Handbok Cybersakerhet Eng Tillganglighet Sida
Handbok Cybersakerhet Eng Tillganglighet Sida
1. Introduction
The idea for this handbook starting as the publi- systems, such as, building automation (control
cation “Smartare Elektronikhandboken 2.0” was systems for water/sewage, heating, electricity,
crafted as the surrounding world experienced an ventilation, locks, etc.) can be affected and in
increased threat against IoT products. The two worst case stop functioning. Further, cars and
handbooks shall be seen as complimentary and garden equipment are nowadays also often
thus it is a good idea to read them both prior to connected and need to be cybersecure in order
starting up new development projects concerning to not cause physical damages or fires due to
IoT products. IoT is an abbreviation for Internet malicious overloading of components or systems.
of Things, and we will use the abbreviation IoT
throughout this handbook.
At work in office spaces – besides that office
The following definition of “IoT product” computers, various IT-systems and networks can
will be used in the handbook: in general, as IoT become non-functioning, also elevators, lock/
products we refer to intelligent and connected alarm systems and building automation control
units who communicate and transmit data over can become affected partly or fully. The confe-
Internet. These units are equipped with processors, rence room equipment can be tampered with
sensors and software in a way that they can and conversations recorded or tapped using the
perceive their surroundings, communicate with microphones in computers, mobile phones or
it, and thus create a behavior adapted to various conference equipment.
situations in order to be able to contribute and
create attractive and helpful surroundings/
environments, products and services1. At work in production/distribution environments
– the IT environment (used by offices and
Regarding the need for this handbook, we
administrative processes) is often connected to
need increasingly cybersecure IoT products due
the OT2 environment (used by production and
to expanding malicious activity among hobby
distribution processes) and these often collabo-
hackers, professional hackers as well as sta-
rate in a manner where what should be done is
te-supported intelligence organizations whose
decided and administrated in the IT environment
purpose are to steal information, make money
and subsequently sent to the OT environment
or disrupt operations/processes, for instance at
where the ordered production/distribution is
critical infrastructures, municipalities or counties,
executed. An OT environment, which commonly
within target countries. This fact can no longer
comprises a lot of IoT products, may, like an IT
be dismissed, and we must all adapt ourselves
environment, be affected by different types of
and our IoT products to these circumstances.
cyberattacks affecting the operation’s availability
Below are some scenarios for different contexts
and integrity, quality of output, or completely
where IoT products may be used and what can
stop/disrupt the operations. Unfortunately, the
be the consequences unless the IoT products
OT environment can negatively be affected in
are cybersecured:
case the IT environment is under cyberattack as
no new order data is transmitted and no feed-
Domestic (homes) – a cyberattack can cause back of production/distribution data are received
for instance connected fridges, stoves, heating back. Thus, the production can in worst case be
systems, TVs and home computers to stop working stopped when the buffered order data has been
or get locked. In tenant buildings, common executed/produced and there is no new data to
1
http://www.swedishembeddedaward.se/register-to-compete/definition-of-iot/#:~:text=IoT%2C%20the%20Internet%20of%20Things%2C%20is%
20a%20collective,that%20communicate%20and%20deliver%20data%20across%20the%20Internet
2
OT – Operational Technology – to compare with IT – Information Technology
8
Handbook for Development of Cybersecure IoT Products
FIGURE 1 – INCREASING GAP BETWEEN SWIFTLY INCREASING DIGITALIZATION, COMBINED WITH INCRE-
ASED USE OF IOT PRODUCTS, AND THE DEVELOPMENT OF RELATED CYBERSECURITY WITHIN SWEDEN.
3
MT – Medical Technology
4
The Swedish Civil Contingencies Agency defines processes of importance for society where critical infrastructures are used according to:
https://www.msb.se/sv/amnesomraden/krisberedskap--civilt-forsvar/samhallsviktig-verksamhet/vad-ar-samhallsviktig-verksamhet/
9
Handbook for Development of Cybersecure IoT Products
the lack of electricity and electronic communi- a good and well-considered initial design and
cations will affect almost everything in the long planning for further development and mainte-
run. Further, some of these OT environments are nance process so that updates, upgrades, and
very sensitive and thus not connected to the IT improvements can be issued and deployed over
environment (or Internet) and use own networks time. As the cybersecurity-level is improved also
or public ones with high grade security measures the quality of IoT products will get improved due
employed. to new requirements and increased testing.
Unfortunately, there is an increasing need to The primary stakeholders for the handbook, which
cybersecure IoT products to keep all functioning are further described in section 1.1, are:
over time within domestic-, professional- and • Designers and developers (hardware
critical infrastructure scenarios and contexts. and software), project leaders, testers,
Figure 1 outlines that the increasing pace of documenters and consultants
digitalization, combined with increased use of
IoT products, outruns the development of related • Buyers
cybersecurity. Thus, the gap continues to grow • Product owners
bigger. However, the handbook will bring up a
• Produkt managers
number of positive factors which can close the
gap over time. • Object owners
For many years, Smarter Electronic Systems
The secondary stakeholders for the handbook are:
has together with a number of actors created
and issued advice to the electronics industry • Manufacturers
regarding how electronics can be developed and • Installers
manufactured by multiple actors working together
• Crews doing maintenance, service and
in value-chains. The latest piece of advice is
support as well as services for optimizations
available as the Smartare Elektronikhandboken
2.0, which focuses on the interface between • Recyclers
development and manufacturing for to reach
• Authorities – who themselves are users and
efficient collaboration within the value-chain.
potentially also have a regulatory review/
The objective is better products with higher
inspection responsibility
quality-level, lower manufacturing costs and
faster time-to-market. Currently, we see a
need to expand the advice with a Handbook for Collaboration and communication in between
Development of Cybersecure IoT Products, as groups of stakeholders are essential for IoT
IoT products are an important part of the digi- products to be developed as well as cybersecure.
talization of our society and economy, where All participants involved need to understand
both things and people are connected, can that in addition to cybersecurity concerns, if any
communicate and report about their status and requirements that affect the management of IoT
surrounding context1. Through this handbook, product life-cycles are missing or deficient then
which complements the contents of the Smartare the long term effects will be: higher costs, hard
Elektronikhandboken 2.0, the whole IoT industry problems related to cybersecurity, and unneces-
will be able to improve the level of cybersecu- sary friction between object owners at customers
rity in its products already from the very start. and suppliers. As it is of interest for all involved
Further, the cybersecurity-level shall be possible stakeholder groups that this should not be the
to continuously be improved and augmented case, they all need to collaborate regarding the
throughout the whole life-cycle. This requires set of requirements to enable a rational life-cycle
10
Handbook for Development of Cybersecure IoT Products
11
MANUFACTURING OF ELECTRONIC EQUIPMENT.
PHOTO: ADOBE STOCK.
Handbook for Development of Cybersecure IoT Products
SOFTWARE PROGRAMMING.
PHOTO: ADOBE STOCK.
management for each involved stakeholder and hardware and software designers and develo-
any additional parties involved as well. Some pers (as well as their managers) who are not
of the stakeholders need to understand which experts on cybersecurity. The emphasis will
laws and regulations that apply as well as which be on the T in the IoT products.
industry standards and best practices that are
• The scope will extend to a moderate level of
suitable (or required) to use. The groups of secon-
practical and structural advice concerning
dary stakeholders need to be involved rather early
cybersecurity for development of IoT products.
as well. These need to be informed and trained
The advice shall be easy to read and digest.
in order for them to be able to, during their part
of the life-cycle, be able to manage IoT products • IoT products vary regarding extent and other
adequately and ensure that their cybersecurity- limits, from locally connected with limited
level is correctly commissioned and configured. local functionality to globally connected trans-
A simple way to keep collaboration and commu- mitting data to cloud services, where the data
nication alive is to document all that is of is used for optimization of the IoT product’s
importance (and share it). function as well as the process it is part of.
The handbook will address this as well as how
continuous maintenance of hardware, local
The focus and scope for handbook will be:
software, and configurations/settings can be
• The handbook will address the whole life-cycle made in a rational and cybersecure manner.
of IoT products and cybersecurity requirements
for development of a new IoT product to enable
the life-cycle to be long with high availability. Chapter 10 comprises explanations to technical
terms and abbreviations used concerning IoT
• To provide advice/check lists/standards/
products.
methods/best practices which can be used by
12
Handbook for Development of Cybersecure IoT Products
13
Handbook for Development of Cybersecure IoT Products
or remotely, are: support, service, maintenance, is not integrated into the description of the
training/education (for own staff, customers or basic functionality, an option is to add an extra
others in the value-chain), fleet management chapter or appendix to the manuals to outline
functionality with monitoring and additional value how the architecture is set up and how to apply
creation and efficient functions or services (see cybersecurity within and around the IoT product
chapter 7 for more on this). A good and suppor- (if it normally is connected where many other
tive self-help for problem solving, having an FAQ, things and systems operate). It can be a good
instructions, videos, virtual/augmented reality, idea to describe which is the inherent cybersecu-
which can be consumed via the web or an app rity functionality, how to install/commission and
could be valuable in order to save time for both configure it adequately, how to update/upgrade
developers and users. as well as how to verify that the cybersecurity
functionality is correctly configured and working.
For the last mentioned, specific procedures or
Project leaders – a project leader is commonly
scripts may need to be developed and described.
assigned to have responsibility for the develop-
ment of an IoT product based on a requirement
specification and the expected outcome should Consultants – consultants are often added to de-
have a certain level of cybersecurity and qua- velopment teams to strengthen the team within
lity. To do this, a set of resources are assigned design, development of hardware or software,
together with a deadline. To support the project testing, documentation or project management,
leader, there are roles such as product managers etc. Commonly, consultants split their time
and other relevant parts of the value-chain. between different customers (and development
teams), who can be suppliers of IoT products
or similar and be competitors, which requires
Testers – testers are needed not only for the
that some things need to be addressed. The
crafting of test cases pertaining to the basic
protection of intellectual property rights, patent
functionality, which naturally shall be tested
ideas, and patterns/copy right (i.e., IPR) must
(preferably) as a combination of automatized
be performed such that the cybersecurity-level
test and manual tests, requiring the knowledge
is not negatively affected if consultants are team
and ability to craft test cases also for advanced
members or part of maintenance later on. Thus,
cybersecurity. The testers should conduct various
secrecy and confidentiality agreements need to
forms of penetration tests, tests of availability/
be set up and how to implement cybersecuri-
performance and which information that can be
ty and instructions/awareness related to that.
extracted/exfiltrated by different measures such
To consider is also if consultants should be on
as faulty logins. The hackers, who can attack an
premise together with the rest of the team or can
IoT product, use a plethora of tools, ranging from
work remotely. In any consultancy agreement
very simplistic to very advanced, which the tester
there should be requirements that consultants
must be aware of. Potentially, a shielded lab may
have a good knowledge regarding cybersecurity
be needed for such testing using hacking tools.
and when developing IoT products.
Doing this provides a good understanding of re-
ality and for how test cases should be designed
as well as how common cyberattacks are desig- Others – development teams may comprise many
ned, planned and executed. different roles and categories of staff, ranging
from CEO, CTO, development managers, program
management, project management to sales
Documenters – also documenters need to be
representatives who can bring in requirements
able to understand recent and relevant cyber-
from customers to cleaners and janitors who
security for IoT products. Unless cybersecurity
moves around in the development team’s proximity.
14
Handbook for Development of Cybersecure IoT Products
15
CIRCULARITY IS IMPORTANT WHEN DESIGNING IOT.
PHOTO: ADOBE STOCK.
