorization
IoT Security technologies must be configured separately. While these entities’
Guidelines for communications channels are secured with the Organizational Root https://www.gsma.com/iot/wp-
Service of Trust, their actions and identities must be authenticated using a content/uploads/2017/10/CLP.13-
GSMA Ecosystems CLP12_6.12 separate system. v2.0.pdf
Department for Digital, Culture, Media and Sport 127
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
In some service infrastructure environments, ingress and egress
protection mechanisms are not configured by default. This means
that engineers must employ firewall or network traffic rulesets
themselves. These rules must be set in infrastructure before any
service is deployed to the public.
Note that software firewalls carry an additional risk, in that they can
be manipulated by a savvy attacker. If a software firewall is used,
any server infrastructure that is improperly hardened may be
manipulated by an attacker. In other words, if a public service
running on a server carries unnecessary privileges (such as super-
IoT Security user privileges) and is compromised, the attacker will likely be
Guidelines for capable of disabling the software firewall. Thus, the engineering https://www.gsma.com/iot/wp-
Service team must evaluate whether a software firewall is too high of a risk content/uploads/2017/10/CLP.13-
GSMA Ecosystems CLP12_6.13 for the chosen architecture. v2.0.pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Some implementations of modern RAM technology such as
Dynamic Random Access Memory (DRAM) and Static Random
Access Memory (SRAM) are vulnerable to errors that can be
provably induced by certain memory access sequences. Abusing
this type of error can result in the alteration of a specific bit, or bits,
in predictable areas of memory. A successful exploit of this
condition can alter bits in memory that represent types of privilege
denoted by software.
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Volume G4:
Security
Framework v1.0
Industrial Internet
Industrial of Things
Internet Volume G4: FROM FUNCTIONAL TO IMPLEMENTATION VIEWPOINT.
Consortium Security Principle of complete mediation: every access to every object must https://www.iiconsortium.org/pdf/IIC_P
(IIC) Framework v1.0 7.9 be checked for authority. UB_G4_V1.00_PB-3.pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Device firmware SHOULD be designed to use hardware and
operating
systems that implement memory compartmentalization techniques,
in
order to prevent read, write, and/or execute access to areas of
memory by processes not authorized to use those areas for those
purposes.
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security Any debug interface (for example, I/O ports such as JTAG) only p-content/uploads/2017/12/IoT-
IoT Security Compliance communicate with authorised and authenticated entities on the Security-Compliance-
Foundation Framework 1.1 2.4.4.5 production devices. Framework_WG1_2017.pdf
All communications port(s), such as USB, RS232 etc., which are https://www.iotsecurityfoundation.org/w
IoT Security not used as part of the product’s normal operation are not physically p-content/uploads/2017/12/IoT-
IoT Security Compliance accessible or only communicate with authorised and authenticated Security-Compliance-
Foundation Framework 1.1 2.4.4.9 entities. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance After manufacture, all the product’s test points are securely disabled Security-Compliance-
Foundation Framework 1.1 2.4.4.10 or removed wherever possible. Framework_WG1_2017.pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
If the product has any port(s) that are not required for normal
operation, they are only allowed to communicate with authorised
and authenticated entities or securely disabled when shipped. https://www.iotsecurityfoundation.org/w
IoT Security Where a port is used for field diagnostics, the port input is p-content/uploads/2017/12/IoT-
IoT Security Compliance deactivated and the output provides no information which could Security-Compliance-
Foundation Framework 1.1 2.4.5.5 compromise the device Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security Development software versions have any debug functionality p-content/uploads/2017/12/IoT-
IoT Security Compliance switched off if the software is operated on the product outside of the Security-Compliance-
Foundation Framework 1.1 2.4.5.11 product vendors’ trusted environment. Framework_WG1_2017.pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance Security-Compliance-
Foundation Framework 1.1 2.4.5.19 The production software signing keys are under access control. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security All interactive OS accounts or logins have been disabled or p-content/uploads/2017/12/IoT-
IoT Security Compliance eliminated from the software at the end of the software Security-Compliance-
Foundation Framework 1.1 2.4.6.3 development process. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance Files and directories are set to appropriate access privileges on a Security-Compliance-
Foundation Framework 1.1 2.4.6.4 need to access basis. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance Passwords file(s) are owned by and are only accessible to and Security-Compliance-
Foundation Framework 1.1 2.4.6.5 writable by the Devices’ OS’s most privileged account. Framework_WG1_2017.pdf
Department for Digital, Culture, Media and Sport 136
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance All OS non-essential services have been removed from the Security-Compliance-
Foundation Framework 1.1 2.4.6.6 products’ software image or filesystems. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance All OS command line access to the most privileged accounts has Security-Compliance-
Foundation Framework 1.1 2.4.6.7 been removed from the operating system. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security The product’s OS kernel and its functions are prevented from being p-content/uploads/2017/12/IoT-
IoT Security Compliance called by external product level interfaces and unauthorised Security-Compliance-
Foundation Framework 1.1 2.4.6.8 applications. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance Security-Compliance-
Foundation Framework 1.1 2.4.6.9 Applications are operated at the lowest privilege level possible. Framework_WG1_2017.pdf
Department for Digital, Culture, Media and Sport 137
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance The OS is separated from the application(s) and is only accessible Security-Compliance-
Foundation Framework 1.1 2.4.6.11 via defined secure interfaces. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security The product prevents unauthorised connections to it or other p-content/uploads/2017/12/IoT-
IoT Security Compliance devices the product is connected to. For example is there a firewall Security-Compliance-
Foundation Framework 1.1 2.4.7.1 on each interface and internet layer protocol. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security The network component and firewall (if applicable) configuration p-content/uploads/2017/12/IoT-
IoT Security Compliance has been reviewed and documented for the required/defined secure Security-Compliance-
Foundation Framework 1.1 2.4.7.2 behaviour Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance Products with one or more network interfaces, the uncontrolled, and Security-Compliance-
Foundation Framework 1.1 2.4.7.3 any unintended packet forwarding function should be blocked. Framework_WG1_2017.pdf
Department for Digital, Culture, Media and Sport 138
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance All the products unused ports are closed and the minimal required Security-Compliance-
Foundation Framework 1.1 2.4.7.6 number of ports are active. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security The product only enables the communications interfaces, network p-content/uploads/2017/12/IoT-
IoT Security Compliance protocols, application protocols and network services necessary for Security-Compliance-
Foundation Framework 1.1 2.4.7.18 the products’ operation. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security Communications protocols should be at the most secure versions p-content/uploads/2017/12/IoT-
IoT Security Compliance available and/or appropriate for the product. For example, Bluetooth Security-Compliance-
Foundation Framework 1.1 2.4.7.19 4.2 rather than 4.0. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance The product supports access control measures to the root account Security-Compliance-
Foundation Framework 1.1 2.4.8.9 to restrict access to sensitive information or system processes. Framework_WG1_2017.pdf
Department for Digital, Culture, Media and Sport 139
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security The product only allows controlled user account access; access p-content/uploads/2017/12/IoT-
IoT Security Compliance using anonymous or guest user accounts are not supported without Security-Compliance-
Foundation Framework 1.1 2.4.8.11 justification. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance Any product related web servers have their webserver identification Security-Compliance-
Foundation Framework 1.1 2.4.13.2 options (e.g. Apache or Linux) switched off. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance All product related web servers have their webserver HTTP trace Security-Compliance-
Foundation Framework 1.1 2.4.13.3 and trace methods disabled. Framework_WG1_2017.pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance The product related web servers have repeated renegotiation of Security-Compliance-
Foundation Framework 1.1 2.4.13.7 TLS connections disabled. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance Security-Compliance-
Foundation Framework 1.1 2.4.13.8 The related servers have unused IP ports disabled. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security All the related servers and network elements support access control p-content/uploads/2017/12/IoT-
IoT Security Compliance measures to restrict access to sensitive information or system Security-Compliance-
Foundation Framework 1.1 2.4.13.17 processes to privileged accounts. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security All the related and network elements servers prevent p-content/uploads/2017/12/IoT-
IoT Security Compliance anonymous/guest access except for read only access to public Security-Compliance-
Foundation Framework 1.1 2.4.13.18 information. Framework_WG1_2017.pdf
Department for Digital, Culture, Media and Sport 141
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
The product has all of the production test and calibration software
used during manufacture erased or removed or secured before the
product is dispatched from the factory. This is to prevent alteration
of the product post manufacture when using authorised production
software, for example hacking of the RF characteristics for greater https://www.iotsecurityfoundation.org/w
IoT Security RF ERP. Where such functionality is required in a service centre, it p-content/uploads/2017/12/IoT-
IoT Security Compliance shall be erased or removed upon completion of any servicing Security-Compliance-
Foundation Framework 1.1 2.4.14.1 activities. Framework_WG1_2017.pdf
IoT Security Security Design Expect software vulnerabilities & validate secure coding using https://www.iotsi.org/security-best-
Initiative Best Practices automated & manuals means. practices
IoT Security Security Design Implement and operate only the system services that are necessary https://www.iotsi.org/security-best-
Initiative Best Practices for the function of the system/solution. practices
IoT Security Security Design Compartmentalize communication IO in system design wherever https://www.iotsi.org/security-best-
Initiative Best Practices possible; and run these services at least-privilege levels. practices
IoT Security Security Design Consider restricting or tightly controlling access to system https://www.iotsi.org/security-best-
Initiative Best Practices components, firmware, and technical data for critical systems. practices
IoT Security Security Design Validate system security approach and implementation throughout https://www.iotsi.org/security-best-
Initiative Best Practices the SDLC. practices
IoT Security Security Design Conduct security/vulnerability testing on both software code and https://www.iotsi.org/security-best-
Initiative Best Practices finished systems. practices
Department for Digital, Culture, Media and Sport 142
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
IoT Security Security Design Protect the system enclosure and electronics from physical access, https://www.iotsi.org/security-best-
Initiative Best Practices probing, and attack. practices
IoT Security Security Design Shed technology attack surface whenever and wherever possible in https://www.iotsi.org/security-best-
Initiative Best Practices design and development. practices
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Implement measures to help prevent or make evident any physical
tampering of devices. Such measures help to protect the device
IoT Security & from being opened or modified for malicious purposes after https://otalliance.org/system/files/files/i
Online Trust Privacy Trust installation or from being returned to a retailer in a compromised nitiative/documents/iot_trust_framewor
Alliance (OTA) Framework v2.5 37 state. k6-22.pdf
Paths/ ports used for data entry into or export out of trusted/ crypto-
boundary needs to be protected. This includes paths into and out
secure execution engine and secure memory.