Handbook for Development of Cybersecure IoT Products
For all these, cyber security and protection of and tasks are executed using various forms of
IPR and secrecy must also be set up properly equipment and tools where IoT products may be
alike for any consultants involved. present. In addition, IoT products can be part of
monitoring such functions/processes to ensure
that all work and quality is above the expected
1.1.1.2 Buyers
level. Examples of such are controls for a func-
Initially, it is never easy to foresee the actual use
tion/process and regarding monitoring sensors
of an IoT product although a certain use is ex-
and cameras may be used.
pected and prescribed. The possibilities to solve
new problems, and also old ones, which were not
part of the framing of the initial thought process Technology-/development department – custo-
will always appear and spur the continuous mers often have a department managing tech-
development of an IoT product. To listen to and nology/development matters, who can build
talk to customers and users on a regular basis up production- and distribution lines adapting
is always a good idea in order to keep updated technology for these. The ones working in such
on the needs, how the IoT product is used, what departments often have a good knowledge for
can be improved and what might be missing. both functions/processes and technology, which
With respect to buyers, there may be a number makes them an important part stakeholder to
of part stakeholders involved who are not up-to- discuss and interview.
date and understand how an IoT product should
be used as well as what requirements are posed Operations and maintenance/service – those who
from the surrounding context. In such cases it work in operations and maintenance/service are
may be a good idea to offer help and actively the ones who are in contact most with the IoT
ask questions which reveal answers to what is products. The operations/usage phase is also
needed concerning the IoT product and its future the longest phase of the life-cycle for an IoT
usage. Potential part stakeholders at a buyer product. Thus, among these workers there is a
may be: good understanding for how an IoT product can
be efficiently installed, commissioned, configured,
Procurement – procurers do not always have the updated/upgraded, changed, decommissioned
necessary special knowledge required and follow and in general maintained. This should be made
a simple or limited procurement process. In this easy to execute efficiently, for instance by having
context, support may be needed to ensure that a set of well-working fleet management functions,
also cybersecurity is part of the set of require- to lower the life-cycle cost of an IoT product.
ments from the very start as it is usually hard and A low life-cycle cost makes an IoT product
expensive to add these later on. Unfortunately, interesting compared to competing IoT products
to add cybersecurity requirements later will not and, in particular, if these miss fleet manage-
render as good of a result as if these were part ment functions.
already from the start. A potential development
of procurement processes is to from the very Thus, it may be a prosperous idea to talk to va-
start ensure that all competencies needed within rious part stakeholders at buyers as they all may
IT, OT and cybersecurity are part of the process have small pieces of information to the complete
(in order to avoid the mentioned later difficult the bigger picture. These are also a good source
problems to solve as well as high costs for that). for ideas how to lower the total life-cycle cost for
customers.
Function-/process owners – these roles parti-
cipate in processes and ensure that activities
16
Handbook for Development of Cybersecure IoT Products
17
Handbook for Development of Cybersecure IoT Products
to do that due to necessary planning for access the same levels of physical security and cyberse-
from within, external/remote access, redundancy, curity as any own factories. There is a difference
backup/restore, and logging, etc. if standard components are outsourced compa-
red to if there is IPR, such as hardware designs,
software or knowledge about the production
1.1.2 Secondary stakeholders
process, which must be protected and kept
No chain is stronger than its weakest link. If confidential. Thus, sometimes it is not applicable
there are many secondary stakeholders involved to outsource outside of trusted production
within the value-chains, these will need both facilities and factories or to countries outside the
physical security and cybersecurity. This should EU/USA, where political pressure or involvement
be part of the value-chain agreements and the may endanger confidentiality of IPR.
implementations reviewed on a regular basis
Thus, an assessment of physical security and
as otherwise these can contribute to an incre-
cybersecurity is recommended at least annually
asing risk exposure. Below, there are a number
in order to ensure that the outsourcing is execu-
of potential secondary stakeholders described,
ted in a desired manner and that the physical
whereof some are integrated into the supplier
security and cybersecurity-levels are adequate.
(developing the IoT product) in case the supplier
The outsourcing also requires that any external
has integrated the whole vertical and horizontal
manufacturer contracted is regularly reviewed as
value-chain to the customer. However, it is com-
a whole. This should be part of the procurement-
mon that there are a number of external parties
or supplier review processes.
acting as secondary stakeholders.
1.1.2.2 Distributor
1.1.2.1 Manufacturers
Post manufacturing, an IoT product can be stored
If having the manufacturing internally and in own
and distributed fully or partly by own means, or
factories, it is easier to keep an adequate level of
by using an external distributor or distribution
cybersecurity around and within the production
solution. Regarding simplistic IoT products, this
environment as well as protect the information
is not that complicated whereas for IoT products,
necessary to produce the whole, or parts of, IoT
which may also carry spare parts/components or
product. An IoT product may be very simplistic
software and manuals requiring regular updates,
or have an advanced architecture. Further, the
it can be a good idea to consider this in order to
borderline between when it is an IoT product
be able to keep all this physically protected and
and a cyber-physical system is a bit unclear.
ensure that no unauthorized persons can access
Anyways, the production environment must be
the IoT products, spare parts/components,
protected to enable that all in it is kept confi-
software or manuals. If adding a virus or malware
dential, it is not possible to make unauthorized
to software updates or manuals (if these are exe-
changes in the manufacturing process or process
cutable or readable files), it can cause significant
parameters, and that the processes run without
problems for object owners at customers and the
disruptions and stops as such can negatively
supplier (no matter if the distribution is manual
affect the output quality as well as lowering the
via service/support staff or are downloaded from
output volume. Further, physical security within
a portal or cloud service). Concerning the distri-
and at the perimeters of production facilities and
bution of hardware, software, and manuals, etc.,
factories need also to be adequate to prevent
the processes are required to check/verify that
burglars, theft, as well as sabotage of electric
no unwelcome or extra unauthorized are added.
supply, ventilation systems or water pipelines.
Further, IoT products can have services
If using outsourced manufacturing, these
possible to add, such as maintenance, service,
production facilities and factories need to have
18
Handbook for Development of Cybersecure IoT Products
support and optimizations. Some of these servi- 1.1.2.4 Crews providing add-on services
ces are executed on premise and some remotely – service, support, maintenance and
using data which may be transmitted to a cloud optimizations
service. If these services engage own staff, Common value-adding add-on services for IoT
external distributors/executers, and if any cloud products, within value-chains, are to provide
services used are hosted at an external cloud support, service, maintenance and optimization
service provider, it is required here to apply the of hardware or software as well as the processes
requirements for physical security and cyberse- where IoT products contribute. Further, add-on
curity. See more on this further below. services, such as, re-engineering of processes
and integrations with other solutions are common.
1.1.2.3 Installers Among the part stakeholders participating within
this scope, here can often valuable ideas be
If the customer or supplier do not conduct the
found for improvements of IoT products as these
installation and commissioning, it is common
are the ones who manages the IoT products
to use external installers. Alike any distributors,
during the longest phase of the life-cycle and
these need to have adequate physical security
can clearly see any flaws and potential improve-
and cybersecurity in case they have a supply
ment areas in combination with the possibility to
in stock and use this to install as well as keep
compare with the competitors’ IoT products and
any needed software in an own portal or cloud
solutions. At the time of service and support,
service. Installers need continuous education
when some IoT products may get replaced, it is
and training on the IoT product and its installa-
important to ensure that sensitive or IPR-related
tion, configuration and commissioning, as well
data or information is wiped or erased. This
as build and maintain a general awareness about
situation is very similar to the one for installers.
cybersecurity (which includes both physical-
A product manager or object owner can have a
and cybersecurity). If the IoT products will be
great exchange of ideas and learn about flaws
installed in sensitive operations or processes,
and potential improvement opportunities regar-
which require very high availability, the installers
ding how IoT products behave while in operation.
must see to that no one else can assess the IoT
products or its various components. Further, Add-on services can be provided on-site or
installers need to know what to do when they partly from distance (using remote access and
decommission and replaces old IoT products tools). If on-site, it must be ensured that no viru-
with new ones or other solutions. Then any ses or malware are brought in, and the providers
potential sensitive data, configurations, control need to together with the customer’s users agree
data, etc., must be wiped or removed so that on how to keep the processes cybersecure. In
no one else can figure out what the IoT product many instances, external lap-tops, USB-sticks/
has been used for or provide data about the old disks or mobile phones are not allowed to bring
operation environment (i.e., networks, IP-addres- in any files or other items from the outside and
ses, connections). Some IoT products may need other secure procedures are needed. The staff at
to be destroyed/destructed completely if it is customers need also to monitor that the servi-
not possible to verify that all sensitive data and ce providers only do what they are allowed to
configurations are completely wiped or remo- do and not collect data or information from the
ved. A product manager or object owner should competitors’ equipment and solutions surroun-
preferably interview the installers about potential ding or about processes and process parameters
improvements of installation, configuration and they should not have access to. It is a trend to
(de)commissioning. increasingly do more from distance (i.e., remo-
tely) through using external connections, such
as low- or high-level VPN, which save time and
19
Handbook for Development of Cybersecure IoT Products
costs as the distances to travel may be long at or upgrades of software, and re-configurations
the same time as the time to provide the service are often carried out this way too. Some custo-
relatively short. Thus, customers need to main- mers want to have their own local servers in own
tain strong control of whom are allowed to get data centres (on-premises) and not use external
access from distance and have a standardized cloud services or the supplier’s central servers.
way to provide such access. Such a standard However, this depends on factors such as: who
may encompass time limitations, access only owns the data, who can do what with the data,
during normal business hours, and removal of who has access to the data, which all should
inactive user accounts. At acute problems, there be part of the agreement set up. In the future,
can be a fast activation process for external ownership of and access to data will become
connections with a short life span. Further, it is increasingly important and central to data-driven
common that suppliers collect data in a central business models. Thus, the locations where the
cloud service in order to be able to help part data and information are stored must have ade-
stakeholders at customers with analyses of pro- quate physical security and cybersecurity. This
cesses’ outcomes or the processes’ operational goes for whether storage is local, within a cloud
details, optimization of processes and process service or at the suppliers’ servers.
parameters, to find signs of wear and tear as
well as maintenance needs or replacement of
equipment. In addition, maintenance, updates
20
Handbook for Development of Cybersecure IoT Products
21
Handbook for Development of Cybersecure IoT Products
sales process (or disqualified as offer) due to a • Health care – IEC 81001-5-1, and MDCG
too low level of verified cybersecurity. 2019-16 (medical technology equipment)
To certify an IoT product costs both time, • Food and beverage including production and
work effort, and money. Thus, this needs to be distribution of clean water – IEC 62443 3–3,
thought through for to provide more output value 4–1 and 4–2
than what is input to this process. A good prac-
tice is, prior to starting any certification efforts, • Financial – PCI-DSS
to query colleagues and friends within the same • Vehicles – ISO 21434
business as well as the certification auditors (for
• Municipalities, counties, and government
the standard of interest) how much a certifica-
agencies – Swedish Association of Local
tion may cost as well as how much calendar time
Authorities and Regions/RISE, (KLASSA för
that can be expected.
IoT), SSNF Robust och säker IoT (stadsnät i
The certification of an IoT product may provide Sverige), Traficon (Finish transport and com-
advantages as some tasks or processes can be munications networks)
minimized or eliminated. Examples of such are sets
of queries from customers, as part of qualification • Critical infrastructure – IEC 62443 3-3, and
steps or pre-procurement information collection, ISO 27019
as the procurers can themselves easily read or • General:
get simple information about which certifications
• ISO/IEC 27400 (IoT security and integrity),
the IoT product has. Just this step can minimize a
SSF 1120 (theft protection for connected
work effort of commonly 10-100 hours each time
IoT products), SSF3523 (digital locks),
as the sets of queries are not identical. Further,
ioXt Alliance (certification program for
if having certificates of standard certifications to
secure IoT products), and IEC 62443 3-3
show customers and other stakeholders, well-
selected and appropriate standards provide a clear • EU Cybersecurity Act, which is a fra-
view of the cybersecurity status. mework comprising cybersecurity require-
ments for certification
Below are some examples of standards for • EU Cyber Resilience Act, which poses
cybersecurity that are applicable for IoT products requirements of the inherent cybersecurity
within a number of businesses or segments: of a product during its whole life-cycle
• Domestic/consumers – ETSI TS 103 645/ • EU Radio Equipment Directive (RED),
TS 103 701, ETSI EN 303 645, and SSF which will apply for all IoT products that
1120-1 can (wirelessly) communicate electronical-
ly August 2024
• Intelligent cities and buildings – Swedish
Association of Local Authorities and Regions, • ISO 27017/18 (security for cloud service
Informationsäkerhet inom fastighetsområdet environments as data generated by IoT
& IoT, Arkitekturgemenskapens Referensar- products are often stored in such services)
kitektur för IoT (till smart stad och digitala • ISO 27032 (guidelines for Internet security)
tvillingar)
• Industry – IEC 62443 3-3, 4–1 and 4–2 Within the scope of this handbook, we will keep
• Marine applications with class actions some standards, which are adequate and provide
required – DNV-RU-SHIP Pt.6 Ch.5 and support during an IoT product’s life-cycle, close
Lloyd’s Register Cyber Safe for marine (these and use these for support in for instance chapter
are both based upon the IEC 62443 3-3) 3 and its requirement analysis.
22
Handbook for Development of Cybersecure IoT Products
23
Handbook for Development of Cybersecure IoT Products
2. Threats towards
IoT products, risks
and principles
Below, we will assign IoT products and the Within professional environments and critical
data and information which need to be pro- infrastructures, IoT products are by many profes
tected in various environments the label sionals seen as one of the largest threats to their
“assets”. These assets may be within the operations. Thus, it is of great importance that
actual IoT product or in direct proximity IoT products further on get an inherent good,
and thus be affected by the function of the or very good, level of cybersecurity so that this
IoT product or the possibility to launch a labeling can be removed.
cyberattack through it. This will be further
Figure 2 indicates how overarching legal
outlined in section 2.1.
requirements to voluntary good ideas and
experiences can affect an IoT product except the
IoT products can be used in a lot more contexts requirements posed by object owners at customers
and applications not foreseen. The handbook and the supplier itself or other stakeholders in
mainly addresses IoT products used in the following the value-chain. The IoT products shown are put
contexts although there are many others such as into the different categories of domestic (homes),
airspace, space, and military ones: professional environments and critical infra-
structures. There are of course many more, but
Domestic (homes) – connected home electronics these are not brought up here. The point is not
ranging from smart building automation systems that there are more, but to understand that there
and lock/alarm systems, toasters, fridges/freezers, are requirements not only originating from the
TV, gaming platforms, watches/clocks, to modern object owners at customers as well as different
connected vehicles. groups or types of IoT products from very
simple ones to extremely advanced, which may
be connected or not to networks. In addition,
Professional environments – building automa- the cybersecurity and availability/resilience
tion systems and lock/alarm systems, industrial requirements may differ significantly between IoT
production/distribution, maritime environments products targeting domestic use compared to use
with function of vessels or platforms, health care in professional or critical infrastructure contexts.
ranging from acute care to elderly care, food and Thus, a customer must be prepared to pay more
beverage production/distribution, remotely by for IoT products targeting professional or critical
humans driven or completely autonomous vehicles infrastructure environments compared to those
used in various transport processes, etc. targeting domestic use. Further, to install IoT
products aimed for domestic use, because they
Critical infrastructure – functions or services are “cheap” and “solve the problem”, into the
critical for society5. other mentioned environments is not a good idea
and will likely not either be particularly cheap or
value-creating in the long run.
5
See for example: https://soff.se/samhallssakerhet/vad-ar-samhallsviktig-verksamhet/
24
Handbook for Development of Cybersecure IoT Products
25
Handbook for Development of Cybersecure IoT Products
27
Handbook for Development of Cybersecure IoT Products
28
Handbook for Development of Cybersecure IoT Products
at a later stage, to fix security weaknesses and not adequate, is to force the change of standard
vulnerabilities in software than hardware. configurations and passwords during installation
In domestic contexts, unfortunately it is and commissioning. Unless these are changed it
common to have almost no, or poor, protection of is unfortunately rather straight forward, if the IoT
equipment connected to Internet as well as poor product can be accessed by unauthorized persons,
segregation of networks (i.e., separation and seg- to take over the IoT product and potentially use
mentation) used for building automation, children, if for unwanted activities. Such activities may
work, alarms, etc. A segregation of the network(s) include: creating disorder; extortion by encrypting
makes it harder for virus and malware and can the data, information and systems; cause systems
also, besides provide improved security, enhance and IoT products to be inaccessible; use IoT
the bandwidth needed if there are high load on products as parts of bot-nets for DDOS-attacks
the network. targeting Internet-based services such as banks
or payment systems (SWISH and BankID) or
IoT products aimed for domestic contexts
web sites for booking of train tickets. If there are
are often able to update themselves, in terms of
unprotected IoT products for domestic use that
firmware and software, if this is configured at the
comprise microphones, speakers, or cameras,
installation. Else, there is a need to manually
it may be good practice to ensure these do not
update firmware and software on a regular basis.
comprise weaknesses or vulnerabilities and that
Further, it is unfortunately common that IoT
these cannot be used to collect data/information
products for domestic use have poor design of
about the residents and whether they are at
cybersecurity or initially lack it within hardware,
home or not.
firmware or the software run on top of this. An
area where improvements are made, but still is
29
Handbook for Development of Cybersecure IoT Products
There are many commonalities between IoT rule of thumb is that the lower the inherent level
products for domestic use and these aimed for of cybersecurity is the higher protection level
professional environments or critical infrastruc around it is required.
tures. In the latter ones, it is however much more
important to not open up weaknesses or vulne-
rabilities through poorly designed functionality
2.3 Common threats
and too low level of cybersecurity. The level of Commonly, different threats are categorized as
cybersecurity also goes for the networks, external less malicious, e.g., hobby hackers, and malicious
connections needed, and the processes related ones such as professional hackers and actors
to installation, configuration, commissioning and supported by national states, whose purpose is
later support, service and maintenance until the to make money, steal information and IPR, or to
decommissioning and deinstall. It is essential disrupt or destroy operations. Unfortunately, the
that in professional environments and critical latter two categories have significantly increased
infrastructures to also ensure that information their malicious activities at the same time as the
about the networks and network equipment, level of sophistication has increased substantially
wherein the IoT products are used, is not revealed during the last five years with the projection to
through poor design or cybersecurity. Such infor- increase furthermore. Cyberattacks or attempts
mation is often used as part of cyberattacks. to intrude are launched around the clock and
TO NOTE! If there is an interest to learn more are largely automated in order to the malicious
about weaknesses, vulnerabilities and what is actors to find out where they can get in and what
actually exposed to the outside (i.e., the Inter- they can do there. Following, these actors make
net), a possibility is to use the web browser TOR a (business) plan, and depending of purpose/
in combination with the search tool Shodan (this intent, they craft a schedule for what to attack
should not be made from a computer within a or what to infiltrate for collection of information
secure network). Then it is easy to view, within over time. Professional hackers and national
different geographic areas, equipment that are state supported actors have very good knowledge
obviously exposed and potentially unsecured and and is in many cases well ahead of many IoT
thus possible to connect to. If doing this, a large product suppliers as well as their suppliers of
amount of web cameras, sensors, and building firmware and operating systems etc.
automation systems, etc., can be listed. Unfor- Another threat, mainly posed by professional
tunately, there are many good and cheap tools hackers or national state actors, is to hack into
available for various types of hackers both on the an IoT product’s development environment or
Internet as well as on Darknet. See more on this somewhere in its distribution chain with intent to
further below. plant a hostile piece of code or hardware compo-
A general weakness for many IoT products nent and thus provide a way in (i.e., back-door)
is that the user manual (or other documentation later on as the code is distributed to the target
provided) outlining how to install, configure and environments at the users. This is often denoted
commission, does not comprise anything about as a “supply-chain attack”. Another way to plant
how the cybersecurity around the IoT product hostile code is through the use of open-source
should be set up as well as how to install, confi- code (there are various frameworks), which have
gure or commission the IoT product in a cyber not been adequately reviewed prior to addition to
secure manner. Further, also missing is often how the code base. There should be responsible lead
to maintain an IoT product’s cybersecurity-level developers who review the open-source code, its
during the whole life-cycle. Thus, it can be good continuous updates, and accepts these prior to
to add this either integrated into the user manual addition and use. The origin of the ones behind
or make an extra appendix at the end of it. A the open-source code should also be reviewed
30
Handbook for Development of Cybersecure IoT Products
CLOUD COMPUTING31CONCEPT.
PHOTO: ADOBE STOCK.
Handbook for Development of Cybersecure IoT Products
and no open-source of unclear origin should be be purchased on Internet, Darknet or from firms
used. Later, it is very hard for developers, who specialized in providing such tools to actors like
use the open-source code adopted, to find any police, intelligence services and others who can
hidden back-doors or code that send out selected pay. Thus, the relation between what it costs
data about the users, process and environment/ to raise a cyberattack to what the impact may
networks. If the open-source code, or code pac- be, is that with a small amount a large impact/
kages procured from vendors, are signed and all loss/cost can be caused. Further, owners of IoT
look good, it is quite a demanding task to review products or owners of organizations where IoT
all (and do it continuously) also with the help of products are used, need to ensure that their IoT
review tools. This is very hard for the ones that products are not part of bot nets or other hostile
install and use IoT products to detect, in particu- campaigns.
lar if the update or upgrade packages distributed There are IoT products which are connected
are signed and all look OK in testing pre-installa- in different networks but do not communicate
tion. One problem is that sometimes the hostile outbound, these which communicate outbound,
code can be time activated and dormant or just as well as these that are installed in isolated
opens up a window to the outside and enables islands and disconnected from the network
hostile actors to decide what, how and when to where they are used. The ones, residing in
do hostilities. The usage of open design concer- isolated islands, may sometimes have a mobile
ning hardware has the same type of problem and connection outward to be able to transmit data,
open designs need to be reviewed and any as- get updates or upgrades, get remote support or
sembled components/circuits should be carefully maintenance. In such cases, it should be consi-
reviewed and tested as well prior to usage. dered whether to have a process for opening up
Further, an additional threat is the own staff remote access and not keep such open conti-
(or inhouse consultants) and the ones involved nuously. It is rather common to put “problema-
in the whole value-chain around an IoT product tic” equipment in islands if they are old, non-up-
until it is decommissioned and deinstalled. Com- dated and have a too low level of cybersecurity
monly, it is mistakes or a too low level of compe- to be allowed in the organization’s network. A
tence that may open up weaknesses or vulne- vulnerability which can be used by various actors
rabilities and allow these to remain surrounding is the support, service and maintenance of IoT
the IoT product. Rarely, it is disgruntled staff products and find ways to get hostile code,
who consciously disrupt processes, do sabotage malware or viruses planted. Thus, the processes
or steal data, information or IPR and sell it to for support, service and maintenance must be
hostile actors. Unfortunately, the latter occurs reviewed in order to ensure that these do not
although the first mentioned, with mistakes from open up such weaknesses and always ensure
own staff (or inhouse consultants), are more that any new updates, upgrades, components or
frequent. spare parts brought in are verified to be “clean”
In addition, there are multiple threats, and prior to installation. Examples of where verifi-
these must be thoroughly considered and outli- cation can be needed are downloaded software
ned in a risk analysis. packages, external lap-tops, USB-sticks or disks.
Thus, there must be cybersecured support, service
The threshold for threats is low and it is rela-
and maintenance processes at the supplier of
tively cheap to rent hackers or buy time slots in
the IoT product and at other involved parts of the
cloud services or bot nets intended for hacking
value-chain.
or disrupting organizations and their processes.
To buy hacker tools cost from a few dollars to
thousands of dollars, all depending on what can
be accomplished with the tool. Such tools can
32
Handbook for Development of Cybersecure IoT Products
2.4 Risk analysis and product will start to learn what works, what
risk mitigation does not work, and what can be improved.
Consequently, suitable actors in the value-chain
Risk analysis, which involves to estimate/calculate participating in installation, support, service and
the probability of and the potential impact from maintenance should get involved as well as if
how an asset, by using its weaknesses/vulne- there are any part stakeholders of interest at the
rabilities, can be used within the scope of the customer (where the IoT product is used). At pro-
threat. Thus, a risk analysis potentially needs to fessional customers, object owners, maintenance
involve many actors in a value-chain. At an initial leaders and OT-security responsible staff collect
stage, it is likely that the IoT product supplier’s feedback, experiences and potential improve-
development organization will be most involved ments, which a product manager can transform
in risk analysis efforts and at that stage also try into requirements for the further development
to foresee how the rest of the value-chain may of the IoT product. For both professional and
affect the IoT product. Hopefully, this will lead domestic customers, user groups or similar can
to a number of functional- and cybersecurity be a good source for new requirements to deve-
requirements as well as test cases for the lop. To listen to customers is also a way to avoid
product manager to consider. After some time discontent users or stakeholders, who may post
in use at customers, the value-chain of an IoT their discontent on Internet if nothing happens
FIGURE 4 – INFORMATION AND DATA IN IOT PRODUCTS. RISK LEVELS FOR DIFFE-
RENT USE CASES (SEE CHAPTER 9) SEEN FROM A LARGER PERSPECTIVE.
33
Handbook for Development of Cybersecure IoT Products
in terms of development and improvements. can result that the overall risk is not accurate.