Open
Connectivity Path protection can be both hardware based (e.g. use of a
Foundation OIC Security privileged bus) or software based (using encryption over an https://openconnectivity.org/specs/OIC
(OCF) Specification v1.1.1 15.1.3 untrusted bus). _Security_Specification_v1.1.1.pdf
Department for Digital, Culture, Media and Sport 145
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Open Web
Application
Security
Project IoT Security I3: Insecure Ensure all devices operate with a minimal number of network ports https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Network Services active Security_Guidance
Open Web
Application
Security
Project IoT Security I3: Insecure Ensure all devices do not make network ports and/or services https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Network Services available to the internet via UPnP for example Security_Guidance
Open Web
Application
Security
Project IoT Security I10: Poor Physical Ensure the device is produced with a minimal number of physical https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Security external ports (e.g. USB ports) Security_Guidance
Open Web
Application
Security
Project IoT Security I10: Poor Physical Ensure the firmware of Operating System can not be accessed via https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Security unintended methods such as through an unnecessary USB port Security_Guidance
Open Web
Application
Security
Project IoT Security I10: Poor Physical https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Security Ensure the product is tamper resistant Security_Guidance
Open Web
Application
Security Ensure the product has the ability to limit administrative capabilities
Project IoT Security I10: Poor Physical in some fashion, possibly by only connecting locally for admin https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Security functions Security_Guidance
Department for Digital, Culture, Media and Sport 147
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Open Web
Application
Security
Project IoT Security I10: Poor Physical Ensure the product has the ability to disable external ports such as https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Security USB Security_Guidance
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
U.S. Strategic Principles Use hardware that incorporates security features to strengthen the https://www.dhs.gov/sites/default/files/
Department of for Securing The protection and integrity of the device. For example, use computer publications/Strategic_Principles_for_S
Homeland Internet of Things chips that integrate security at the transistor level, embedded in the ecuring_the_Internet_of_Things-2016-
Security (IoT) processor, and provide encryption and anonymity. 1115-FINAL....pdf
Build the device using the most recent operating system that is
U.S. Strategic Principles technically viable and economically feasible. Many IoT devices use https://www.dhs.gov/sites/default/files/
Department of for Securing The Linux operating systems, but may not use the most up-to-date publications/Strategic_Principles_for_S
Homeland Internet of Things operating system. Using the current operating system ensures that ecuring_the_Internet_of_Things-2016-
Security (IoT) known vulnerabilities will have been mitigated. 1115-FINAL....pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Broadband
Internet Secure software supply chain. Manufacturers should protect the
Technical Internet of Things secure software supply chain to prevent introduction of malware http://www.bitag.org/documents/BITAG
Advisory (IoT) Security and during the manufacturing process; vendors and manufacturers _Report_-
Group Privacy should take appropriate measures to secure their software supply _Internet_of_Things_(IoT)_Security_a
(BITAG) Recommendations 7.10 chain. nd_Privacy_Recommendations.pdf
Increasing Security
through an To further ensure device integrity, each device should be
Industry-Led “hardened” to minimize the attack surface by closing unnecessary
A Vision for Secure Standards-based ports, disabling unnecessary services, and using a secure https://www.cablelabs.com/insights/visi
CableLabs IoT Approach bootloader with configuration validation on-secure-iot/
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
European
Union Agency The boot process initialises the main hardware
for Network components, and starts the operating system. Trust must be
and established in the boot environment before any trust in any other
Information Baseline Security software or executable program can be claimed, so the booted https://www.ENISA.europa.eu/publicati
Security Recommendations environment must be verified and determined to be in an ons/baseline-security-
(ENISA) for IoT GP-TM-03 uncompromised state. recommendations-for-iot
European
Union Agency
for Network
and
Information Baseline Security Restore Secure State - Enable a system to return to a state that https://www.ENISA.europa.eu/publicati
Security Recommendations was known to be secure, after a security breach has occured or if ons/baseline-security-
(ENISA) for IoT GP-TM-06 an upgrade has not been successful. recommendations-for-iot
European
Union Agency
for Network
and
Information Baseline Security https://www.ENISA.europa.eu/publicati
Security Recommendations Mechanisms for self-diagnosis and self-repair/healing to ons/baseline-security-
(ENISA) for IoT GP-TM-16 recover from failure, malfunction or a compromised state. recommendations-for-iot
Sign code cryptographically to ensure it has not been Management
tampered with after being signed as safe for the device, and
European implement run-time protection and secure execution monitoring to
Union Agency be sure malicious attacks do not overwrite code after it is loaded.
for Network Only run signed code and never unsigned code. Measuring the
and bootprocess enables the detection of manipulation of the host OS
Information Baseline Security and software, so that malicious changes in the behaviour of the https://www.ENISA.europa.eu/publicati
Security Recommendations devices can be detected. It enables boot-time detection of rootkits, ons/baseline-security-
(ENISA) for IoT GP-TM-04 viruses and worms. recommendations-for-iot
Department for Digital, Culture, Media and Sport 154
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
European
Union Agency Employ a hardware-based immutable root of trust. The Hardware
for Network Root of Trust is a trusted hardware component which receives
and control at power-on. It then extends the chain of trust to other
Information Baseline Security hardware, firmware, and software components. The Root of Trust https://www.ENISA.europa.eu/publicati
Security Recommendations should then be attestable by software agents running within and ons/baseline-security-
(ENISA) for IoT GP-TM-01 throughout the infrastructure. recommendations-for-iot
European
Union Agency
for Network
and Security and Self-protection: HW and SW self-protection measures should be in
Information Resilience of Smart place to protect previous security functions. Data used to enforce
Security Home 5.2, sixth bullet these security functions should be protected, and hardening should https://www.ENISA.europa.eu/publicati
(ENISA) Environments point be used to reduce the attack surface ons/security-resilience-good-practices
IoT Security
Guidelines https://www.gsma.com/iot/wp-
Endpoint content/uploads/2017/10/CLP.13-
GSMA Ecosystem CLP13_6.1 Implement a Trusted Computing Base v2.0.pdf
Critical applications stored in executable regions of memory, such
as first-stage bootloaders or Trusted Computing Bases, should be
stored read-only. This ensures that the device can be booted into a
IoT Security valid configuration without interjection from an adversary. Without
Guidelines this assurance, executable code loaded after the first stage of https://www.gsma.com/iot/wp-
Endpoint execution will not be able to trust that it was booted into a valid content/uploads/2017/10/CLP.13-
GSMA Ecosystem CLP13_6.16 configuration or state. v2.0.pdf
IoT Security
Guidelines Do not embed remote administrative capabilities into a publicly https://www.gsma.com/iot/wp-
Endpoint accessible application or API, use a separate and distinct content/uploads/2017/10/CLP.13-
GSMA Ecosystem CLP13_6.12 communications channel v2.0.pdf
Department for Digital, Culture, Media and Sport 155
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
IoT Endpoints that have user interfaces such as touch screens, rich
displays, or alternative interface technologies, must be able to
render information to the user and take information from a user in a
secure manner.
While attributes of the user interface, such as passwords, have
already been covered in this document, there are some more subtle
issues that must be discussed:
Alerting systems
Action confirmation
IoT Security When an anomaly has occurred, such as physical tampering or an
Guidelines application behaving in an unintended fashion, the user should https://www.gsma.com/iot/wp-
Endpoint receive a visible alert. Alternatively, the user should be able to content/uploads/2017/10/CLP.13-
GSMA Ecosystem CLP13_8.4 review alerts from the system from within the User Interface. v2.0.pdf
In order for an application to run properly, it must be loaded and
IoT Security executed in a consistent way on a reliable, high quality, and secure
Guidelines for platform. The TCB defines how to formulate this platform, but the https://www.gsma.com/iot/wp-
Service Bootstrap model defines how the application shall be ran on top of content/uploads/2017/10/CLP.13-
GSMA Ecosystems CLP12_5.3 it. v2.0.pdf
BOOT PROCESS INTEGRITY. The boot process initializes the
Industrial Internet main hardware components, and starts the operating system. Trust
Industrial of Things must be established in the boot environment before any trust in any
Internet Volume G4: other software or executable program can be claimed. So the
Consortium Security booted environment must be verified and determined to be in an https://www.iiconsortium.org/pdf/IIC_P
(IIC) Framework v1.0 8.7.1 uncompromised state. UB_G4_V1.00_PB-3.pdf
Department for Digital, Culture, Media and Sport 156
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
SECURITY THREATS AND VULNERABILITIES ON ENDPOINTS.
Intercepts or overrides of the system boot process, ②+③: The
endpoint boot process can be altered by modifying the firmware
interface between the hardware platform firmware and the operating
system such as the unified extensible firmware interface (UEFI) or
basic Input/output system (BIOS)1. Changes to the bootloader are
another threat as changes could compromise the integrity of the
endpoint by starting unauthorized or insecure versions of the
operating system. Attacks at this level could also affect the normal
Industrial Internet or secure boot process of the endpoint, the recognition of all the
Industrial of Things hardware resources and the establishment of a solid root of trust for
Internet Volume G4: securing other components.
Consortium Security • Compromises to the Guest OS, Hypervisors and Separation https://www.iiconsortium.org/pdf/IIC_P
(IIC) Framework v1.0 8.1 Kernels, ④+⑤: These UB_G4_V1.00_PB-3.pdf
SECURITY THREATS AND VULNERABILITIES ON ENDPOINTS.
Compromises to the Guest OS, Hypervisors and Separation
Kernels, ④+⑤: These software layers control allocation of
hardware resources to applications. Attacks to these layers can
Industrial Internet alter the behavior of the system, allow information flows to bypass
Industrial of Things security controls and enable attackers to gain privileged access to
Internet Volume G4: endpoint hardware and software resources. Once access is gained
Consortium Security to this layer, attackers will have opportunity to affect the entire https://www.iiconsortium.org/pdf/IIC_P
(IIC) Framework v1.0 8.1 software stack and further alter security controls built in to this level. UB_G4_V1.00_PB-3.pdf
SECURITY THREATS AND VULNERABILITIES ON ENDPOINTS.
Illicit changes to Application Software or exposed Application
Programming Interface (API), ⑥+⑦+⑧+⑨: Endpoint applications
are often the target for malware or an attacker seeking to infiltrate
and compromise the endpoint. Execution of malicious applications
Industrial Internet or overriding of application APIs can adversely impact the
Industrial of Things trustworthiness of the endpoint. Exposed APIs should also be
Internet Volume G4: protected against denial of service attack where continuous access
Consortium Security from unauthorized users could limit the responsiveness and access https://www.iiconsortium.org/pdf/IIC_P
(IIC) Framework v1.0 8.1 to the exposed functionality. UB_G4_V1.00_PB-3.pdf
Department for Digital, Culture, Media and Sport 157
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
SECURITY THREATS AND VULNERABILITIES ON ENDPOINTS.
Vulnerabilities of the Deployment Process, ⑩: Errors and potential
malicious code may also infiltrate the endpoint as part of the
deployment process, for example, incorrect or malicious installation
Industrial Internet scripts, intercepted communications, or unauthorized replacement
Industrial of Things of a package on the update server. Reduction of possible endpoint
Internet Volume G4: configurations in large-scale endpoint deployments will be important
Consortium Security in reducing complexity and vulnerabilities in the deployment https://www.iiconsortium.org/pdf/IIC_P
(IIC) Framework v1.0 8.1 process. UB_G4_V1.00_PB-3.pdf
SECURITY THREATS AND VULNERABILITIES ON ENDPOINTS.
Vulnerabilities in the Development Environment, ⑮: The
introduction of weaknesses during the software development
Industrial Internet lifecycle can leave the IIoT systems susceptible to attack. These
Industrial of Things weaknesses may be introduced during architecting, designing, or
Internet Volume G4: writing of the code. Use of vulnerable or malicious libraries or
Consortium Security untrusted development frameworks may lead to their inclusion in https://www.iiconsortium.org/pdf/IIC_P
(IIC) Framework v1.0 8.1 the resulting code running in the IIoT system. UB_G4_V1.00_PB-3.pdf
ESTABLISH ROOTS OF TRUST. The roots of trust (RoT), or trust
roots, consisting of hardware, software, people and organizational
processes, establish confidence in the system. An endpoint without
a correctly implemented RoT will lack the ability to establish
Industrial Internet confidence that it will behave as intended.
Industrial of Things The root of trust on a device determines the level of confidence in
Internet Volume G4: the authenticity of the credentials belonging to that particular
Consortium Security device. The root of trust should be able to generate, manage and https://www.iiconsortium.org/pdf/IIC_P
(IIC) Framework v1.0 8.4 store at least one identity. UB_G4_V1.00_PB-3.pdf
Industrial Internet
Industrial of Things RUNTIME INTEGRITY. After the boot-process integrity has been
Internet Volume G4: attested to, the OS is running and applications can execute.