Further, some suppliers pay those who finds Further, risk analyses are to be executed on a
weaknesses/vulnerabilities to prevent that these continuing basis (at the start of all development
end up in hacker groups on Internet or Darknet projects at IoT product suppliers and at least
to make money there instead. annually at the customer) and more often if the
Figure 4 provides an example for how different surrounding world, i.e., the risk profile, drastically
organizations’ data and information can be seen or fast changes to the worse.
in risk levels and roughly what impact a potential
exposure of these can render in a larger perspec- 2.5 Principles for
tive. The potential impact of the risks regarding
for instance availability or integrity is not part of
cybersecure design
the Figure 4.
of IoT products
There are simplistic and complicated There are supporting principles for many aspects
methods to use for a risk analysis. It is probably of design and development of products. There
better to start up with using a simplistic method is general as well as specific ones targeting IoT
and make it further sophisticated later on products. The design-for-x or x-by-design
as needed. Examples of such methods can thinking has been around for a long time and,
be found in books and standards/guidelines in particular, involving mechanical product
addressing risk assessment/analysis/mitigation: development, and these principles have been
ISO-27005 and 31000, NIST risk management developed as demanding business models have
framework and CIS risk assessment method. To transformed mechanical products to become
remember, nevertheless which method is used, IoT-fied or transformed to further extensive
is to involve all parties, stakeholders and actors cyber-physical systems or even larger systems
who need and can contribute. Unfortunately, it (e.g., systems-of-systems). Examples of such
is common to bring in too few of these, which business models are: products with loosely coupled
34
Handbook for Development of Cybersecure IoT Products
services, products with integrated services, Another, but not new, principle or paradigm
PSS (Product-Service Systems) and functions or is the micro-services paradigm, which has started
functional products. These should all be of inte- to be used a lot as many suppliers of IoT products
rest for suppliers of IoT products. Pertaining to and larger systems have realized that keeping all
cybersecurity, EU and ENISA have since a while software code in one or a few blobs is not efficient
launched the principles of security-by-design and as that causes the costs for maintenance and
privacy-by-design. The foundation for these is testing to be unnecessarily extensive and time
that cybersecurity requirements shall be part of consuming (as all code need to be tested even at
the initial set of requirements, as otherwise the small changes). To lessen this problem, “contai-
later added-on cybersecurity will become more ners” or similar is used to put small and indepen-
expensive and likely not as good too. Further, dent micro-services (which should be easy to
personal information (which is processed, stored replace and have well-defined service descriptions)
and/or communicated) shall be protected already which collaborates with other such micro-services
from start to end of the personal information’s using well-defined protocols and interfaces. The
life-cycle within that system. This concerns strategic thinkers have added common base
mainly general software and systems, but also functionality for cybersecurity, administration and
IoT products. There are additional design prin- fleet management in an underlying platform which
ciples of interest, such as Stallings and Brown6 all micro-services use. The idea is here that if one
who prescribe to minimize the attach surfaces changes one micro-service, it is only that one that
of networks, software, people and via physical needs to be thoroughly tested as well as that it
access. Stallings and Brown outline 13 principles works as it should with the others via the defined
including for instance: least level of rights/autho- protocols and interfaces. Thus, there is no need to
rization, separation of rights/authorization (i.e., test all code, i.e., all micro-services, if you change
that a single user can only do certain tasks alone one or a few of them. If there are changes to the
where some tasks requires that two users are underlying platform, it needs to be tested as well
involved), least number of common mechanisms, as a number of selected micro-services depending
isolation, encapsulation, modularization, use on what the changes are related to. However, to
layers/levels, and open design. The zero-trust keep developing IoT products and keep all software
model, which is frequently used, also needs to code in one or a few blobs is not efficient nor a
be considered as it encompasses that each part profitable way forward. There is a risk that not
of a system shall have its own adequate level of doing this will impair the innovation speed and tie
cybersecurity and not be dependent on any other up resources for no good at all. There are many
parties’ level of cybersecurity. Thus, here goes such underlying platforms for IoT and automa-
the slogan ”never trust, always verify” and that tion, and the hard thing to do is to select which is
no one shall trust anyone else prior to a success- currently good as well as in the future. If the code
ful verification. An IoT product can, or should is developed in an adequate way, it is of course
if needed, be divided into different trusted possible to change the underlying platform and
zones. Of course, this depends on which parts if having a common underlying platform within a
or components that the IoT product comprises. development organization it can potentially render
However, to be able to create a separation and good scaling effects as knowledge and automated
keep up a high level of availability and protect test suites can be re-used for new projects and
data/information, such separation into zones can IoT products.
be necessary. Chapter 3 will bring up more on Regarding the hardware, there are similar
this aspect and if the requirement engineering ways of thinking as for the software, as when it is
during development of IoT products uses the possible and suitable to break down larger parts
contents from chapters 2 and 3 - both the above into exchangeable modules and components which
design principles will be considered. Chapter 3 have well defined interfaces and standardized
brings up a number of standards, whereof most functionality (i.e., compatibility).
addresses at least the security-by-design7.
6
Stallings, W. and Brown, L., Computer Security: Principles and Practice, 4th edition, Pearson, USA, 2018
7
https://www.enisa.europa.eu/news/enisa-news/how-to-implement-security-by-design-for-iot
35
Handbook for Development of Cybersecure IoT Products
3. Prior to starting
up a new project
This handbook aims to cover the whole life-cycle • Monitoring of IoT products during its
for an IoT product and this affects the require- life-cycle. Usually, this phase is also long
ment analysis and the potential infrastructure and
• At the end of a life-cycle
processes as well as structures needed around an
IoT product. There are quite a few aspects that
need to be considered prior to starting up a new 3.1 Early stage
project as well as already from the very start of – business development, ideas,
the life-cycle. Unless these aspects are well-consi-
and concept development
dered, there is a risk that the initial development/
project cost looks fine whereas the whole life-cycle At an early stage, it is necessary to keep sensitive
cost and profitability will not look good. planning and decision-making concerning an IoT
product’s business protected and confidential.
This does not directly impact on an IoT product’s
In brief, the following will be addressed
final level of cybersecurity but the start to get
in this chapter:
there. Thus, needed to protect are: information
• Early stage with business development, ideas,
and sketches/drawings as well as notes which
and concept development
are related to business development, ideas that
• Requirement analysis – collection and analysis hatch into concepts, selection of concepts and
of functional and holistic requirements, laws/ concept development, potential prototypes or
regulations, industry standards and voluntary demonstrators, concept evaluations, etc. This
standards, best practices, design principles should be kept within as a small group as pos-
(see section 2.3) etc. sible in order to maintain confidentiality prior to
the next steps to take.
• Management responsibility – to provide the
necessary conditions required
Therefore, cybersecurity is needed in an organi-
• Development environment and development
zations IT-environment and development environ-
process
ment to be able to protect data and information
• Documentation related to:
• Testing • Early business development and later stage
business development with business model-
• Maintainability over time
ling considerations
• Quality-level
• Idea generation, concept generation and
• Industrialization selection of concepts to continue with
• Development • Concept development – protection of ideas,
• Post development – maintenance/service/ sketches, and drawings as well as business
updates and support as well as optimizations modelling/planning
and training packages. Commonly, this phase • Prototypes and/or demonstrators
is the longest in a life-cycle
36
Handbook for Development of Cybersecure IoT Products
• Protect the early requirement analysis’ results, • I (Integrity) – how to prevent unauthorized
which may be generated out of prototypes changes in the IoT product or the data/
or demonstrators as well as the experiences information residing in it?
made out of these
• A (Availability) – what are requirements for
availability, robustness and resilience
Further, it is needed, for all involved, to not talk (i.e., be able to continue to operate in case
or discuss the early stage’s contents or results of serious problems or issues)?
but act responsibly and handle such information • T (Trustworthiness) – what is required to
with adequate protection at visits at customers, uphold the trust, concerning the IoT product,
in the car from work to home when stopping from customers, the surrounding world, and
to shop groceries, while travelling in the line the own organization?
of duty, or commuting to and from work using
public transport. Thus, all this may require that • P (Provenance) – traceability (i.e., provenance)
such information is encrypted and protected by regarding the data/information which reside
additional means both within the organization’s in the IoT product and potentially later is
environments as well as when it is outside the transferred to other systems for storage and
premises carried around inside of lap-tops, analysis? The IoT product’s configurations and
mobile phones, and USB-disks or are e-mailed. settings may be affected here as well. Any
changes made to the IoT product’s hardware
and software need to be traceable in the deve
3.2 Requirement analysis lopment environments by for instance using
– collection and analysis of func- “tag” in software code and version numbering
tional and holistic requirements or similar arrangements.
from stakeholders, laws/regula-
tions, industry standards, etc. Within IT environments, the order of importance
for the starting triad is commonly CIA whereas
There are a number of general and governing
within OT environments and critical infrastructures
requirements for cybersecurity, i.e., the CIA+TP
the order of importance is often AIC and the TP
which are further described below, that may
attached at the end. Thus, it is of importance to
impact the whole IoT product’s design and
know/learn if the IoT product will be used in IT
adaptation to various circumstances during the
or OT environments alternatively within critical
life-cycle. Specifically, the developer of an IoT
infrastructures.
product needs to understand the surrounding
contexts, processes and data/information that will Regarding the data/information, which will
be present during the usage. It is advisable to ask be generated within or around an IoT product,
users at the customers which level of availability and that have a potential value for analytics or
(e.g., potential availability classification) is wanted add-on services and extra functionality pertaining
and what data/information that will reside within to maintenance/monitoring/optimizations, it is
the IoT product. Examples of data/information advisable to firstly analyze business-related,
security categories are: open, internal, confidential, legal and contractual matters such as:
strictly confidential as well as if personal data or • Who will own the data that will reside within
data about critical infrastructures/state security the product?
will be part of the scope. • Where will this data be stored? Are there any
legal or other aspects to consider?
• C (Confidentiality) – what needs to be protected/ • What may the data be used for?
kept confidential and how?
• Who may use which data and when?
37
Handbook for Development of Cybersecure IoT Products
THE CYBER SECURITY THOUGHT PROCESS MUST START ALREADY WHEN YOU START PLAN-
NING A NEW PRODUCT AND IS NOT SOMETHING YOU SOLVE ONLY IN THE END-USER PHASE.
PHOTO: ADOBE STOCK.
38
Handbook for Development of Cybersecure IoT Products
39
Handbook for Development of Cybersecure IoT Products
• Swedish Civil Contingencies Agency’s • Microsoft (cloud and IoT) – search their
recommendations for industrial control global web site for top-10 lists and best
systems and IoT as well as cyber-physical practices
systems (critical infrastructure). The • Google (cloud and IoT) – search their
Swedish Food Agency’s recommendations, global web site for best practices
which are based on the ones from Swedish
Civil Contingencies Agency, are used at • IoT Security Institute (regarding smart
regulatory audit/review of production and cities and critical infrastructures)
distribution of for instance clean water
• ENISA’s recommendation regarding IoT/ 3.2.2 Practical functional and
cloud/critical infrastructures and deve- environmental requirements
lopment and used of these (industry and related to cybersecurity
critical infrastructures) If functional- and environmental-related require-
• Swedish Association of Local Authorities ments do not have any relation to other matters,
and Regions’/RISE’s KLASSA för IoT and can be considered as stand alone, they
are easier to manage. However, there are many
• Swedish Association of Local Authorities such requirements which have relations to other
and Regions’ Informationsäkerhet inom matter alike cybersecurity. To manage the latter
fastighetsområdet & IoT ones, the design principles and modularization
• Swedish Association of Local Authorities can be used as well as standardized compo-
and Regions’ Informationssäkerhet i nents/parts and micro-services as the require-
fastighetsorganisationen ments are broken down into smaller pieces.
Functional requirements concern what the
• Swedish Association of Local Authorities
IoT product is to be able to do and preferably
and Regions’ Vägledning för IoT-tjänster
these shall be practical and well designed to
• ioXt Alliance (certification program for facilitate an efficient management throughout
secure IoT products) the life-cycle and to optimize the life-cycle cost
• SSNF’s Robust och säker IoT (stadsnät) as much as possible. To develop functional
requirements into functionality, that is complicated
• Traficon (Finnish transport and communi- and expensive later on, such as poor service
cations networks) and maintenance functions will discourage many
• Best practices and more – examples are customers and their users from buying additional
as follows: ones or replace IoT products whose life-cycles
end. Thus, this is important to consider for
• GOV.UK (Consumer IoT Security)
suppliers of IoT products. An example of this is
• IoT Security Foundation – search their global recent cars where it is very hard to, by one-self,
web site under the “publications” part replace a front lamp.
• OWASP IoT Verification Standard (advise
for development of cybersecure software Practical functional and environmental require-
and the most commonly used weaknesses/ ments are for example as follows:
flaws used by hackers)
Operations environment – the environment where
• Cloud Security Alliance (cloud and IoT) an IoT product operates impacts on the design
– search their global web site under the regarding both outer protections combined with
“research” section cybersecurity. A tough/rough industrial environ-
• IBM (cloud and IoT) – search their global ment poses its requirements as well as if an IoT
web site for best practices and advise product will reside in a more or less unmonitored
40
Handbook for Development of Cybersecure IoT Products
and unprotected environment outside, indoors be lower, and it is possible to avoid scrapping or
or at domestic environments. Thus, both physical destruction (i.e., re-purposing or down-cycling).
attacks as well as cyberattacks may lead to However, the IoT product needs to be emptied
unavailability or destruction in exposed environ- and all data, information or configurations, etc.,
ments. Physical access may also lead to risk for properly wiped prior to that the IoT product
cyberattacks by connecting through unsecure/ continues with a new life-cycle elsewhere.
unprotected interfaces or just being able to
remove a hatch and be able to access electric
Information flows – it is likely that data and infor-
contact points or memory cards in the interior
mation will flow through the IoT product during
of the IoT product.
its life-cycle and considerations are necessary
regarding where the flows shall be stored or
Hardware requirements – there are often, also in buffered on its way to any potential processing.
what appears to be a secure environment, a need This needs to be made in a cybersecure way.
to protect the IoT product from physical access Previously, there is an example for how to segre-
and destruction and to not be possible to open gate the data and information in an IoT product
up easily. The least that is needed is for instance regarding personal data, process- and quality-
to use a seal or sticker on any openable hatch related data, as well as maintenance- and fleet
above memory cards and/or interior with electric management-related data, in order to facilitate
contact points. An alternative is to recommend transparency pertaining to: who owns the data,
that the IoT products should be installed in a who can do what with the data when and how.
fully controlled environment with physical locks If cloud services or the suppliers’ own central
(i.e., within a locked room or cage/cabinet). servers are used for storage of data and informa-
To just have a simple plastic cover, which is tion, it becomes a bit more complicated compared
simple to bypass, may cause that a break-in is to if the storage is at the customer’s site in a
not detected within soon. To prevent this, there data warehouse or local server. Anyways, there
can be a built-in function that sends an alarm are a lot of interesting business development to
and potentially also deactivates the IoT product do now and in the future based on data and
at a physical attack or destruction attempt (in information. Thus, this should be considered well.
particular, if the IoT product can be used to
launch a larger cyberattack into a network).
Interoperability and compatibility – how should the
IoT product vulnerable and unprotected should
IoT product fit into different object owners’ target
reside in a network that is not connected to the
environments and which requirement will this
main network. Examples of such are connected
pose on the design? Potentially, the design can be
car heating poles at parking lots, external alarm
affected by: how can the data/information be exfil-
systems, external lock systems without monito-
trated through networks and firewalls, how should
ring, etc.
data/information be stored/shared in a cybersecure
manner, what data formats and communications
Related to environment – the possibilities to be protocols are needed, should data and information
able to exchange/replace old worn or torn hard- be possible to export to different formats except
ware components or freshen them up again in that backup and restore (import) shall be simple
order to be able to continue to use (i.e., re-fur- to do, how should authorized persons be able to
bishing or re-manufacturing) should be consi- connect in from the outside and which functionality
dered for the IoT product’s life-cycle. When the do these need, etc.
primary life-cycle for an IoT product reaches the
end, it is often possible to find a new life-cycle
in other contexts, where the requirements may
41
Handbook for Development of Cybersecure IoT Products
42
Handbook for Development of Cybersecure IoT Products
43
SYSTEM ADMINISTRATION IS PERFORMED BY A SPECIALIST..
PHOTO: ADOBE STOCK.
Handbook for Development of Cybersecure IoT Products
Cybersecurity during the potential operation and look at the structure provided by the standard
maintenance phase – an IoT product needs to be IEC 62443 part 3-3 and the security level 1 (out
designed to be able to be operated and maintained of 4 where 4 is the highest). An industry can
in a cybersecure manner until the end of the have enforceable requirements for components
life-cycle. Usually, data and information about and systems which are critical and can have
the process, quality outcomes and maintenance impact on the environment. Such an example is
need are needed to do this somewhat optimized, the maritime industry with class action, which
but the IoT product also need to be designed goes for new contracted vessels and installations
so that this can be executed effectively either from 1-Jan 20248. It is likely that other industri-
on-site or from distance (i.e., what is possible to es, also on shore, will start to do similar actions.
do or prepare remotely) combined with what can However, some industries such as transports,
be automated. air and space already have some cybersecurity
requirements and regulations.
Cybersecurity at the end of the life-cycle – at In IEC 62443 part 3-3 and its lowest security
some point in time, an IoT product and its parts/ level 1, which in general applies to cybersecurity
components need to be de-commissioned, of components, there are a number of groups
potentially destructed and re-cycled without comprising requirements according to below.
compromising any IPR, data and information Please observe that this is only an example to
(settings, recipes/programming, operational data outline what already exists, mainly for professional
such as IP-addresses, etc.). For such situations, environments, and what is possible to certify
a fleet management function can be provided towards if there is a need or requirement to do
and used for de-commissioning and at the same so. Regarding additionally critical environments,
time also securely remove any IPR, data and the security levels 2-4 can be applicable and
information. Further, if physical destruction of interest to review. Within Sweden, different
is necessary, it needs to be according to the industries have various industry specific guidelines
customers’ policies and their users. However, and sets of requirements (see for instance
as a supplier, it is a good idea to have an in- Swedish Civil Contingencies Agency ’s Swedish
struction for how to best do this unless there is Association of Local Authorities and Regions’
a producer responsibility to do the destruction publications in chapter 10 and section 3.2.1)
and re-cycling. In case of such a responsibility, which may provide a foundation to start with.
there should be an internal supplier instruction Below, briefly outlined on a high level are what
in order to properly ensure adequate destruction the security level 1 comprises. This is worth
and re-cycling. to check out and then to also consider what is
relevant for the specific context:
• Identification and authentication controls with:
3.2.3 General cybersecurity
requirement for IoT products • Identification of users.
Each IoT product and the contexts where such • Authentication levels and which level of
are used pose specific cybersecurity requirements. authentication that different user groups
This needs to be discussed and analyzed, in or roles have (e.g., users with the right to
terms of impact, together with customers and view, user with the right to change, admi-
users combined with understanding the surroun- nistrators). Furter, administration from an
ding world in terms of threat environment, wars unsecure or external network may require
and war conditions, laws and regulations. To 2- or multifactor authentication.
provide an insight into what can be categorized • Identification and authentication of
as general cybersecurity requirements, we will software processes and devices.
8
Look on the web about IACS UR E26/E27 - https://iacs.org.uk/news/
iacs-adopts-new-requirements-on-cyber-safety/
44
Handbook for Development of Cybersecure IoT Products
45
Handbook for Development of Cybersecure IoT Products
46
Handbook for Development of Cybersecure IoT Products
• At high requirements for availability pro- (TPM)). As the IoT product starts up, the bootup
vide extra power source inlet (i.e., possi- software (i.e., boot firmware) checks the signature
bility to have two or more different power for the start manager (i.e., boot loader) using the
sources plugged in) and a change from stored keys. If the signature is valid, the start
primary to secondary power source shall manager is allowed to execute. Subsequently, the
not affect the IoT product’s cybersecurity start manager repeats this process for the opera-
functionality. ting system and all other software being loaded.
• Ability to configure and change settings Thus, a secure boot prevents that malicious code
or configurations of networks and security is started on an IoT product, as it verifies the
level – the IoT product shall be possible software prior to loading and execution, and
to configure (via an interface) so that ensures that only trusted software can be executed.
its network and security parameters are This can help to protect against malicious
aligned with recommendations from the software, boot kits and other types of threats
supplier (may be executed locally or cen- which depend on being able to execute its code
trally via a cloud service). on a device (i.e., the IoT product).
Thus, there are quite a lot that already exist
• Apply the principle of least functionality
to bring in and consider, and then use that to
– unnecessary functions/services, ports,
decide what is relevant for the IoT product to be
protocols, etc., shall be disabled, forbid-
developed (or for the improvement of existing
den or removed from the IoT product.
ones). It is not necessary to come with up all
by oneself and one can get far by reading and
If an IoT product has an own, or connects to one considering all that already exist in written form.
external, cloud service or server at another loca-
tion for to store data, fleet management func-
tionality, updates, report function, optimization
3.3 Management
functionality, etc., there will be additional requi- responsibility
rements to protect these. If these are available – what matters need to be
via Internet, it is possible to get an overview of clarified and sorted out?
potential cybersecurity requirements from Cloud
The management of organizations developing
Security Alliance, Microsoft, IBM, etc.
IoT products has a number of matters to at-
Further, there can be a need to be able to tend and take on responsibility for and also
manage which software that may be executed ensure that the other actors or stakeholders in
on the IoT product (i.e., device) via secure or the value-chain are onboard as well regarding
trusted boot and “chain of trust” from hardwa- these matters. This may include customers and
re, via operating system to apps. In such cases, their users as well. One matter to address is for
additional hardening, such as ”secure boot”, can instance what makes the IoT product function
be needed. This is a method designed to ensure well, both short- and long-term, with an adequate
that a device only executes trusted software. The level of cybersecurity. It is hard for a develop-
method verifies the integrity of software which is ment team to collaborate with many actors and
loaded during the boot up phase. Commonly, stakeholders, in a value-chain, about require-
secure boot is implemented as part of an IoT ments crossing organizational borders. Thus,
product’s boot up software and is based on management needs to step up and address these
using cryptographic keys to verify the integrity/ matters to avoid expensive and insecure surprises
origin of software before loaded. Preferably, at a later stage.
cryptographic keys are securely stored in a hard-
Some requirements affect all involved and
ware module (e.g., a trusted platform module
are often referred to as holistic requirements that
47
Handbook for Development of Cybersecure IoT Products
cross all borders, and that certain infrastructure • Who shall be authorized to access parts of
needs to be available or that existing such must the development environment (on-site or
become interoperable or compatible, and finally remotely)?
that certain processes and set ups of assets/
• Who shall be authorized to access the
equipment need to be made in a standardized
development environment and which tools
manner. Examples of such assets/equipment
are they allowed to use there?
are: the IoT product, cloud service(s), certificate
infrastructure with a root certificate and revoca- • Is it needed that all can access the
tion lists, federation of identities (provide ability software code, hardware designs or service
for an authorized identity to log in to multiple designs, and in particular if one is outside
services as the organizations behind trust each of the organization’s internal network and
other and adds that user identity to their list of outside of normal work hours (e.g., week-
authorized users), and access, etc. days between 08.00-19.00 o’clock)?
The management should also start to think • Is it needed that there is access to the de-
in terms of total life-cycle cost instead of initial velopment environment from other countri-
development cost. This affects the requirement es than Sweden (and if it is possible to
collection/analysis/engineering, decision-making open up specific temporary access in case
and design and may result in a higher initial there is a need for such remote work)?
development cost which should later on in the • Who are authorized to check out all code
life-cycle provide improved profitability. Such and can check in code to the main branch
long-term savings may originate in that the IoT or make changes to drawings or blueprints
product is initially prepared and that the mana- etc.?
gement has considered future development plans
• Is there a requirement to have a code
and architectural decisions. The use of design
review or design review prior to that any
principles in the requirement collection/analysis/
code, drawings/blueprints, service- or
engineering may provide better future results too.
process descriptions are checked in to the
main branch?
3.4 Cybersecure develop- • Is there a need for specific protection of
ment environment and development documentation and other
development process materials such as product/service/process
Two questions to start with are: documentation, IPR/drawings/blueprints,
documentation of production process/method
• What IPR do we have that should/needs to
(if this needs to be confidential and is consi-
be protected?
dered as confidential or strictly confidential)?
• Why should we make an effort and develop
• Are there any cybersecurity requirements for
IoT products if others then just can take our:
collaboration tools, i.e., secure communica-
blueprints; documentation; descriptions of
tions and sharing of documents, protection
services, processes or structures; the code;
level for documents, requirements for authen-
or plant a virus or malicious code alternatively
tication levels, etc.?
designs that later will destroy all?