Consortium Security Runtime integrity controls monitor, and ideally, enforce the integrity https://www.iiconsortium.org/pdf/IIC_P
(IIC) Framework v1.0 8.7.2 of the endpoint beyond the boot process UB_G4_V1.00_PB-3.pdf
Department for Digital, Culture, Media and Sport 158
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance The product’s processor system has an irrevocable Secure Boot Security-Compliance-
Foundation Framework 1.1 2.4.4.1 process. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance Security-Compliance-
Foundation Framework 1.1 2.4.4.4 The Secure Boot process is enabled by default. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security Where the product has a secure source of time there is a method of p-content/uploads/2017/12/IoT-
IoT Security Compliance validating its integrity, such as Secure NTP. Security-Compliance-
Foundation Framework 1.1 2.4.8.2 https://www.ntpsec.org/. Framework_WG1_2017.pdf
Department for Digital, Culture, Media and Sport 159
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance To prevent the stalling or disruption of the devices software Security-Compliance-
Foundation Framework 1.1 2.4.5.6 operation any watchdog timers for this purpose cannot be disabled. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance The product’s software signing root of trust is stored in Security-Compliance-
Foundation Framework 1.1 2.4.5.7 tamperresistant memory. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance The product has protection against reverting the software to an Security-Compliance-
Foundation Framework 1.1 2.4.5.8 earlier and potentially less secure version. Framework_WG1_2017.pdf
Department for Digital, Culture, Media and Sport 160
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance The device remains secure and maintains state during a side Security-Compliance-
Foundation Framework 1.1 2.4.5.22 channel attack. Framework_WG1_2017.pdf
The software has been designed to fail safely, i.e. in the case of https://www.iotsecurityfoundation.org/w
IoT Security unexpected invalid inputs, or erroneous software operation, the p-content/uploads/2017/12/IoT-
IoT Security Compliance product does not become dangerous, or compromise security of Security-Compliance-
Foundation Framework 1.1 2.4.5.24 other connected systems. Framework_WG1_2017.pdf
Where a product includes a trusted secure boot process, the entire https://www.iotsecurityfoundation.org/w
IoT Security production test and any related calibration is executed with the p-content/uploads/2017/12/IoT-
IoT Security Compliance processor system operating in its secured boot, authenticated Security-Compliance-
Foundation Framework 1.1 2.4.14.5 software mode. Framework_WG1_2017.pdf
IoT Security Security Design Fingerprint and validate the integrity of critical system operating https://www.iotsi.org/security-best-
Initiative Best Practices thresholds or parameters. practices
IoT Security Security Design Make use of secure boot, secure micro-kernels and hardware https://www.iotsi.org/security-best-
Initiative Best Practices virtualization capabilities whenever possible. practices
Department for Digital, Culture, Media and Sport 161
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Development of secure software requires ground-up thinking about
security, from the inception of the project all the way to its
Follow secure implementation, testing, and deployment. The choices of platforms,
software languages, and tools are all influenced with this methodology. The https://docs.microsoft.com/en-
IoT Security Best development Microsoft Security Development Lifecycle provides a step-by-step us/azure/iot-fundamentals/iot-security-
Microsoft Practices methodology approach to building secure software. best-practices
Open-source software provides an opportunity to quickly develop
solutions. When you're choosing open-source software, consider
the activity level of the community for each open-source
component. An active community ensures that software is
Choose open- supported and that issues are discovered and addressed. https://docs.microsoft.com/en-
IoT Security Best source software Alternatively, an obscure and inactive open-source software project us/azure/iot-fundamentals/iot-security-
Microsoft Practices with care might not be supported and issues are not likely be discovered. best-practices
Many software security flaws exist at the boundary of libraries and
APIs. Functionality that may not be required for the current
deployment might still be available via an API layer. To ensure https://docs.microsoft.com/en-
IoT Security Best overall security, make sure to check all interfaces of components us/azure/iot-fundamentals/iot-security-
Microsoft Practices Integrate with care being integrated for security flaws. best-practices
In order to ensure that all components of a device are operating
properly and have not been tampered with, it is best to ensure that
Open the device is booted properly. There may be multiple stages of boot.
Connectivity The end result is an application running on top an operating system
Foundation OIC Security that takes advantage of memory, CPU and peripherals through https://openconnectivity.org/specs/OIC
(OCF) Specification v1.1.1 15.2.1 drivers. _Security_Specification_v1.1.1.pdf
Open Secure download and boot – To prevent the loading and execution
Connectivity of malicious software, where it is practical, it is recommended that
Foundation OIC Security Secure Download and Secure Boot methods that authenticate a https://openconnectivity.org/specs/OIC
(OCF) Specification v1.1.1 15.1.1.3 binary’s source as well as its contents be used. _Security_Specification_v1.1.1.pdf
Department for Digital, Culture, Media and Sport 162
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Software and
Information
Industry Empowering the http://www.siia.net/Portals/0/pdf/Policy/
Association Internet of Things: Policies for Embedded Software Should Provide for Product Reports/Empowering%20the%20Intern
(SIIA) Benefits 6 Integrity et%20of%20Things.pdf
In powering up, each device boots and runs some code. In that
context, it is crucial that we ensure devices only do what we
programmed them to do, and ensure that others cannot reprogram
them to behave maliciously. In other words, the first step in
protecting a device is to protect the code to be sure the device only
boots and runs code that you want it running. Fortunately, many
chipmakers already build “secure boot” capabilities into their chips.
Similarly, for “higher level” code, a number of time-proven,
opensource, and client-side libraries like OpenSSL can easily be
used to check signatures of code, and accept code only if it comes
from an authorized source. In that context, signing firmware, boot
images, and higherlevel embedded code are all increasingly
common, including signing the underlying software components
such as any operating system, and not just applications, but all
An Internet of code on the device. This approach can ensure that all critical
Things Security components, sensors, actuators, controllers, and relays are all https://www.symantec.com/content/da
Reference properly configured to only run signed code and never run unsigned m/symantec/docs/white-papers/iot-
Symantec Architecture code. security-reference-architecture-en.pdf
Department for Digital, Culture, Media and Sport 163
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Secure Evolvability. The principle of secure evolvability states that
a system should be developed to facilitate the maintenance of its
security properties when there are changes to its functionality
structure, interfaces, and interconnections (i.e., system architecture)
or its functionality configuration (i.e., security policy enforcement).
These changes may include for example: new, enhanced, and
upgraded system capability; maintenance and sustainment
US National activities; and reconfiguration. Although it is not possible to plan for
Institute of every aspect of system evolution, system upgrades and changes
Standards and NIST SP.800-160 can be anticipated by analyses of mission or business strategic
Technology Systems Security direction; anticipated changes in the threat environment; and https://nvlpubs.nist.gov/nistpubs/Speci
(NIST) Engineering F.1.8 anticipated maintenance and sustainment needs. alPublications/NIST.SP.800-160.pdf
US National Self-Reliant Trustworthiness. The principle of self-reliant
Institute of trustworthiness states that systems should minimize their reliance
Standards and NIST SP.800-160 on other systems for their own trustworthiness. A system should be
Technology Systems Security trustworthy by default with any connection to an external entity used https://nvlpubs.nist.gov/nistpubs/Speci
(NIST) Engineering F.1.16 to supplement its function. alPublications/NIST.SP.800-160.pdf
Self-Analysis. The principle of self-analysis states that a
component must be able to assess its internal state and
functionality to a limited extent at various stages of execution, and
that this self-analysis capability must be commensurate with the
level of trustworthiness invested in the system. At the system level,
self-analysis can be achieved via hierarchical trustworthiness
assessments established in a bottom up fashion. In this approach,
US National the lower-level components check for data integrity and correct
Institute of functionality (to a limited extent) of higher-level components. For
Standards and NIST SP.800-160 example, trusted boot sequences involve a trusted lower-level
Technology Systems Security component attesting to the trustworthiness of the next higher-level https://nvlpubs.nist.gov/nistpubs/Speci
(NIST) Engineering F.2.3 components so that a transitive chain of trust can be established. alPublications/NIST.SP.800-160.pdf
Department for Digital, Culture, Media and Sport 164
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
US National
Institute of Defense in Depth. Defense in depth describes security
Standards and NIST SP.800-160 architectures constructed through the application of multiple
Technology Systems Security mechanisms to create a series of barriers to prevent, delay, or deter https://nvlpubs.nist.gov/nistpubs/Speci
(NIST) Engineering F.4.2 an attack by an adversary. alPublications/NIST.SP.800-160.pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
2. Privacy as the Default Setting
Privacy by Design seeks to deliver the maximum degree of privacy
Alliance for by ensuring that personal data are automatically protected in any
Internet of given IT system or business practice. If an individual does nothing,
Things their privacy still remains intact. No action is required on the part of https://aioti.eu/wp-
Innovation Report: Working the individual to protect their privacy – it is built into the product, by content/uploads/2017/03/AIOTIWG04
(AIOTI) Group 4 – Policy 5 default. Report2015-Policy-Issues.pdf
Alliance for
Internet of 3. End-to-End Security – Full Lifecycle Protection
Things Privacy by Design extends throughout the entire lifecycle of the https://aioti.eu/wp-
Innovation Report: Working data involved, from start to finish. This ensures that at the end of content/uploads/2017/03/AIOTIWG04
(AIOTI) Group 4 – Policy 5 the process, all data are securely destroyed, in a timely fashion. Report2015-Policy-Issues.pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Alliance for Workshop on Awareness & Technically regulating access to data to define who can use it for https://aioti-space.org/wp-
Internet of Security and Information what purpose, and how that can be made transparent, and content/uploads/2017/03/AIOTI-
Things Privacy in the Supplied with subsequently measured and monitored. Design in a transparent Workshop-on-Security-and-Privacy-in-
Innovation Hyper connected Indication of way, so the data subject is and remains clear and aware of privacy the-Hyper-connected-World-Report-
(AIOTI) World Purpose issues, choices it makes and possible consequences thereof. 20160616_vFinal.pdf
Alliance for
Internet of https://aioti.eu/wp-
Things AIOTI Digitisation Promote transparency about what data is collected (including content/uploads/2017/03/AIOTI-
Innovation of Industry Policy 3.32 (ii) First bullet passive collection in smart spaces and smart cities) and do so in a Digitisation-of-Ind-policy-doc-Nov-
(AIOTI) Recommendations point way which is clear and simple for the user 2016.pdf
Alliance for
Internet of https://aioti.eu/wp-
Things AIOTI Digitisation Implement privacy enhancing techniques such as data content/uploads/2017/03/AIOTI-
Innovation of Industry Policy 3.32 (ii) Second segmentation, segregation, aggregation, pseudonymisation, Digitisation-of-Ind-policy-doc-Nov-
(AIOTI) Recommendations bullet point tokENISAtion and anonymization to the extent possible. 2016.pdf
Department for Digital, Culture, Media and Sport 167
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Atlantic
Council
Scowcroft Describe the ways in which customer data is used or will be used,
Center for Smart Homes and as well as methods for consumers to opt out. This includes change http://www.atlanticcouncil.org/images/p
Strategy and the Internet of in ownership of the company, or sharing information with third- ublications/Smart_Homes_0317_web.
Security Things parties. pdf
Broadband
Internet Internet of Things IoT Devices Should Ship with a Privacy Policy That is Easy to http://www.bitag.org/documents/BITAG
Technical (IoT) Security and Find & Understand. BITAG recommends that IoT devices ship with _Report_-
Advisory Privacy a privacy policy, but that policy must be easy for a typical user to _Internet_of_Things_(IoT)_Security_a
Group (BITAG) Recommendations 7.7 find and understand. nd_Privacy_Recommendations.pdf
City of New The City should make processes and policies related to IoT and
York (NYC) IoT-related data publicly available in an up-to-date, clear and
Guidelines for comprehensive manner. IoT principles, guidelines, operational
the Internet of Privacy + policies and responsibilities should be transparent and made public https://iot.cityofnewyork.us/privacy-
Things Transparency 1.1 via a City government website. and-transparency/
Data and information collected by IoT devices should be classified
and treated accordingly, per the City of New York’s Data
City of New Classification Policy, as Public, Sensitive, Private or Confidential.