• At some point in time, a decision or selection
If the above two questions are relevant, some of development process/methodology suitable
additional questions need to be raised about what for the problem to solve need to be made.
the development environment comprises (i.e., Here, it is important to consider cybersecu-
development, test and documentation) and who rity from the start. It is a good idea to use a
can access what and do what with: development process that ensures that the
48
Handbook for Development of Cybersecure IoT Products
initial set of requirements is adequate prior to other sub-process due to design choices made.
starting up the development in order to avoid Here, it is possible to anticipate parallel
costly mistakes. The set of requirements will sub-processes for: hardware, software (local,
likely change a bit during the course, as in central and/or cloud-based), services and
most projects, and evolve through a structured processes (ranging from service, support,
change management process. To use the maintenance to optimization functionality
same development process/methodology to based on data), management of operation
all problems may not results in an optimal (need to build up the structures and infra
outcome and having knowledge and expe- structure needed by the IoT product to
rience from using several such development operate in a long term and to make incre-
processes/methodologies can be beneficial. mental improvements of performance and
This is due to the complexity of developing availability). It is an advantage if as much as
IoT products, which potentially comprise possible of what is relevant is in the initial set
hardware, software, services, processes, of requirements and avoid poorly designed (or
cloud services, data/oral communications, impossible) additions later on.
and data analytics.
• What requirements should be posed on • What requirements are posed on the develop-
the development process/methodology? It ment/test environment and selection of test
needs to be able to run a number of parallel data in general?
sub-processes but still be able to coordinate
these so that they progress timely and not
run ahead and close the design room for the
49
Handbook for Development of Cybersecure IoT Products
TESTING 50
AN IOT PRODUCT IS IMPORTANT BOTH FOR THE SAKE OF FUNCTIONALITYAS
WELL AS TESTING THAT THE LEVEL OF CYBER SECURITY IS GOOD.
PHOTO: ADOBE STOCK.
Handbook for Development of Cybersecure IoT Products
It is always advisable to manage and control both • How to complete a cybersecure installation,
physical security and cybersecurity around deve configuration, and commissioning?
lopment environments. To develop something,
• How to transmit any data outwards?
putting in a lot of effort and funding, and then
learn that someone else launches something very • Do the customers and users need to make
similar is not joyful and, in particular, knowing firewall openings (i.e., which ports, protocols,
that it was we that developed and funded it all. etc. are needed for the operation) and what
Those who develop services, processes and are the requirements for authentication and
other structures needed, may take advantage of secure communications posed by the IoT
the same development environment as where the product? All this needs to be explained in the
hardware and software is developed. If doing so, documentation. If 2-factor authentication or
these developers can benefit from the existing other types of multi-factor authentication is
model for set up of access rights, authorizations, required, for instance pertaining to adminis-
who can make changes, version management trators, this may require that such solutions
backup, etc. are installed and possibly acquired if there is
no such available.
• How to verify that an IoT product’s cyberse-
3.5 Requirements on curity is correctly set up and configured? Is
documentation there a specific function, procedure, script,
– various user guides and manuals or other way to verify this? This is a common
requirement part of certifications.
It is necessary to include the cybersecurity-
related matters of IoT products in the documen- • Will support and maintenance be provided
tation. However, this is often not the case. from distance via Internet or other networks?
Further, this is also necessary in case the IoT Is it possible to build in maintenance/update
product is to be certified, but if not anyways a functionality within the IoT product, which is
good idea for all target contexts from domestic initiated for instance as the IoT product con-
to critical infrastructures. A balanced documen- nects to a cloud service to transmit out data
tation including cybersecurity may comprise: and fetch any configuration changes made
centrally? Another option is to have an external
• The IoT product’s function outlined. Provide
VPN-connection, which must be authorized
a comprehensive view of the whole “system”
and set up according to the customer’s policies.
and how the cybersecurity (plus any needed
physical security surrounding) should be set • Is local cybersecure support and maintenance
up in a schematic way. Which roles will log in, needed on-site? If so, it must be ensured that
to where, and what will they do? cybersecurity is not compromised by bringing
in any malware/viruses at updates of software
• Recommend that customers and their users
or via the use of an external lap-top, mobile
cybersecure their operations environments
phone or USB-disks, etc. For such purposes,
– how can that look like? Is an own physical
there is a need to have a cybersecure process,
and logical network segment needed as rele-
ensuring that no malware or viruses get into
vant protection (e.g., firewall/gateway having
the target environment, complemented with
buffering of data) or is it just a part compo-
trainings of the service engineers carrying out
nent of another system?
the on-site service and maintenance.
• What goes if the IoT product is operated in
a non-recommended environment – who is
responsible for this?
51
Handbook for Development of Cybersecure IoT Products
Thus, there is a need to have appropriate docu Thus, various forms of automated test suites,
mentation, including cybersecurity, to provide and test rigs, etc., should be requirements part
the necessary guidance at installation, configu- of the initial requirement specification. Further,
ration, commissioning, and updating, etc., during the test suites and rigs need to be continuously
the whole life-cycle. A further benefit is that the improved during the IoT product’s life-cycle.
support technicians will get less questions and Finally, all functional requirements as well as
can focus on what requires a support technician’s cybersecurity requirements shall be testable.
full attention instead. Various types of tests need to be compiled
At the end of the life-cycle, or the cease of together to achieve a solid and stable IoT product
use by a customer’s object owner, required are as the outcome. Below, there are a number of
instructions for how to delete and wipe IPR and potential groups for test requirements, which
data/information, and how for instance replace may be considered while drafting a test speci-
this with factory settings or other void contents. To fication and test plan, to reach as a good test
have a function in the IoT product that does this, coverage as possible:
including providing a verification note at the end • Planning and overview of test coverage
that all data and information etc. is deleted/wiped – will the IoT product comprise different
and/or replaced is appreciated by all involved. configurations of hardware, software, and
Further, an instruction for how to recycle the IoT potential cloud services/servers or other
product is needed in case some parts may need additional services?
to be destructed or separated from each other.
Observe that this all goes for all locations where • How large test matrix is required to
IPR and data or information etc. are stored. This achieve an adequate coverage?
may include not only the IoT product itself, but • Porting to various platforms – are the
any cloud services or servers and any intermediary target platforms similar or different?
steps used for transmitting data from the IoT pro-
• Functional testing
duct. Users at customers commonly have IT- and
OT-policies with rules and an information security • Testing and review/walk-through of potential
life-cycle management scheme which together additional services, processes, and structures
stipulate how to decommission and end of life
• Tests to ensure that all functionality (and
various assets within the IT- and OT environments.
services, processes as well as structures) are
In some cases, full physical destruction may be
cybersecure
required of memory cards, disks or other parts in
order to ensure that nothing valuable in terms of • Performance and scalability
IPR, data or information, are exfiltrated to compe- • Test of documentation – are the set of
titors or other parties. documentation complete and correct?
• Test automation – test suites for cybersecuri-
3.6 Test requirements ty, functional requirements, and performance/
scalability/overloads
The testing of an IoT product is important for the
functionality and that the cybersecurity-level is • Test rigs – what is needed to efficiently execute
adequate. It should be possible to plan, depen- the tests? Can the test rigs have prepared
ding on available competencies and knowledge, configurations which automatically can be set?
so that developers and testers cooperate and • Penetration tests – for this an external party
tend to that some matters are built into the can be advisable – penetration tests are
development and test environments (which may needed on a regular basis to ensure that the
require some development efforts and time).
52
Handbook for Development of Cybersecure IoT Products
IoT product’s cybersecurity protection level is titive edge to have an IoT product, which can be
hard to penetrate and adequate for the targeted supported, serviced, maintained, and updated in
operational environments an efficient and cybersecure manner, not only in
terms of self-preservation but also to enable the
• Vulnerability scanning – exposed parts of the
whole value-chain to be profitable and keep the
IoT product and potential cloud services etc.
IoT product’s total life-cycle cost interesting for
should be regularly scanned for vulnerabilities
all involved. In order to do all this, a training and
• Regression tests after bug fixing and chang- education package may need to be developed for
es. If automating, using test suites and test both internal and external use. Further, training
rigs, this will be faster and more efficient and education for users at customers can be
considered as an add-on service. In case there
If penetration tests and vulnerability scans disco- is a high attrition rate of employees, the training
vers issues, this should generate a requirement and education package becomes even more
for development or be managed through mainte- important.
nance or upgrades. Well-considered test automa- To maintain an IoT product is not always
tion enables to test fast and that it is possible straight forward to do and may require to be well
to repeat tests many times and that manual considered to be both efficient and cybersecure
testing can focus on test cases which are hard to for the target contexts. If an IoT product comprises
automate. The result of that is a good test cover- hardware, software in various shapes/forms and
age and that there is time to do a lot of testing levels, an underlying software platform, a cloud
during a development cycle. If an organization service/central server, and a variety of
uses a platform to build IoT products upon, a manual or automated services and processes
sub-group of the testers can focus on testing which are executed as a mix on-site and remo-
the platforms base functionalities allowing the tely – all this together provide a complexity and
testers of the IoT product to focus on that and requirements for maintainability.
not the underlying platform. There are a number For an IoT product to operate and function
of publications regarding development of cyber- well during the life-cycle, it will need either al-
secure interfaces and API’s, and large cloud ser- ready from start to have adequate capacity hard-
vice providers and OWASP, with its Top-10 lists, ware-wise in terms of processor, memory and
share a lot of relevant readings and publications storage, so that it is possible to later on add and
on their web sites. These can provide relevant in- upgrade firmware, operating system, platform,
put for developers and testers to craft test cases any software packages used, and open-source
and test suites through the provided descriptions software which grows and application code. New
of common cybersecurity problems, weaknesses extended demands on cybersecurity, which occur
and cyberattack patterns. with regular intervals, will likely require that the
hardware need to be able to endure significant
3.7 Maintainability more load compared to the initial situation. An
over time alternative is to have the hardware as exchang-
eable modules, but then this will require that
– planning for updates, upgrades
there are enough such modules later as they are
and migrations
needed. Many manufacturers stop production a
Commonly, the longest phase of an IoT product’s few years after the initial model is introduced on
life-cycle is when it has been installed and the market and move on with new products and
commissioned at the customers’ users until it is modules. Thus, this must be planned for and to
de-installed and potentially recycled or continues start with a hardware configuration which barely
its life in some context elsewhere. It is a compe- meets the current capacity requirements will
53
Handbook for Development of Cybersecure IoT Products
probably cause more problems and costs com- big deal in case the quality-level deteriorates due
pared to if a hardware with better capacity had to poor maintainability and inefficient or too late
been selected from start. maintenance and updating. The cybersecurity,
As an inspiration, in particular from mechanic/ which is closely related to maintenance and
electronic product development, there are sometimes also time-critical updates, is a part
concepts regarding “design for maintenance” of the perceived quality-level. Thus, if the cyber-
together with a number of related “design for security-level is or gets too low, the usage of the
X”-concepts, such as “design for manufacturing”. IoT product is disqualified in a number
In case it is hard and complex to plan for and of contexts.
execute maintenance and updates, etc., this Further, a weak ownership of object owners
will likely get unnecessarily costly and the IoT or no budget for maintenance at customers
product will lose competitiveness. If maintenance affects the quality-level, directly and fast, of an
and updates are fast and straight forward to do, IoT product (in case there is a need to mainte-
any stop times in the operation environments nance and updates etc.). Unfortunately, there are
will be shorter (unless there are redundancy to many IoT products, and other production assets,
provide continuous operation). which has a harsh life-cycle with no or little
Something that is often forgotten in early IoT attention and care leading to fast deterioration
product development is the data and information that may cause disruptions within product- and
generated and stored for a long time. What data distribution processes or other types of operations.
formats to use, and how can data be extracted In addition, a neglected IoT product may hold
and move to another supplier’s cloud service/ weaknesses for a long time, which in worst case
server if the object owner at customers (i.e., the can be used by any form of threat and cause
contractual party) own the data and information disruptions, data leakage, malicious encryption
and in the future wish to move it elsewhere? To of the IoT products data and information, etc.
then require a hefty fee will not render any good- Similar to object owners not caring enough
will and nice comments as customers and users for IoT products, a weak ownership by the pro-
meet at industry meetings, conferences, or trade duct manager at the supplier may also transition
fairs. If an IoT product has good functions for an IoT product from being a premium choice
migration from one data format to another and to be among the last ones in the procurement
it is possible to extract and exfiltrate data and processes’ lists of ratings and only be selected if
information (with help of meta data) to another the price is the lowest.
context – then there will be good or excellent
remarks.
3.9 Requirements from
industrialization
3.8 Quality-level and
what affects the level? To industrialize, or prepare an IoT product for
more or less large-scale manufacturing, and
The quality-level of an IoT product is affected by further get the rest of the value-chain (needed to
many factors in relation to expectation from those add value to customers) going is not easy. As a
of the users at customers and the price of the matter of fact, it is pretty hard to do all com-
IoT product. In this handbook, the IoT product’s pletely right from start and usually this requires
life-cycle is central and thus the quality-level a bit of trial and error to pave the way. During
needs to be kept at an adequate level, above the the industrialization, there are many steps and
customers’ expectations, until the end of the actors/stakeholders involved and this exposes an
life-cycle. Thus, it is not the quality-level after IoT product. Thus, physical security and cyber-
the installation and commissioning that is the security is a must and having reliable technicians
54
Handbook for Development of Cybersecure IoT Products
and production workers is a hard requirement for instance a test rig and/or test suite. To only
too. In case there are many involved, this will be manually test a few, such as 3 out of a 1000, is
hard. A question to pose now is what to do by not a good strategy and it is better to automate
ourselves and what should the other actors in the final testing and cover all. Then one knows
the value-chain do to achieve efficiency without that all IoT products that meet the customers
risking the IPR developed as the IoT product is and users are OK. If the volumes are small
about to enter the market and meet the users. If or mainly made by hand, the test automation
too many have access to sensitive information or is not as important as at large volumes, if
secrets, this is not likely to remain confidential the manufacturing/production is rational and
for long. A further question to pose is if the simplistic and causing less defects and thus
value-chain can be outside of Sweden and EU lower level of scrapping or time-consuming
from both physical security as well as cyberse- post operations to rectify defects. Unnecessary
curity reasons, and if there are dependencies to complexity in the manufacturing/production and
suppliers that may cause time-delays for manu- testing of IoT products costs bot money and
facturing/production (i.e., supply-chain problems efforts. Thus, try to simplify and, if possible,
or transportation squeezes alike during the automate as much as possible to achieve the
COVID years). potential benefits. Further, this is a must if the
The requirement analysis should comprise competitors do it.
some kind of design for manufacturing
requirements to ensure that the IoT product is as
easy as possible to manufacture, assemble, to
quality test (post manufacturing/assembly) using
THE IMPORTANCE OF GOOD STRUCTURE ON THE REQUIREMENTS OF CYBER SECURE IOT PRODUCTS.
PHOTO: ADOBE STOCK.
55
Handbook for Development of Cybersecure IoT Products
4. Suppliers’ process to
pick up all requirements,
achieve an adequate
requirement specification
and finally to verify all
the requirements
To consider, if they can bring any value, are the cycles and what major requirements/changes these
numerous groups of requirements as well as will comprise. Such a roadmap should be dynamic
specific potential requirements brought up in the and kept updated depending on what happens
previous chapter. To address requirement engine- within: technology development, the own vision for
ering with collection and analysis of requirements the IoT product, customers’ needs and expecta-
in an ad hoc manner increases the likeliness that tions, and the surrounding world. The roadmap is
important aspects and requirements are missed a good tool to use when regularly communicating
out. Thus, it is necessary to have a clear and with important stakeholders in the value-chain so
structured process at IoT product suppliers (and that they know about the main planning and what
perhaps also at the rest of the value-chain) which to expect. Further, use of a road map can facilitate
regularly brings back feedback on how the IoT allocation of budgets and procurement planning at
product is performing and fulfilling the expec customers’ object owners.
tations of customers and users. To collect a
complete set of requirements is not easy and this
Feedback and verification
is outlined in the previous chapter as well. There
Some industries have developed frameworks,
are many aspects to consider and often there is a
processes or instructions (and may also be
need for prioritizations if the initial set of require-
subject to specific laws or regulations) to enable
ments is larger than the capacity (and timeline) of
requirement engineering. If the product managers
the first development cycle. Therefore, a process
and others involved in the requirement engine-
for structured collection and analysis of require-
ering have a homogenous group as customers
ments is necessary and that requirements which
and users, it may also be possible to get feed-
not are selected for a development cycle is kept in
back and verifications of roadmaps at a regular
the process for the next cycle or minor upgrade/
basis. There are various methods for feedback
patch. In order to support a product manager and
and verification, ranging from focus groups with
all involved in the development of an IoT product,
current users, user group meetings at regular
a roadmap can be used to visualize, on a timeline,
intervals, meetings with strategic/important
for instance the coming three year’s development
56
Handbook for Development of Cybersecure IoT Products
57
Handbook for Development of Cybersecure IoT Products
5. Cybersecure
development
The actual development of an IoT product is just Besides to work efficiently, an environment
a small, but important and recurring phase, in as in the photo also needs to be cybersecure.
the IoT product’s life-cycle. Usually, there are a The cybersecurity is needed as otherwise why
number of development iterations over time, for would we make an effort and spend a lot of
to make improvements and manage problems, funding if someone else just can steal/copy
resulting in regular new versions and updates/ the ideas, blueprints/drawings, patterns, code,
patches. This will continue as long as the IoT documentation, additional IPR and patent
product generates income and is possible to applications. Further, not wanted things or code
maintain and further develop. As the profitability can unauthorizedly be added, data stolen, the
is down or negative, the suppliers commonly raise development process disrupted and later on also
the maintenance fee for customers (for to conti- the customers’ processes disrupted or equipment
nue the support/maintenance) and make an end of encrypted/destroyed. Thus, a development
life plan. The product owner or product manager environment must be protected and the security
then communicates the plan to object owners at level depends on what is in it and, of course,
customers. how much it costs to develop and what profits
that can be generated. There is a big different
for an IoT product which is projected to gene-
The development of a complex IoT product may
rate revenue of a few million SEK compared to
encompass a number of parts, such as earlier
another one with billions of SEK, as well as the
mentioned: hardware, software on different levels
target operation environments are domestic or
(firmware, operating system, applications, data-
critical infrastructures. An analysis is required
bases and more frameworks on top of this), cloud
to map out what needs to be protected, what are
services/servers, manual or automated services
weaknesses, threats and risks (see sections
conducted on-site or remotely, and various pro-
3.4-3-6). Based on the analytic result, the cyber
cesses and structures needed. Of course, there
security-level for the development environment
can be a lot more. However, all this puts require-
can be concluded. Common ingredients are
ments on the development process regarding the
segmented networks, encrypted communications
coordination of a number of commonly parallel
and data, access control, multi-factor authen-
development sub-processes whereof some need
tication, and authorization schemes for what
to have loose or very tight integrations. Unless
different roles can do and if certain tasks require
these are well coordinated or have clear deve-
the four-hand principle (i.e., being two persons
lopment contracts or standardized interfaces
together to avoid collusion). Sometimes, deve-
regarding how they shall fit together and function
lopment environments are divided into separa-
together, it is likely that there will be problems
ted physical environments to be able to better
later on with poor results, drifting costs and low
protect the individual parts being developed.
value created. The photo shows a development
However, this requires hands-on coordination
environment comprising measurements and test
and development contracts/interfaces for the
tools for IoT products with focus on hardware-
parts with integration need. Anyways, this is just
and software integrations.
58
Handbook for Development of Cybersecure IoT Products
the simplistic part and the harder part remains develop cybersecure design, code, ability
in the form of: to craft test cases for cybersecurity and
• To work in a cybersecure manner by not automated test suites/test rigs including
revealing any secrets to unauthorized persons security tests (for such purposes OWASP’s
and not opening up weaknesses or vulnera- top-ten lists may be a good starting point
bilities through mistakes and poor cyberse- together with similar ones from major
curity awareness. IPR in the form of code, software or hardware providers).
documents, manuals and blueprints/drawings • Ensure to have control of which require-
should have adequate protection and only be ments or limitations there are in potential
accessible and changeable in a controlled open-source code or open design to be
manner by authorized personnel. In some used, and store copies of such locally for
cases, changes should only be committed future use if they disappear from Internet
post an approval process or review (such as (as well as to have control of which version
for software code or blueprints/drawings). is in the IoT product).
To achieve the above, the following may • Efficient testing of functional and holistic
be needed: requirements (i.e., cybersecurity, digital
• Train the development teams in cyber- preservation, quality/stability, availability,
security and cybersecure development usefulness) as these often are connected
– know how to protect the own IPR and as the holistic ones cut through all – this
59
Handbook for Development of Cybersecure IoT Products
60
Handbook for Development of Cybersecure IoT Products
61
CLOUD-BASED CYBER SECURITY SOLUTIONS.
PHOTO: ADOBE STOCK.
Handbook for Development of Cybersecure IoT Products
6. Post development
– cybersecure support, service, maintenance
and additional supporting processes and services
A driver for cost and also a potential cybersecu- utility applications that can be distributed along
rity problem is if support, service, maintenance, the IoT product. Helpful figures, which comply
additional supportive processes and services, with the accepted cybersecurity standards and
such as optimization of hardware, software guidelines, should be part of the documentation
and operations, are not well thought through as they help all involved. To consider is that if
and there is low knowledge regarding the tar- an IoT product has its own network or network
get environments for the operations of the IoT segment and is connected to a larger network
products. A supplier of IoT products may need to at the customer’s users, then the larger network
have a few options to manage the most common should have the same (or higher) level of protec-
operations environments and use these to make tion required by the IoT product. Else, additional
any special adaptions needed using professions cybersecurity protection (i.e., controls) may be
services (i.e., consultancy services). A few things necessary to add. Further, it is necessary to
to consider are how this all shall be managed – outline the communication channels and which
do it all on-site, mix on-site and remote work, do protection level for those that are needed/recom-
most of the work remotely except exchanges of mended, what and whom that can have access
hardware and potential mechanical maintenance? to the IoT product as well as what those with
See section 3.7 for additional information on access are authorized to do (see example on
these requirements. such requirements in section 3.2.3).
It is a good idea to provide object owners The forthcoming EU Cyber Resilience Act
and users at customers a recommendation for a will likely pose requirements on monitoring as
cybersecure operations environment, to emp- well as continuous monitoring if the IoT product
hasize the importance of this if their current (or offers where such are involved) developed is
knowledge on this area is low and focused on or becomes vulnerable. A potential consequence
the operation’s processes. This should start of this is that, during the whole life-cycle, there
already during the business development/sales is a need to provide updates to mitigate any vul-
phase and will normally not be a problem but nerabilities and that these updates can be distri-
on the contrary this signals responsibility and buted and installed in a cybersecure manner.
professionalism. If not bringing this up, or hiding To monitor an IoT product, or potentially a
it, for object owners and users at customers, whole fleet of IoT products installed at customers,
this will later create problems for those who will is becoming more common in order to collect
be involved after the development phase of the requirements (and learn what works and not
life-cycle. Preferably, the documentation of the works) and/or as an add-on service for predictive
IoT product (see section 3.5 for requirements or condition-based maintenance and optimiza-
regarding this) should comprise cybersecurity tions. As earlier mentioned, it is a good idea to
within the running texts or brought together in an separate/segregate the data pertaining to how
appendix. Besides the installation and setup, it an IoT product is used and further potential data
should be described how to verify the cybersecu- collected about processes and quality-levels. To
rity-level using instructions, procedures or small get such data, which can be used within fleet
62
Handbook for Development of Cybersecure IoT Products
management functions and provide an overview and the rest of the value-chain concerning who
if there are any weaknesses in the design, speci- owns what data or groups of data, where the
fic components, the whole concept or recurring data can be stored and processed, who can use
problems (such as manufacturing flaws from a what data for what, etc. To achieve this after-
certain production site or too harsh handling) is wards is hard, and this discussion with customers
an important part of cybersecurity but also to get should be at an early stage. The next step is to
specific understanding of stability/robustness, be able to extract data from an IoT product in an
availability, what is worn/torn at different usage efficient and cybersecure manner and transfer it
levels in various contexts. The level of wear/tear to storage and processing for various purposes.