York (NYC) All personally identifiable information (PII) should be classified at a
Guidelines for minimum as private. All data that is classified as being confidential,
the Internet of Privacy + or personally identifiable, should be protected from unauthorized https://iot.cityofnewyork.us/privacy-
Things Transparency 1.3 use and disclosure. and-transparency/
PII should by default be anonymized before being shared in any
City of New way that could make the information publicly searchable or
York (NYC) discoverable. Any copies and reproductions must have the same or
Guidelines for higher level of classification as the original. Any combinations of
the Internet of Privacy + data should be reclassified according to the City’s Data https://iot.cityofnewyork.us/privacy-
Things Transparency 1.4 Classification Policy. and-transparency/
Department for Digital, Culture, Media and Sport 168
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
City of New
York (NYC) PII data types should have a clearly associated retention policy and
Guidelines for disposal procedure. Sensitive, private or confidential data should be
the Internet of Privacy + kept for no longer than is operationally necessary or required for the https://iot.cityofnewyork.us/privacy-
Things Transparency 1.5 specified, explicit and legitimate purposes. and-transparency/
City of New Before any sensitive, private, or confidential data is shared outside
York (NYC) the originating City agency, the agency should ensure that the need
Guidelines for cannot be met by using anonymized or aggregated data and that
the Internet of Privacy + the appropriate protections are in place to preserve the https://iot.cityofnewyork.us/privacy-
Things Transparency 1.6 confidentiality of the data. and-transparency/
Security Guidance Stakeholders should be able to easily identify the data collected https://downloads.cloudsecurityalliance
for Early Adopters from them for any particular IoT system, as well as the planned or .org/whitepapers/Security_Guidance_f
Cloud Security of the Internet of potential uses for that data. Stakeholders should also be allowed to or_Early_Adopters_of_the_Internet_of
Alliance (CSA) Things (IoT) 5.1.5 opt in to data collection, at both a coarse and granular level. _Things.pdf
Department for Digital, Culture, Media and Sport 169
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
http://ec.europa.eu/information_society
Report on /newsroom/image/document/2017-
European Workshop on 15/final_report_20170113_v0_1_clean
Commission Security & Privacy Data control by the user – in any phase of the data life cycle and _778231E0-BC8E-B21F-
and AIOTI in IoT 1) 1) product life cycle 18089F746A650D4D_44113.pdf
http://ec.europa.eu/information_society
Report on Transparency and user interface control – empower the user to /newsroom/image/document/2017-
European Workshop on obtain sufficient knowledge on what its devices and related system 15/final_report_20170113_v0_1_clean
Commission Security & Privacy are doing and sharing, even if it concerns M2M communications _778231E0-BC8E-B21F-
and AIOTI in IoT 1) 2) and transactions 18089F746A650D4D_44113.pdf
European
Union Agency
for Network Personal data must be collected and processed fairly and
and lawfully. The fairness principle specifically requires that personal
Information Baseline Security data https://www.ENISA.europa.eu/publicati
Security Recommendations should never be collected and processed without the data subject’s ons/baseline-security-
(ENISA) for IoT GP-TM-10 consent. recommendations-for-iot
Department for Digital, Culture, Media and Sport 170
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
European
Union Agency
for Network Make sure that personal data is used for the specified
and purposes for which they were collected, and that any further
Information Baseline Security processing of personal data is compatible and that the data https://www.ENISA.europa.eu/publicati
Security Recommendations subjects ons/baseline-security-
(ENISA) for IoT GP-TM-11 are well informed. recommendations-for-iot
Minimise the data collected and retained. Many IoT
stakeholders only need aggregated data and have no need of the
European raw
Union Agency data collected by IoT devices. Stakeholders must delete raw data
for Network as
and soon as they have extracted the data required for their data
Information Baseline Security processing. As a principle, deletion should take place at the nearest https://www.ENISA.europa.eu/publicati
Security Recommendations point of data collection of raw data (e.g. on the same device after ons/baseline-security-
(ENISA) for IoT GP-TM-12 processing). recommendations-for-iot
European IoT stakeholders must be compliant with the EU General
Union Agency Data Protection Regulation (GDPR). The complex mesh of
for Network stakeholders involved asks for/implies the necessity of a precise
and allocation of legal responsibilities among them with regard to the
Information Baseline Security processing of the individual’s personal data, based on the https://www.ENISA.europa.eu/publicati
Security Recommendations specificities ons/baseline-security-
(ENISA) for IoT GP-TM-13 of their respective interventions. recommendations-for-iot
European
Union Agency
for Network Users of IoT products and services must be able to
and exercise their rights to information, access, erasure, rectification,
Information Baseline Security data portability, restriction of processing, objection to processing, https://www.ENISA.europa.eu/publicati
Security Recommendations and their right not to be evaluated on the basis of automated ons/baseline-security-
(ENISA) for IoT GP-TM-14 processing. recommendations-for-iot
Department for Digital, Culture, Media and Sport 171
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
European
Union Agency
for Network Data processed by a third-party (i.e., if the organisation
and utilises a cloud email provider), must be protected by a data
Information Baseline Security processing agreement with the third-party. With the transference of https://www.ENISA.europa.eu/publicati
Security Recommendations data, the responsibility of protecting that data also should be ons/baseline-security-
(ENISA) for IoT GP-OP-12 transferred and compliance verified. recommendations-for-iot
European Only share consumers’ personal data with third parties
Union Agency with consumers’ affirmative consent, unless required and limited for
for Network the use of product features or service operation. Require that
and thirdparty
Information Baseline Security service providers are held to the same polices including holding https://www.ENISA.europa.eu/publicati
Security Recommendations such data in confidence and notification requirements of any data ons/baseline-security-
(ENISA) for IoT GP-OP-13 loss/breach incident and/or unauthorised access. recommendations-for-iot
European
Union Agency
for Network
and
Information Baseline Security Privacy must be a guiding principle when designing and https://www.ENISA.europa.eu/publicati
Security Recommendations developing systems, in order to make privacy an integral part of the ons/baseline-security-
(ENISA) for IoT GP-PS-08 system. recommendations-for-iot
Data integrity and confidentiality must be enforced by access
European controls. When the subject requesting access has been authorised
Union Agency to access particular processes, it is necessary to enforce the
for Network defined security policy. The effectiveness and the strength of
and access control depend on the correctness of the access control
Information Baseline Security decisions (e.g., how the security rules are configured) and the https://www.ENISA.europa.eu/publicati
Security Recommendations strength of access control enforcement (e.g., the design of software ons/baseline-security-
(ENISA) for IoT GP-TM-29 management or hardware security). recommendations-for-iot
Department for Digital, Culture, Media and Sport 172
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
European
Union Agency
for Network
and Security and
Information Resilience of Smart User data protection: the integrity, confidentiality and authenticity of
Security Home 5.2, fourth bullet user data must be protected. Confidentiality protection must be https://www.ENISA.europa.eu/publicati
(ENISA) Environments point defined with regards to privacy issues. ons/security-resilience-good-practices
European
Union Agency Users shall verify the authorisations given to devices and services
for Network for data access and data exchange. This is particularly true in case
and Security and of an update where access rights may be modified without user’s
Information Resilience of Smart consent. For example, devices and services can display a
Security Home comprehensive view of their communications with external devices https://www.ENISA.europa.eu/publicati
(ENISA) Environments 7.1 and services, their requirement to use private data, etc. ons/security-resilience-good-practices
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Service are, and the ability to turn off the exposure of this
information to the business or its partners. This granularity and opt-
out system will help to ensure that users have the right and the
ability to control the information that they share about themselves
and their physical world.
GSMA Build an API for Users to Control Privacy Attributes. All users must
be able to control what information they offer to third parties,
through service
APIs. The information should be classified into types of data, and
attributed with security
classifications. Users should be able to retrieve the types of data
and classifications that are
IoT Security used in the modelling of their account. The user should be able to
Guidelines for apply constraints to the https://www.gsma.com/iot/wp-
Service types of data, to allow them to grant or revoke access to this data to content/uploads/2017/10/CLP.13-
Ecosystems CLP12_8.3 Partners. v2.0.pdf
GSMA To properly manage interactions with Partner organizations
IoT Security effectively, security classifications must be defined. This will set the
Guidelines for tone for not only the internal organizational policy on data security, https://www.gsma.com/iot/wp-
Service but will help define the level of security Partner organizations apply content/uploads/2017/10/CLP.13-
Ecosystems CLP12_5.11 to the business’s data, their own data, and customer’s data. v2.0.pdf
Department for Digital, Culture, Media and Sport 174
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
GSMA After defining security classifications, the organization should define
types of data to be used by the overall IoT product or service. This
will enable the organization to clearly define what types of
information are acquired, generated, and disseminated to peers in
the IoT system, and how the organization should treat these types
of data. This data will provide context and value to the overall
components used throughout the IoT environment.
While this document will not attempt to model all variations of data
that may be relevant to a specific organization, certain types may
be as follows:
• Users
• Actions
IoT Security • Images
Guidelines for • Editable documents https://www.gsma.com/iot/wp-
Service • Personally-Identifiable Information content/uploads/2017/10/CLP.13-
Ecosystems CLP12_5.12 • Protected Health Information v2.0.pdf
GSMA While the privacy model deals with the way user’s information is
offered to Partners, the
authorization model defines how the business or Partners will act
on behalf of a user. This,
for instance, would come in handy for a home automation system
where a Partner’s metrics
could optimize the use of heating or cooling in a given home. The
IoT Security authorization model would
Guidelines for grant the Partner the ability to change heating or cooling controls for https://www.gsma.com/iot/wp-
Service that user’s home when content/uploads/2017/10/CLP.13-
Ecosystems CLP12_6.1 certain metrics were detected by the Partner. v2.0.pdf
GSMA Defining policies and procedures for the classification of data is not
enough. There must also be a model for detecting whether the data
IoT Security has been exposed by a Partner. The organization must have a plan
Guidelines for in place to evaluate whether a Partner was involved in business https://www.gsma.com/iot/wp-
Service practices that breach the technological controls or policies set in content/uploads/2017/10/CLP.13-
Ecosystems CLP12_6.7 place to guard user’s data and privacy. v2.0.pdf
Department for Digital, Culture, Media and Sport 175
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
GSMA After security classifications have been defined, and data types
have been attributed a valid classification, and a breach policy has
been enacted, a data distribution policy should be generated. A
data distribution policy describes how information should be
IoT Security processed through technical controls and out to service applications
Guidelines for that have been granted permission to access the data. The https://www.gsma.com/iot/wp-
Service permissions model is a part of the data distribution policy, and pairs content/uploads/2017/10/CLP.13-
Ecosystems CLP12_7.4 with the user’s ability to create granular data permissions. v2.0.pdf
GSMA All users must be able to control what information they offer to third
parties, through service APIs. The information should be classified
into types of data, and attributed with security classifications. Users
should be able to retrieve the types of data and classifications that
are used in the modelling of their account. The user should be able
to apply constraints to the types of data, to allow them to grant or
revoke access to this data to Partners.
IoT Security
Guidelines for This can come in the form of an authenticated API, or a GUI that https://www.gsma.com/iot/wp-
Service allows simple Yes or No controls on a general, and per-Partner content/uploads/2017/10/CLP.13-
Ecosystems CLP12_8.3 basis. v2.0.pdf
The basic idea of IoT is to connect everyday objects via Internet or
ad-hoc network. IoT devices provide services that are discoverable
by other IoT devices. Most of the protocols leak sensitive personally
identifiable information (PII,) like owner's name or information that
may be linkable to an individual, like a device’s host name. This
IoT Security information can be linked to other information sources to target https://internetinitiative.ieee.org/images
Principles and Best attacks. Service mechanisms and authentication protocols are /files/resources/white_papers/internet_
IEEE Practices 9 required so that only authorized clients can discover the device. of_things_feb2017.pdf
Department for Digital, Culture, Media and Sport 176
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
IERC-
European IoT Governance, Stick flow policies combine sticky policies for data with their flow
Research Privacy and policies, i.e. a data item in a system using this technology is http://www.internet-of-things-
Cluster on the Security Issues - annotated with a security policy which describes how a data item research.eu/pdf/IERC_Position_Paper
Internet of IERC Position can be used and which conditions have to be satisfied before an _IoT_Governance_Privacy_Security_F
Things (IERC) Paper item can flow to another entity. inal.pdf
Context-sharing enabled objects must be able to answer the
question which information should be shared with whom. This
question can be automatically answered, if the object has a fine-
grained privacy policy that contains both the trusted objects and the
context characteristics allowed for sharing. Additionally, an object
IERC- needs mechanisms that enforce this policy. The contents of a policy
European IoT Governance, are typically user and thus, object dependent. Many users have
Research Privacy and different opinions about what kind of context should be regarded as http://www.internet-of-things-
Cluster on the Security Issues - private and not every object supports all types of context. As a research.eu/pdf/IERC_Position_Paper
Internet of IERC Position consequence, we can expect that some policies might be more _IoT_Governance_Privacy_Security_F
Things (IERC) Paper restrictive than others. inal.pdf
IERC- The same ability of third parties to know that two entities are
European IoT Governance, exchanging data can be a violation of privacy. Both users and
Research Privacy and services might need to operate in given scenarios without releasing http://www.internet-of-things-
Cluster on the Security Issues - identification, addressing or other sensitive information the other research.eu/pdf/IERC_Position_Paper
Internet of IERC Position endpoint. This can be in conflict with the some requirements related _IoT_Governance_Privacy_Security_F
Things (IERC) Paper to authentication, authorization and non-repudiation. inal.pdf
Department for Digital, Culture, Media and Sport 177
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
DATA CONFIDENTIALITY. Data confidentiality refers to ensuring
that information is not disclosed to unauthorized parties. To
implement this, cryptography renders data unintelligible to
unauthorized entities that do not have the proper key for decryption
of the data. The algorithm must be designed and implemented to
ensure that no unauthorized party can determine the keys
associated with the encryption or derive the plaintext. Data
confidentiality is often mandated by regulations, in particular when
privacy of the records is important or the record contains personally
identifiable information (PII).
Industrial Internet Some fields in a record may contain sensitive data that requires
Industrial of Things confidentiality while other fields need to be processed by an
Internet Volume G4: application. In this case, data tokenization can replace sensitive
Consortium Security fields or the value can be modified so confidentiality and privacy of https://www.iiconsortium.org/pdf/IIC_P
(IIC) Framework v1.0 8.8.1 those fields is preserved UB_G4_V1.00_PB-3.pdf
Privacy and security are critical building blocks for our nation’s IoT
Policy Framework ecosystem – and capabilities that must be designed into our IoT https://www.intel.com/content/dam/ww
for the Internet of Privacy and systems from the outset using the best known Privacy-by-Design w/public/us/en/documents/corporate-
Intel Things (IoT) Security methodologies. information/policy-iot-framework.pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
1. Identification - refers to the identification of the users, their IoT
devices, and generated data.
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
When IoT systems are deployed, the above issues should be
considered to ensure that private data remains private. These
issues are particularly challenging in environments in which multiple
users with different privacy preferences interact with the same IoT
devices. For example, an IoT device controlled by user A (low
privacy settings) might leak private information about another user
B (high privacy settings). How to deal with these threats in practice
is an area of ongoing research.
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
consider those interests a core element of the product-development
process.
IoT devices that collect data about people in one jurisdiction may
transmit that data to another jurisdiction for data storage or
processing. Challenges can arise if the data collected is deemed to
be personal or sensitive and is subject to data protection laws in
multiple jurisdictions.
The Internet of
Things: An Internet Enabling cross-border data flows that protect privacy and promote https://www.internetsociety.org/wp-
Internet Society Public legal certainty for users and IoT service providers will be key for content/uploads/2017/09/ISOC-
Society (ISOC) Policy Briefing Privacy promoting the global growth of IoT PolicyBrief-IoT.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance The product/service stores the minimum amount of Personal Security-Compliance-
Foundation Framework 1.1 2.4.12.1 Information from users. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance The product/service ensures that all Personal Information is Security-Compliance-
Foundation Framework 1.1 2.4.12.2 encrypted at rest and in transit. Framework_WG1_2017.pdf
Department for Digital, Culture, Media and Sport 182
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance The product/service ensures that only authorised personnel have Security-Compliance-
Foundation Framework 1.1 2.4.12.3 access to personal data of users. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance The product/service ensures that Personal Information is Security-Compliance-
Foundation Framework 1.1 2.4.12.4 anonymised whenever possible and in particular in any reporting. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security The Product Manufacturer or Service Provider shall ensure that a p-content/uploads/2017/12/IoT-
IoT Security Compliance data retention policy is in place, and compliant with the legal Security-Compliance-
Foundation Framework 1.1 2.4.12.5 requirements for the territories the product or service is deployed. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security There is a method or methods for the product owner to be informed p-content/uploads/2017/12/IoT-
IoT Security Compliance about what Personal Information is collected, why, where it will be Security-Compliance-
Foundation Framework 1.1 2.4.12.6 stored. Framework_WG1_2017.pdf
Department for Digital, Culture, Media and Sport 183
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance There is a method or methods for the product owner to check/verify Security-Compliance-
Foundation Framework 1.1 2.4.12.7 what Personal Information is collected and deleted. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security The product / service can be made compliant with the local and/or p-content/uploads/2017/12/IoT-
IoT Security Compliance regional Personal Information protection legislation where the Security-Compliance-
Foundation Framework 1.1 2.4.12.8 product is to be sold. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security The supplier or manufacturer of any device shall provide p-content/uploads/2017/12/IoT-
IoT Security Compliance information about how the device(s) functions within the end user’s Security-Compliance-
Foundation Framework 1.1 2.4.12.9 network. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security The supplier or manufacturer of any devices or devices shall p-content/uploads/2017/12/IoT-
IoT Security Compliance provide information about how the device(s) shall be setup to Security-Compliance-
Foundation Framework 1.1 2.4.12.10 maintain the end user’s privacy and security. Framework_WG1_2017.pdf
Department for Digital, Culture, Media and Sport 184
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security The supplier or manufacturer of any devices or services shall p-content/uploads/2017/12/IoT-
IoT Security Compliance provide clear information about the end user’s responsibilities to Security-Compliance-
Foundation Framework 1.1 2.4.12.12 maintain the devices and/or services privacy and security. Framework_WG1_2017.pdf
IoT Security CyberSecurity A device clearly identifies the collection or processing of personally https://www.iotsi.org/iot-cybersecurity-
Initiative Principles of IoT PRINCIPLE 20 identifiable data in the Device Support-Level Agreement (DSLA). principles
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
The physical location in which data is stored may be regulated, with
the regulations varying from country to country. This is particularly
Object the case for personally identifiable information (PII) and for sensitive
Management data such as health data and financial records. The European
Group (OMG) Union has particularly stringent regulations that apply to the PII of
Cloud European citizens. As a result, any IoT cloud system must take into
Standards account data sovereignty rules and store and process data only in
Customer those locations permitted by the regulations – this requires that the https://www.omg.org/cloud/deliverable
Council Cloud Customer provider cloud used provides the cloud service customer with s/CSCC-Cloud-Customer-Architecture-
(CSCC) Architecture for IoT Data Sovereignty control over storage and processing locations. for-IoT.pdf
Although a user of a M2M System is generally considered to be an
application or functional agent that represents a human, there are
links between a device and its user that can be either directly
derived or indirectly deduced. Consequently, identifiers used for
communication in the M2M System should not be directly related to
TR-0008-V2.0.1 the real identity of either the device or its user, except where this is http://www.onem2m.org/images/files/d
Security (Technical a requirement for operation of a specific M2M Application. The use eliverables/Release2A/TR-0008-
oneM2M Report) 9.3 of pseudonyms is a means to support this requirement. Security-v_2_0_1.pdf
Conspicuously disclose what personally identifiable and sensitive
data types and attributes are collected and how they are used,
IoT Security & limiting collection to data which is reasonably useful for the https://otalliance.org/system/files/files/i
Online Trust Privacy Trust functionality and purpose for which it is being collected. Disclose nitiative/documents/iot_trust_framewor
Alliance (OTA) Framework v2.5 20 and provide consumer opt-in for any other purposes. k6-22.pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Only share consumers’ personal data with third parties with
consumers’ affirmative consent, unless required and limited for the
use of product features or service operation. Require that third-party
IoT Security & service providers are held to the same polices, including holding https://otalliance.org/system/files/files/i
Online Trust Privacy Trust such data in confidence and notification requirements of any data nitiative/documents/iot_trust_framewor
Alliance (OTA) Framework v2.5 25 loss/breach incident and/or unauthorized access. k6-22.pdf
IoT Security & Provide controls and/or documentation enabling the consumer to https://otalliance.org/system/files/files/i
Online Trust Privacy Trust review and edit privacy preferences of the IoT device including the nitiative/documents/iot_trust_framewor
Alliance (OTA) Framework v2.5 26 ability to reset to the “factory default.” k6-22.pdf
Commit to not sell or transfer any identifiable consumer data unless
it is a dependent part of the sale or liquidation of the core business
IoT Security & which originally collected the data, provided the acquiring party’s https://otalliance.org/system/files/files/i
Online Trust Privacy Trust privacy policy does not materially change the terms. Otherwise nitiative/documents/iot_trust_framewor
Alliance (OTA) Framework v2.5 27 notice and consent must be obtained. k6-22.pdf
Whenever the opportunity is presented to decline or opt out of any
policy, the consequences must be clearly and objectively explained,
IoT Security & including any impact to product features or functionality. It is https://otalliance.org/system/files/files/i
Online Trust Privacy Trust recommended the end-user value of opting in and/or sharing data nitiative/documents/iot_trust_framewor
Alliance (OTA) Framework v2.5 29 be communicated to the end user. k6-22.pdf
IoT Security & Comply with applicable regulations, including but not limited to the https://otalliance.org/system/files/files/i
Online Trust Privacy Trust Children’s Online Privacy Protection Act (COPPA) and international nitiative/documents/iot_trust_framewor
Alliance (OTA) Framework v2.5 30 privacy, security and data transfer regulatory requirements. 3 4 k6-22.pdf
IoT Security & Publicly post the history of material privacy notice changes for a https://otalliance.org/system/files/files/i
Online Trust Privacy Trust minimum of two years. Best practices include date stamping, nitiative/documents/iot_trust_framewor
Alliance (OTA) Framework v2.5 31 redlines, and summary of the impacts of the changes. k6-22.pdf
Department for Digital, Culture, Media and Sport 187
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Open Web
Application
Security
Project IoT Security I5: Privacy Ensure only the minimal amount of personal information is collected https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Concerns from consumers Security_Guidance
Open Web
Application
Security
Project IoT Security I5: Privacy Ensure all collected personal data is properly protected using https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Concerns encryption at rest and in transit Security_Guidance
Open Web
Application
Security
Project IoT Security I5: Privacy Ensure only authorized individuals have access to collected https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Concerns personal information Security_Guidance
Open Web
Application
Security
Project IoT Security I5: Privacy https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Concerns Ensuring data is de-identified or anonymized Security_Guidance
Open Web
Application
Security
Project IoT Security I5: Privacy https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Concerns Ensuring a data retention policy is in place Security_Guidance
Open Web
Application
Security
Project IoT Security I5: Privacy Ensuring end-users are given a choice for data collected beyond https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Concerns what is needed for proper operation of the device Security_Guidance
Department for Digital, Culture, Media and Sport 188
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Software and
Information
Industry Empowering the http://www.siia.net/Portals/0/pdf/Policy/
Association Internet of Things: Privacy Rights for the IoT Should Be Based on Risk and Societal Reports/Empowering%20the%20Intern
(SIIA) Benefits 2 Benefits. et%20of%20Things.pdf
https://www.tiaonline.org/wp-
Realizing the content/uploads/2018/05/Realizing_the
Telecommunic Potential of the Industry believes that IoT services must adopt principles similar to _Potential_of_the_Internet_of_Things_
ations Industry Internet of Things: those that have worked successfully on the Internet to enable -
Association Recommendations informed consumer choice: transparency about what data will be _Recommendations_to_Policymakers.
(TIA) to Policy Makers collected, how it will be used, and who will have access. pdf
Acceptable Security. The principle of acceptable security requires
that the level of privacy and performance the system provides
should be consistent with the users’ expectations. The perception of
personal privacy may affect user behavior, morale, and
effectiveness. Based on the organizational privacy policy and the
US National system design, users should be able to restrict their actions to
Institute of protect their privacy. When systems fail to provide intuitive
Standards and NIST SP.800-160 interfaces, or meet privacy and performance expectations, users
Technology Systems Security may either choose to completely avoid the system or use it in ways https://nvlpubs.nist.gov/nistpubs/Speci
(NIST) Engineering F.2.10 that may be inefficient or even insecure. alPublications/NIST.SP.800-160.pdf
Department for Digital, Culture, Media and Sport 189
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
home security camera should be accessible from within the home,
even when Internet connectivity fails.
The IoT Supply Chain Should Play Their Part In Addressing IoT
Security and Privacy Issues. Manufacturers should support for an
Broadband IoT device throughout the course of its lifespan, from design to the
Internet time when a device is retired, including transparency about the
Technical Internet of Things timespan over which they plan to provide continued support for a http://www.bitag.org/documents/BITAG
Advisory (IoT) Security and device, and what the consumer should expect from the device’s _Report_-
Group Privacy function at the end of the _Internet_of_Things_(IoT)_Security_a
(BITAG) Recommendations 7.1 device’s lifespan. nd_Privacy_Recommendations.pdf
Many cable operators have deployed DDoS monitoring and
mitigation systems to ensure the continued availability of their
broadband Internet access services during an attack. A DDoS
attack seeks to make a device, service, or network resource
unavailable to its intended users by flooding the target with
superfluous network traffic in an attempt to overload systems and
prevent legitimate traffic from getting through to the target of the
attack. A significant DDoS attack will typically originate from many
DDoS Monitoring thousands or hundreds of thousands of compromised devices. Both
A Vision for Secure and Mitigation the frequency and magnitude of DDoS attacks continue to grow, https://www.cablelabs.com/insights/visi
CableLabs IoT Systems fueled in large part by the proliferation of insecure IoT. on-secure-iot/
Department for Digital, Culture, Media and Sport 191
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
A secure IoT device is available when it is needed for its legitimate
use and unavailable when it is not. IoT devices should be designed
to function in a predictable and expected manner, if and when there
is a loss of broadband connectivity or a loss of communications with
any associated cloud service. Conversely, devices should use
restrictive, rather than permissive, default network traffic policies to
limit communications to expected norms, guarding against both
A Vision for Secure unintended as well as malicious denial of service attacks that can https://www.cablelabs.com/insights/visi
CableLabs IoT Availability disrupt the availability of the device or other devices on the network. on-secure-iot/
Source Address Validation (SAV) is a recommended best practice
for all ISPs, hosting providers, cloud providers and others to prevent
reflective DDoS attacks.[ SAV with spoofed packet dropping is
supported in Cable Modem Termination Systems (CMTS)
equipment deployed in cable access networks globally. This feature
became available in the Data Over Cable Service Interface
Specification (DOCSIS) release 3.0, first issued in 2006, as a
mandatory requirement. Moreover, the DOCSIS specification
A Vision for Secure Prevention of IP requires that SAV be turned on by default for DOCSIS 3.0 and 3.1 https://www.cablelabs.com/insights/visi
CableLabs IoT Address Spoofing compliant CMTS devices. on-secure-iot/
European
Union Agency
for Network
and
Information Baseline Security https://www.ENISA.europa.eu/publicati
Security Recommendations Rate limiting – controlling the traffic sent or received by ons/baseline-security-
(ENISA) for IoT GP-TM-46 a network to reduce the risk of automated attacks. recommendations-for-iot
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Security
(ENISA)
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
European
Union Agency
for Network
and
Information Baseline Security https://www.ENISA.europa.eu/publicati
Security Recommendations ons/baseline-security-
(ENISA) for IoT GP-PS-03 Security must consider the risk to human safety recommendations-for-iot
European
Union Agency
for Network
and
Information Baseline Security https://www.ENISA.europa.eu/publicati
Security Recommendations ons/baseline-security-
(ENISA) for IoT GP-PS-04 Designing for power conservation should not compromise security. recommendations-for-iot
For publicly accessible services, several pieces of security and
reliability technology are required to maintain the availability,
confidentiality, and integrity of the service:
DDoS-resistant infrastructure
IoT Security Load-Balancing infrastructure
Guidelines for Redundancy systems https://www.gsma.com/iot/wp-
Service Web Application Firewalls (optional) content/uploads/2017/10/CLP.12-
GSMA Ecosystems CLP12_5.4 Traditional Firewalls v2.0.pdf
For radio communications, there is a constant threat of jamming, or
the intentional broadcasting of noise or patterns that can be used to
IoT Security scramble legitimate signals. As radio signals are simply composed
Guidelines of electrons flying through space in a specific pattern, it is fairly https://www.gsma.com/iot/wp-
Endpoint easy to concoct a series of signals that interrupt or mangle the content/uploads/2017/10/CLP.13-
GSMA Ecosystem CLP13_9.1 pattern that forms communications data. v2.0.pdf
IoT Security
Guidelines https://www.gsma.com/iot/wp-
Endpoint content/uploads/2017/10/CLP.13-
GSMA Ecosystem CLP13_9.1 Intentional or Unintentional Denial of Service v2.0.pdf
Department for Digital, Culture, Media and Sport 194
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Components within an embedded system are designed to be used
within certain environmental thresholds. This includes voltage
levels, current draw, ambient or operating temperature, and
humidity. Each component is typically rated for certain windows of
approved levels. If the device is subjected to states above or below
a given window, the component may act erratically, or behave in a
fashion that is useful to an adversary.
Therefore, it is important to detect changes to these environmental
levels to determine whether the device should continue running, or
if it should power off. It should be noted, however, that powering off
may be a desired effect, and that the adversary may abuse this
IoT Security engineering decision to leverage a denial of service. The
Guidelines engineering team should evaluate this model to determine if it is https://www.gsma.com/iot/wp-
Endpoint more beneficial to shut down or more beneficial to attempt to stay content/uploads/2017/10/CLP.13-
GSMA Ecosystem CLP13_8.7 online v2.0.pdf
Endpoints that provide critical services to the user must be enabled
with a warning threshold that indicates power-related events. These
events may include:
Low battery state
IoT Security Critically low battery state
Guidelines Black-out events https://www.gsma.com/iot/wp-
Endpoint Brown-out events content/uploads/2017/10/CLP.13-
GSMA Ecosystem CLP13_8.8 Switch to battery back-up events v2.0.pdf
IoT Security
Guidelines https://www.gsma.com/iot/wp-
Endpoint content/uploads/2017/10/CLP.13-
GSMA Ecosystem CLP13_5.8.3 Backup channels in case of physical or logical link failure v2.0.pdf
IoT Security
Guidelines https://www.gsma.com/iot/wp-
Endpoint content/uploads/2017/10/CLP.13-
GSMA Ecosystem CLP13_5.8.3 Protection against Denial of Service attacks v2.0.pdf
Department for Digital, Culture, Media and Sport 195
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
IoT Security
Guidelines https://www.gsma.com/iot/wp-
Endpoint Restrict communications options to the strict minimum required for content/uploads/2017/10/CLP.13-
GSMA Ecosystem CLP13_5.8.3 a given IoT Service. v2.0.pdf
SECURITY THREATS AND VULNERABILITIES ON ENDPOINTS.
Unwanted changes to Endpoint Data, ⑪: Data throughout the
endpoint from low-level firmware all the way up the software stack
represents a key area of vulnerability. These vulnerabilities include
Industrial Internet unauthorized access to mission-critical or private data. Attackers
Industrial of Things may adversely affect the behavior of the system by injecting false
Internet Volume G4: data. Denial-of-service attacks on data access may impede timely
Consortium Security and accurate execution of the endpoint functionality resulting in https://www.iiconsortium.org/pdf/IIC_P
(IIC) Framework v1.0 8.1 costly outcomes. UB_G4_V1.00_PB-3.pdf
SECURITY THREATS AND VULNERABILITIES ON ENDPOINTS.
Breach of the Monitoring & Analysis system, ⑫: An attacker could
gain visibility on the functions of the monitored system. For
example, an attacker could modify monitoring data to make it
Industrial Internet appear as if a particular event did not occur. Modification of the
Industrial of Things security logs and monitoring data may result in undetected
Internet Volume G4: vulnerabilities or compromised states. As a result, attackers would
Consortium Security benefit from a coverage gap, compromising endpoint hardware and https://www.iiconsortium.org/pdf/IIC_P
(IIC) Framework v1.0 8.1 software or destroying evidence of their activities after an attack. UB_G4_V1.00_PB-3.pdf
International Reliable and trustworthy actuation requires new technologies and
Electrotechnic IoT 2020: Smart extended system architectures to ensure reliable execution of tasks
al Commission and secure IoT and to be able to recover from system failures, e.g. from the http://www.iec.ch/whitepaper/pdf/iecW
(IEC) platform 5.2.5.4 network or from devices. P-loT2020-LR.pdf
Department for Digital, Culture, Media and Sport 196
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
A device SHOULD be designed to gracefully tolerate excessive
numbers
of authentication attempts, for instance by giving CPU priority to
existing protocol sessions that have already successfully
authenticated, limiting the number of concurrent new sessions in
the
process of authenticating, and randomly discarding attempts to
establish new sessions beyond that limit. The specific mechanism is
a design choice to be made in light of the specific function of the
Internet device and the protocols used by the device. What's important for
Engineering Best Current this requirement is that this be an explicit choice.
Task Force Practices (BCP) for https://tools.ietf.org/html/draft-moore-
(IETF) IoT Devices 2.2.3 iot-security-bcp-01
Internet
Research
Task Force
(IRTF) Thing-
to-Thing State-of-the-Art and
Research Challenges for the
Group Internet of Things The tight memory and processing constraints of things naturally https://datatracker.ietf.org/doc/draft-irtf-
(T2TRG) Security 5.1.2 alleviate resource exhaustion attacks. t2trg-iot-seccons/
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security Where a Product or Services includes any safety critical or p-content/uploads/2017/12/IoT-
IoT Security Compliance lifeimpacting functionality, the services infrastructure shall Security-Compliance-
Foundation Framework 1.1 2.4.13.21 incorporate redundancy to ensure service continuity and availability. Framework_WG1_2017.pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Secure Failure and Recovery. The principle of secure failure and
recovery states that neither a failure in a system function or
mechanism nor any recovery action in response to failure should
lead to a violation of security policy. This principle parallels the
US National principle of continuous protection to ensure that a system is capable
Institute of of detecting (within limits) actual and impending failure at any stage
Standards and NIST SP.800-160 of its operation (i.e., initialization, normal operation, shutdown, and
Technology Systems Security maintenance) and to take appropriate steps to ensure that security https://nvlpubs.nist.gov/nistpubs/Speci
(NIST) Engineering F.2.6 policies are not violated. alPublications/NIST.SP.800-160.pdf
Avoid Heavy Functional Processing without Authentication.
Web of Things When defining WoT Interfaces exposed by a TD, it is important to
(WoT) Security and avoid any heavy functional processing before the successful https://www.w3.org/TR/wot-
Privacy authentication of a WoT client. Any publicly exposed network security/#recommended-security-
W3C Considerations 4.1.3 interface should avoid heavy processing altogether. practices
Department for Digital, Culture, Media and Sport 199
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
European
Union Agency
for Network
and
Information Baseline Security https://www.ENISA.europa.eu/publicati
Security Recommendations Implement regular monitoring to verify the device ons/baseline-security-
(ENISA) for IoT GP-TM-56 behaviour, to detect malware and to discover integrity errors. recommendations-for-iot
European The auditing of security-relevant events and the
Union Agency monitoring and tracking of system abnormalities are key elements
for Network in
and the after-the-fact detection of, and recovery from, security breaches.
Information Baseline Security Conduct periodic audits and reviews of security controls to ensure https://www.ENISA.europa.eu/publicati
Security Recommendations that the controls are effective. Perform penetration tests at least ons/baseline-security-
(ENISA) for IoT GP-TM-57 biannually. recommendations-for-iot
European
Union Agency
for Network Implement a logging system that records events relating to
and user authentication, management of accounts and access rights,
Information Baseline Security modifications to security rules, and the functioning of the system. https://www.ENISA.europa.eu/publicati
Security Recommendations The logs must also be preserved on durable storage ons/baseline-security-
(ENISA) for IoT GP-TM-55 and retrievable via an authenticated connection. recommendations-for-iot
European
Union Agency
for Network
and Security and
Information Resilience of Smart
Security Home Security audit: security events must be logged, and users should be https://www.ENISA.europa.eu/publicati
(ENISA) Environments 5.2, first bullet point notified whenever needed. ons/security-resilience-good-practices
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Network Operators can provide data analytics and deep packet
inspection services to identify threats and anomalies in the data
generated by IoT Services. An example could be that a Network
Operator could periodically perform deep packet inspection for
specific strings like social security numbers and GPS coordinates
that might suggest that such information is not protected properly https://www.gsma.com/iot/wp-
Analytics-based and alert the IoT Service Provider responsible that information content/uploads/2017/10/CLP.14-
GSMA Security CLP14_5.8.2 could be leaking. v2.0.pdf
Modelling Endpoint behaviour is an imperative part of IoT security.
This is because a compromised Endpoint can be indistinguishable
from an Endpoint behaving normally if only successful interactions
IoT Security with the device are logged and analysed. For a more
Guidelines comprehensive perspective of an IoT environment, the full https://www.gsma.com/iot/wp-
Endpoint behavioural fingerprint of a device should be catalogued to identify content/uploads/2017/10/CLP.13-
GSMA Ecosystem CLP13_7.2 anomalies that may be indicative of adversarial behaviour. v2.0.pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
While false positive analysis is an extremely complex topic, there is
a simple way to identify whether a technology is more likely to
present false positives. This is by evaluating the following items:
• Is the data source trustworthy
• Can the data source be tampered with or spoofed
• Is the data source from the analogue domain
• Can the data be corroborated from multiple points of origin
• Do the corroborating data sources exist on the same endpoint
system
• Are corroborating data sources easy to tamper with or spoof
IoT Security • Are tools readily available to manipulate the data source
Guidelines for • What level of expertise or cost is required to manipulate the data https://www.gsma.com/iot/wp-
Service source content/uploads/2017/10/CLP.13-
GSMA Ecosystems CLP12_8.4 • Is the device attached to the data source trustworthy v2.0.pdf
Industrial Internet
Industrial of Things ENDPOINT PROTECTION. Endpoint Monitoring and Analysis
Internet Volume G4: includes integrity checking, detecting malicious usage patterns,
Consortium Security denial of service activities, enforcement of security policies and https://www.iiconsortium.org/pdf/IIC_P
(IIC) Framework v1.0 7.3 analytics that track security performance indicators. UB_G4_V1.00_PB-3.pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Industrial Internet COMMUNICATIONS AND CONNECTIVITY PROTECTION.
Industrial of Things Information Flow Protection ensures that only permitted kinds of
Internet Volume G4: messages and content reach sensitive systems and networks by
Consortium Security isolating network flows using network segmentation and perimeter https://www.iiconsortium.org/pdf/IIC_P
(IIC) Framework v1.0 7.4 protection technologies UB_G4_V1.00_PB-3.pdf
Industrial Internet
Industrial of Things COMMUNICATIONS AND CONNECTIVITY PROTECTION.
Internet Volume G4: Network Monitoring and Analysis collects network data for analysis
Consortium Security and includes intrusion detection, network access control, deep https://www.iiconsortium.org/pdf/IIC_P
(IIC) Framework v1.0 7.4 packet inspection and network log analysis. UB_G4_V1.00_PB-3.pdf
SECURITY MONITORING AND ANALYSIS. Monitor. As
determined by the security model and policy, monitoring captures
and aggregates data from each of the sources in the system:
• Endpoints & Communications: Monitoring data is gathered by a
local agent running on each of the endpoints and communications
in the system obtaining information on the implementation of
security controls in accordance with the system security policy.
Industrial Internet • Secure Remote Logging: The sending and receiving of log
Industrial of Things messages using secure communications.
Internet Volume G4: • Supply Chain: Collecting data from all components builders and
Consortium Security integrators in the supply chain to assure that security requirements https://www.iiconsortium.org/pdf/IIC_P
(IIC) Framework v1.0 7.5 are met. UB_G4_V1.00_PB-3.pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
will most likely be executed from another endpoint in the operational
domain.
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
CONFIGURATION AND MANAGEMENT DATA PROTECTION.
Security management maintains the consistency of security over
time, and must not interfere with operational processes.
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Auditing IoT infrastructure for security-related issues is key when
responding to security incidents. Most operating systems provide
built-in event logging that should be reviewed frequently to make
sure no security breach has occurred. Audit information can be sent https://docs.microsoft.com/en-
IoT Security Best as a separate telemetry stream to the cloud service where it can be us/azure/iot-fundamentals/iot-security-
Microsoft Practices Audit frequently analyzed. best-practices
Object
Management
Group (OMG) Every system must have monitoring of the environment built in so
Cloud that active attacks as well as anomalous behavior is detected and
Standards Security acted upon. Because of the scale of IoT systems, both in the
Customer Monitoring, number of devices as well as the amount of information being https://www.omg.org/cloud/deliverable
Council Cloud Customer Analysis, and processed, there is a requirement for automated response to known s/CSCC-Cloud-Customer-Architecture-
(CSCC) Architecture for IoT Response attacks as well as automatic detection of suspicious behavior. for-IoT.pdf
As more data about people, financial transactions and operational
decisions is collected, refined and stored, the challenges related to
information governance and security increase. The data privacy and
identity management of devices and individual is very important
from the cloud computing point of view. The cloud generally allows
for faster deployment of new compliance and monitoring tools that
Object encourage agile policy and compliance frameworks. Cloud data
Management hubs can be a good option by acting as focal points for data
Group (OMG) assembly and distribution. Tools that monitor activity and data
Cloud access can actually make cloud systems more secure than
Standards standalone systems. Hybrid systems offer unique application
Customer governance features: Software can be centrally maintained in a https://www.omg.org/cloud/deliverable
Council Cloud Customer distributed environment with data stored in-house to meet s/CSCC-Cloud-Customer-Architecture-
(CSCC) Architecture for IoT Security jurisdictional policies. for-IoT.pdf
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Open Web
Application
Security I8: Insufficient
Project IoT Security Security https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Configurability Ensure secure logging is available for security events Security_Guidance
Of course, no matter how well you protect the device, protect the
code, protect the communications, and no matter how well you
manage your security posture, even using the best possible OTA
management framework, some adversaries still have the resources
and capabilities to rise above those defenses. For such reasons,
strategic threats require strategic mitigation technologies. Security
analytics can leverage security telemetry from devices and network
hardware to help provide an understanding of what is happening in
the environment, including detection of stealthier threats.
Equally importantly, “monitoring” and analytics can often be
deployed as an interim solution in environments where upgrading
devices to conform to the first three cornerstones above will take
years. Examples of such environments include legacy devices such
as industrial control systems (manufacturing, oil and gas, utilities)
that cannot be modified until an end-to-end replacement system is
ready, automotive cars already on the road whose deeply
embedded microcontrollers obviously cannot be “torn out and
replaced,” and healthcare environments where suppliers prohibit
hospitals from modifying the equipment to add security. In such
cases, anomaly detection solutions can be extremely valuable. The
deterministic nature of many IoT networks allows the system to be
baselined and deviations quickly identified. The wide variety of
industrial and IoT protocols can make the problem harder, but
newer techniques using advanced machine learning can allow the
An Internet of problem to be solved. Considering that many IoT systems have
Things Security high demands on availability, this solution is less invasive in “detect” https://www.symantec.com/content/da
Reference mode while ensuring that any false positives do not bring down the m/symantec/docs/white-papers/iot-
Symantec Architecture system. security-reference-architecture-en.pdf
Department for Digital, Culture, Media and Sport 210
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Department for Digital, Culture, Media and Sport 211
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Accountability and Traceability. The principle of accountability
and traceability states that it must be possible to trace
securityrelevant actions (i.e., subject-object interactions) to the
entity on whose behalf the action is being taken. This principle
US National requires a trustworthy infrastructure that can record details about
Institute of actions that affect system security (e.g., an audit subsystem). To do
Standards and NIST SP.800-160 this, the system must not only be able to uniquely identify the entity
Technology Systems Security on whose behalf the action is being carried out, but also record the https://nvlpubs.nist.gov/nistpubs/Speci
(NIST) Engineering F.2.4 relevant sequence of actions that are carried out. alPublications/NIST.SP.800-160.pdf
Department for Digital, Culture, Media and Sport 212
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Alliance for Workshop on Awareness & Technically regulating access to data to define who can use it for https://aioti-space.org/wp-
Internet of Security and Information what purpose, and how that can be made transparent, and content/uploads/2017/03/AIOTI-
Things Privacy in the Supplied with subsequently measured and monitored. Design in a transparent Workshop-on-Security-and-Privacy-in-
Innovation Hyper connected Indication of way, so the data subject is and remains clear and aware of privacy the-Hyper-connected-World-Report-
(AIOTI) World Purpose issues, choices it makes and possible consequences thereof. 20160616_vFinal.pdf
Broadband
Internet Reset mechanism. Devices should have a reset mechanism for
Technical Internet of Things IoT devices that clears all configuration for use when a consumer http://www.bitag.org/documents/BITAG
Advisory (IoT) Security and returns or resells the device. The device manufacturers should also _Report_-
Group Privacy provide a mechanism to delete or reset any data that the respective _Internet_of_Things_(IoT)_Security_a
(BITAG) Recommendations 7.10 device stores in the cloud. nd_Privacy_Recommendations.pdf
Due to the quantities involved with many IoT implementations, it is
likely that many edge devices will be replaced on a regular basis. It
is important to establish policies and procedures for the secure
Security Guidance disposition of devices that have held sensitive information or key https://downloads.cloudsecurityalliance
for Early Adopters material that could provide access to sensitive information. Devices .org/whitepapers/Security_Guidance_f
Cloud Security of the Internet of that have held sensitive information should be securely wiped to or_Early_Adopters_of_the_Internet_of
Alliance (CSA) Things (IoT) 5.5.5.1 include removal of key material and certificates from each device. _Things.pdf
Department for Digital, Culture, Media and Sport 213
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Life cycle controls for IoT edge devices require the management
and monitoring of assets to ensure that they are authorized, and
Security Guidance secure and regularly updated with the latest firmware, software and https://downloads.cloudsecurityalliance
for Early Adopters patches. In addition, organization’s must have a documented .org/whitepapers/Security_Guidance_f
Cloud Security of the Internet of method for securely disposing of IoT assets at the end of the life- or_Early_Adopters_of_the_Internet_of
Alliance (CSA) Things (IoT) 5.5 cycle. Define a life-cycle management approach for IoT devices. _Things.pdf
European
Union Agency
for Network
and Security and
Information Resilience of Smart
Security Home The end-user must have a way to securely erase its private data https://www.ENISA.europa.eu/publicati
(ENISA) Environments 7.3 collected by or stored on a Smart Home device. ons/security-resilience-good-practices
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
larger device (like a refrigerator) special accommodations may be
required.
https://www.iotsecurityfoundation.org/w
IoT Security p-content/uploads/2017/12/IoT-
IoT Security Compliance There is a method or methods for the product owner to check/verify Security-Compliance-
Foundation Framework 1.1 2.4.12.7 what Personal Information is collected and deleted. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security The supplier or manufacturer of any devices or devices shall p-content/uploads/2017/12/IoT-
IoT Security Compliance provide information about how the device(s) shall be setup to Security-Compliance-
Foundation Framework 1.1 2.4.12.10 maintain the end user’s privacy and security. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/w
IoT Security The supplier or manufacturer of any devices or services shall p-content/uploads/2017/12/IoT-
IoT Security Compliance provide clear information about the end user’s responsibilities to Security-Compliance-
Foundation Framework 1.1 2.4.12.12 maintain the devices and/or services privacy and security. Framework_WG1_2017.pdf
Department for Digital, Culture, Media and Sport 215
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
https://www.iotsecurityfoundation.org/w
IoT Security Where a device or devices user wishes to end the service, all that p-content/uploads/2017/12/IoT-
IoT Security Compliance owners Personal Information shall be removed from the device and Security-Compliance-
Foundation Framework 1.1 2.4.16.2 related services. Framework_WG1_2017.pdf
IoT Security & Disclose if and how IoT device/product/service ownership and the https://otalliance.org/system/files/files/i
Online Trust Privacy Trust data may be transferred (e.g., a connected home being sold to a nitiative/documents/iot_trust_framewor
Alliance (OTA) Framework v2.5 24 new owner or sale of a fitness tracker). k6-22.pdf
IoT Security & Provide controls and/or documentation enabling the consumer to https://otalliance.org/system/files/files/i
Online Trust Privacy Trust review and edit privacy preferences of the IoT device including the nitiative/documents/iot_trust_framewor
Alliance (OTA) Framework v2.5 26 ability to reset to the “factory default.” k6-22.pdf
Alliance for
Internet of https://aioti.eu/wp-
Things Digitisation of content/uploads/2017/03/AIOTI-
Innovation Industry Policy 3.32 (iii) first bullet Promote products and services which help deliver flexibility and Digitisation-of-Ind-policy-doc-Nov-
(AIOTI) Recommendations point openness in service provision. 2016.pdf
Department for Digital, Culture, Media and Sport 217
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
The CEO’s Guide Contact information and support forum. Vendors should provide
to Securing the contact details or a support forum to which organizations can report https://www.business.att.com/cybersec
AT&T Internet of Things any problems with the device or its software. urity/docs/exploringiotsecurity.pdf
Broadband
Internet Clear methods for consumers to determine who they can
Technical Internet of Things contact for support. Manufacturers should provide clear methods http://www.bitag.org/documents/BITAG
Advisory (IoT) Security and for consumers to determine who they can contact for support and _Report_-
Group Privacy methods to contact consumers to disseminate information about _Internet_of_Things_(IoT)_Security_a
(BITAG) Recommendations 7.10 software vulnerabilities or other issues. nd_Privacy_Recommendations.pdf
Department for Digital, Culture, Media and Sport 218
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
IoT Security
Guidelines https://www.gsma.com/iot/wp-
Endpoint content/uploads/2017/10/CLP.13-
GSMA Ecosystem CLP13_6.8 Uniquely Provision Each Endpoint v2.0.pdf
Industrial Internet
Industrial of Things FROM FUNCTIONAL TO IMPLEMENTATION VIEWPOINT.
Internet Volume G4: Principle of psychological acceptability: it is essential that the human
Consortium Security interface be designed for ease of use, so that users routinely and https://www.iiconsortium.org/pdf/IIC_P
(IIC) Framework v1.0 7.9 automatically apply the protection mechanisms correctly. UB_G4_V1.00_PB-3.pdf
ENROLLMENT PHASE. There are three steps to the enrollment
phase: initiation, entity verification and registration. Initiation declares
the desire to bring the entity under management and give it identity
and credentials. Verification involves proving that the entity is the
Industrial Internet one for which the identity is to be created and issued. Registration
Industrial of Things (see Figure 11-6) means the entity is ready to have credentials
Internet Volume G4: created and delivered, or to have the entity generate the credentials
Consortium Security itself. Always validate that the identity that was registered was the https://www.iiconsortium.org/pdf/IIC_P
(IIC) Framework v1.0 11.7.1 one bound to the credential that was generated for the entity. UB_G4_V1.00_PB-3.pdf
https://www.iotsecurityfoundation.org/
IoT Security The supplier or manufacturer of any devices or services shall wp-content/uploads/2017/12/IoT-
IoT Security Compliance provide clear information about the end user’s responsibilities to Security-Compliance-
Foundation Framework 1.1 2.4.12.12 maintain the devices and/or services privacy and security. Framework_WG1_2017.pdf
Department for Digital, Culture, Media and Sport 219
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
IoT Security & IoT devices must provide notice and/or request user confirmation https://otalliance.org/system/files/files/i
Online Trust Privacy Trust when initially pairing, onboarding, and/or connecting with other nitiative/documents/iot_trust_framewor
Alliance (OTA) Framework v2.5 23 devices, platforms or services. k6-22.pdf
IoT Security & Provide controls and/or documentation enabling the consumer to https://otalliance.org/system/files/files/i
Online Trust Privacy Trust review and edit privacy preferences of the IoT device including the nitiative/documents/iot_trust_framewor
Alliance (OTA) Framework v2.5 26 ability to reset to the “factory default.” k6-22.pdf
Open Web
Application
Security I8: Insufficient
Project IoT Security Security Ensure alerts and notifications are available to the user for security https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Configurability events Security_Guidance
Standard /
Recommendation Recommendation
Organisation Name Number / Section Recommendation Extracted from Linked Source Web Link
Human Factored Security. The principle of human factored security
states that the user interface for security functions and supporting
services should be intuitive, user friendly, and provide appropriate
feedback for user actions that affect such policy and its enforcement.
US National The mechanisms that enforce security policy should not be intrusive
Institute of to the user and should be designed not to degrade user efficiency.
Standards and NIST SP.800-160 They should also provide the user with meaningful, clear, and
Technology Systems Security relevant feedback and warnings when insecure choices are being https://nvlpubs.nist.gov/nistpubs/Speci
(NIST) Engineering F.2.9 made. alPublications/NIST.SP.800-160.pdf
https://www.iotsecurityfoundation.org/
IoT Security wp-content/uploads/2017/12/IoT-
IoT Security Compliance Where the product or service provides a web based interface, Security-Compliance-
Foundation Framework 1.1 2.4.10.1 Strong Authentication is used Framework_WG1_2017.pdf
Department for Digital, Culture, Media and Sport 222
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
https://www.iotsecurityfoundation.org/
IoT Security All data being transferred over interfaces should be validated where wp-content/uploads/2017/12/IoT-
IoT Security Compliance appropriate. This could include checking the Data Type, Length, Security-Compliance-
Foundation Framework 1.1 2.4.10.10 Format, Range, Authenticity, Origin and Frequency." Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/
IoT Security Sanitise input in Web applications by using URL encoding or HTML wp-content/uploads/2017/12/IoT-
IoT Security Compliance encoding to wrap data and treat it as literal text rather than Security-Compliance-
Foundation Framework 1.1 2.4.10.11 executable script Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/
IoT Security All inputs and outputs are validated using for example a whitelist wp-content/uploads/2017/12/IoT-
IoT Security Compliance containing authorised origins of data and valid attributes of such Security-Compliance-
Foundation Framework 1.1 2.4.10.12 data. Framework_WG1_2017.pdf
https://www.iotsecurityfoundation.org/
IoT Security All data being transferred over interfaces should be validated where wp-content/uploads/2017/12/IoT-
IoT Security Compliance appropriate. This could include checking the Data Type, Length, Security-Compliance-
Foundation Framework 1.1 2.4.11.7 Format, Range, Authenticity, Origin and Frequency." Framework_WG1_2017.pdf
Department for Digital, Culture, Media and Sport 223
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
https://www.iotsecurityfoundation.org/
IoT Security All application inputs and outputs are validated using for example a wp-content/uploads/2017/12/IoT-
IoT Security Compliance whitelist containing authorised origins of data and valid attributes of Security-Compliance-
Foundation Framework 1.1 2.4.11.9 such data see NIST SP 800-167 [34] Framework_WG1_2017.pdf
IoT Security Security Design Do not trust data input – sanitize to what is needed and expected https://www.iotsi.org/security-best-
Initiative Best Practices for the function on intake. practices
TR-0008-V2.0.1 Implement secure coding practices that enforce rigorous input data http://www.onem2m.org/images/files/d
Security (Technical validation in system and services, database applications, and web eliverables/Release2A/TR-0008-
oneM2M Report) 8.2.20 services Security-v_2_0_1.pdf
Open Web
Application
Security
Project IoT Security I1: Insecure Web Ensure that any web interface in the product has been tested for https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Interface XSS, SQLi and CSRF vulnerabilities Security_Guidance
Open Web
Application
Security
Project IoT Security I6: Insecure Cloud Ensure that any cloud-based web interface has been tested for https://www.owasp.org/index.php/IoT_
(OWASP) Guidance Interface XSS, SQLi and CSRF vulnerabilities Security_Guidance
Department for Digital, Culture, Media and Sport 226
Mapping of IoT security recommendations, guidance and standards to the UK's Code of Practice for Consumer IoT Security
DCMS has used reasonable endeavours to ensure that the information in this document is accurate and up to date. DCMS shall not accept liability
for any loss, damage or inconvenience arising as a consequence of any use of or the inability to use any links contained in this document. DCMS
shall not be responsible for claims brought by third parties arising from your use of this document.
DCMS assumes no responsibility for the contents of linked websites. The inclusion of any link should not be taken as endorsement of any kind by
DCMS of the linked website or any association with its operators. Further, DCMS has no control over the availability of the linked pages.
References to organisations do not imply endorsement by DCMS.
Material in this document, including text and images, is protected by Crown copyright and other copyright. The copyright of the original material
quoted in the mapping remains that of the original authors. Use of Crown copyright materials is subject to the Open Government Licence for public
sector information. To view this licence, visit www.nationalarchives.gov.uk/doc/open-government-licence/ or write to the Information Policy Team,
The National Archives, Kew, London TW9 4DU, or email: [email protected].