for an IoT product may not cause the same need If data, changed configurations or optimiza-
for maintenance if it is used in a constant damp tions shall be retrieved by the IoT product from
and dusty mining environment compared to usage a cloud service/server, it can be made using a
in an outside environment at a road or railway communication channel opened up by the IoT
where the weather changes. Thus, the data set product as it sends data outwards (this enables
should be considered and if different groups of to keep a good and simple cybersecurity with
data will be generated that can create value for less connections initiated from the outside). The
the customers’ users as well as the stakeholders data from an IoT product can, depending on
and actors in the value-chain. Based on the data needs and cybersecurity requirements, as well
situation, an information model can be crafted. as what is acceptable by the object owner at
Further, there needs to be a suitable agreement customers, be stored within the IoT product (that
or contract with the object owners at customers will require RAM-memory and disk or memory
63
Handbook for Development of Cybersecure IoT Products
card), in a local server at the object owner, in data is transferred out to also fetch any data,
a central server at the supplier or other part of configuration changes, software updates/upgrades,
the value-chain, or in a cloud service. If wanted etc. If this is not possible, more things must be
is to use an external cloud service, operated by done on-site and this also requires routines to
for instance Microsoft or Amazon, the cyberse- ensure that no viruses or malware are brought in
curity-level needs to be set up and configured along with the software and equipment physically
correctly as well as regularly verified. A verifica- brought in to object owners at customers. The
tion should always be made prior to starting to object owner decides how data potentially can be
use a new clod service, or instance of such, and exfiltrated, and it can be good to have for instance
then on a regular basis so that applicable laws, three options for how to do that in case one or
regulations, and recommendations are OK and two of these are not acceptable for the object
aligned with what is wanted. Unfortunately, many owner. To have a continuously open connection
cloud service instances have flaws in the cyber- for exfiltration of data is commonly not acceptable
security due to wrong configuration and set up in unless it is required for very quick reactions or
combination with the cybersecurity-level is not changes. Further, some operations environments
regularly verified. cannot have continuous connections open but
Further, during the design phase it is neces- only open connections at regular intervals. Thus,
sary to consider and investigate how support, various middle-steps and buffering of data (for
service, maintenance and reconfigurations as instance using a buffering gateway having some
well as fleet management functions can be con- firewall functionality above the IoT product or
ducted in a cybersecure manner. In addition, to built-in buffering into the IoT product itself)
also consider is what must be conducted on-site, combined with different data transmission
a mix of on-site and remotely, or if a majority mechanisms (for instance FTP, secure email,
(except what must be made physically regarding IoT-hub, local or global data ponds that export
maintenance and repairs) can be conducted data after filtering and approval, mobile) and
remotely. It is helpful wo draw up and visualize secure transfer (for example SFTP/FTPS,
these processes to find out any collaborations SMIME/PGP, HTTPS (XML/JSON), secure MQTT,
and data sharing required. If the process caring secure OPC-UA, mobile text messages, or other
for distribution, fetching and installing software protected transmissions) crossing various types
updates can be executed smoothly and automa- of networks and topologies may be needed to
ted (without any virus or malware infections), it achieve a robustness and not lose any data while
will be a great benefit for all. It is common that in transit. Commonly used industrial protocols9
some customers have a test environment where for collection of data and/or automation/control
all updates and upgrades are tested prior to functionality are Profinet, Profibus, Modbus,
being installed in the operations environment. OPC/OPC-UA, etc. OPC-UA is being developed
These tests are often from a week up to six in terms of cybersecurity and also has an infor-
months long. Some customers allow that opera- mation model which can be used to standardize
ting systems and firmware are updated without for developers and object owners at customers.
testing if the supplier of these is trusted and The smaller number of middle-steps and buffe-
have a solid track record without mishaps. ring, the better and easier to maintain availability
However, it is recommended to find the facts and the cybersecurity-level. All middle-steps and
about this and draw up the processes needed buffering need to be monitored to detect any
and involved. If a customer’s policies do not stops or problems. Further, customers do often
allow any external connections from the outside, not want, within sensitive operations environ
it gets more complicated, but an option then ments, to have any mobile communications using
is to use the same communications channel as SIM-cards as this can open up for cyberattacks.
9
Some examples of relevant book summaries: https://www.sciencedirect.com/topics/computer-science/industrial-protocol
64
Handbook for Development of Cybersecure IoT Products
This should be possible to find in the customer’s • Authentication level (password, certificate,
policies and internal standards. If using mobile two-factor or multi-factor authentication).
communications, this needs to be managed by
• Authorization (what the user is allowed to do
for instance keeping this in a separated “island”
and with what tools etc.).
in the network or having equipment (such as a
diode) ensuring only outgoing network traffic. • Should the access be on a low or high level
In case it is OK to use controlled connec- – what is necessary for to be able to conduct
tions, initiated from outside of the network, what is needed? To limit low-level access
these need to fulfil the customer’s policies and is harder (e.g., IPSEC VPN) compared to
standards regarding cybersecurity (this goes pro- high-level access (e.g., SSL VPN). Many
bably for both IT and OT as a connection likely solutions for external connections from the
will traverse both the IT- and OT environments). outside often comprise both the low- and
Preferably, the best is to be flexible to use the high-level ones, and to only have low-level
customer’s standard external connection options is not to recommend. Thus, suppliers of IoT
and not limit this to a specific own solution. products need to aware of this and prefera-
Then, if it is possible to access/reach the IoT bly not depend on having such a low-level
product after using the customer’s solution for access solution but also be able to cope with
external connections or there is a an additional a high-level one.
gateway or firewall with an extra VPN-connection • Cybersecurity-level of the device that is used
– it is usually possible to get it to work. The to connect (e.g., end-point-security).
customers often limit the external connections.
• Time limitations for access. The access
It is necessary to limit the possibilities for exte
should be time limited and require a renewal
rnal connections, in particular if initiated from
within 1-12 months. If not renewed, they
the outside, and it should be swift to shut down/
shall be automatically inactivated and remo-
terminate an external connection, for a specific
ved (to clean out old access set ups).
user, or for a group of users. For suppliers of IoT
products to be aware of, these are common con- • If all the above is OK, should an external
figuration parameters for external connections connection be possible to establish or does it
initiated from outside: firstly need approval and be opened up every
• Requirement for fulfilled process for identi- time (e.g., by a user at the customer who
fication of user and set up of user account clicks a box in an interface and approves)
(i.e., enrolment) and potentially additional and that it is possible to, whenever during an
requirement on having passed a training on active connection from outside, terminate it?
cybersecurity (i.e., with approved test result) • Time limitations for sessions – common is
to allow a user to use an external connection to maximize the session time for external
from outside of the network. connections to 30-60 minutes unless other-
• Time-based access (when during the day and wise is needed. It is risky to have unlimited
what weekdays are access enabled). session times and it is not recommended.
65
Handbook for Development of Cybersecure IoT Products
7. Monitoring of the
IoT product throughout
its life-cycle
Although already mentioned a few times, the A proposal, earlier mentioned too, is to clearly
monitoring of an IoT product’s general status and divide up/separate different types of data, which
need for maintenance is important enough to have are stored in the IoT product prior to being trans-
its own chapter. As a supplier, or if it is another ferred/exfiltrated further on using different tables
stakeholder or actor within the value-chain that as- in the database or even different databases.
sumes this responsibility, it is a great advantage to Probably, the simplest to do is to use different
be able to follow up on an IoT product over time. tables in the IoT product as an IoT product may
However, this requires that some pre-conditions not have the processing capacity to run too many
are met. One pre-condition is to agree with object processes in parallel. Other impacting factors are
owners at customers to be able to get the data the cost for potential licenses, if it practical and
needed, be able to exfiltrate it, and be able to (and doable, and if there are any such requirements
allowed to) use the data for this purpose. A way among object owners at customers. Who owns
to start is to craft an information model and map the data, who can do what with the data, and
out the processes where the data will be used what the data may be used for, are questions to
prior to proposing an agreement regarding this manage in an agreement or contract between
with the object owner. If prepared, it is easier to the sales representative and object owner or
explain which data are needed for what purposes another adequate role at the customer. Further, a
and this helps object owners to see the value and division/separation also enables to have different
may prevent a reaction that “our data” shall not cybersecurity-levels (e.g., encryption algorithms
be exfiltrated and used by others. Process- and and key lengths) for the groups of data and also
quality-related data is something else, although be able to improve access rights and authoriza-
add-on services such as monitoring of processes tion of what can be done with the data.
(i.e., process parameters) and quality-levels (e.g., At the cloud service or server side (e.g.,
tolerances for input materials, measurements a local server operated at the customer or a
during and after process steps, and tolerances on central server operated at the supplier) there are
the output) as well as optimizations can be offered some matters to consider as well. Is it OK to mix
based on if there is access to such data. Figure 5 customers’ data in the same database and tables
comprises an example where different groups of (often referred to as “one-tier” or “multi-tenant”)
data have been separated and the supplier own or do all or certain customers have their own
what is related to monitoring and status of the instance in the cloud service or servers (if it re-
IoT product, the object owner or other suitable sides at the supplier)? The latter is often referred
stakeholder at the customer owns what is related to as “multi-tier” or “single-tenant” solutions
to processes and quality, and the last is person- and increases the complexity and costs for ope-
related data which needs to be handled according rations and licenses. However, if it is required by
to the GDPR within EU and corresponding privacy the object owners at customers and they pay for
laws in the USA, India, China, Australia, etc. it – it may be necessary to have.
66
Handbook for Development of Cybersecure IoT Products
FIGURE 5 – EXAMPLE OF SEPARATION OF DATA WITHIN THE IOT PRODUCT, LOCAL SERVER OR POTENTIAL
MIDDLE-STORAGE STEPS DURING DATA TRANSFER, AND CLOUD SERVICE/CENTRAL SERVER, WHERE THE
SUPPLIER OWNS THE MONITORING DATA, OBJECT OWNER AT CUSTOMERS OWNS PROCESS- AND QUALITY
DATA, AND PERSON-RELATED DATA IS KEPT APART FROM THE OTHER TYPES OF DATA.
There are fine opportunities to capture new cases, there can be a need for instructions or
requirements to develop new versions or gene- training of installers and users that are needed
rations of IoT products if focusing on monitoring instead of design changes if these damage the
and the data pertaining to general status and IoT product through harsh handling or it is in-
maintenance need. However, the necessary ag- stalled in the wrong places. Another aspect is to
reement and pre-conditions are needed to be in also put limitations for the usage so that an IoT
place. The progress can be made through finding product cannot break itself doing certain opera-
what works and not works, if there are common tions or movements. Thus, the monitoring need
problems, and if there are problems related to to be structured so that the collected data can
the same root causes of an IoT product. If fin- be analyzed efficiently. Further, the data collec-
ding such root causes, the product manager and ted from those who conducts support, service,
object owner can, together with the development maintenance and repairs should also be collec-
team and other suitable stakeholders, analyze ted to complement the data collected from the
what needs to be done to get a further value-cre- IoT product. To simplify the data management
ating and sustainable IoT product. In some and analysis of the human-generated data, it can
67
Handbook for Development of Cybersecure IoT Products
be handy to have an application where data can Fleet management as a concept is being de-
be grouped into standardized groups and areas, veloped further. Additionally advanced business
which can then be complemented with free text models, where it is required that the supplier-
at the entry of the data. To only have free text side can keep monitoring and control of what
reports will make the analysis and data manage- happens with what is installed at customers’
ment harder and require a lot of effort as then it users, will increasingly rely on fleet management
is required to categorize and harmonize the data functionality. It may not be an IoT product that
using some common measurability or scale (i.e., is sole, but a product integrated with services, a
normalization) in order to be able to make useful Product-Service System, or a function that has
analytic results and comparisons. been sold with an agreement regarding con-
The monitoring and follow-up on IoT pro- tractual parameters as: subscription, promised
ducts can be extended further and it is only level of availability, promised level of improved
the imagination of the own development team’s productivity, risk sharing and revenue sharing
abilities that limit what can be achieved. The from the IoT product’s improved value-creation
monitoring and follow-up can be extended with above a certain threshold. To be able to pull off
for instance self-tests and self-diagnostics, all this, it is needed, besides ability to monitor
which are run regularly to check up on all com- and follow-up, to improve what can be accom-
ponents, parts, all mechanics, as well as that plished remotely except what is required to be
all functions are working, and tolerances are executed on-site such as physical service and
within the wanted ranges. As a complement to maintenance (often referred to as MRO – mainte-
the physical and functional, use of automated nance, repair, and overhaul). Further, to consider
and built-in test suites can be used to verify that are also potential later re-use and reinstating,
the cybersecurity-level of the IoT product is OK through re-manufacturing or re-furbishment, of
or not. Further, procedures executed by humans parts of or whole IoT products. This can improve
can verify this, but it is better to automate as the profitability and sustainability at the same
much as possible. The data and results genera- time as lessening the environment impact.
ted by self-tests, self-diagnoses, test suites, and Commonly, the fleet management functions grow
procedures should be collected, stored and be organically with time as needs and possibilities
used for further analytics and follow-ups. are discovered. Below, there are some examples
of potential fleet management functions for
A possible next step is if the requirements
monitoring, follow-ups, administration, and confi-
on availability-levels are extreme and it is hard to
guration from distance:
physically access an IoT product for humans. For
such situations, the concepts of self-healing or • Prepare, at the supplier of other suitable sta-
self-repairing IoT products or parts can be use- keholder, installation and initial configuration,
ful, in combination with redundancy. Examples either for an individual IoT product or a group
of such situations are if the IoT product is built of such with plug-and-play. This requires that
into structures, is situated below water (or far the IoT product needs to be aware about some
under the surface level), is in the air or space. To matters already from the start as it arrives to
consider is if there is a possibility to use robots the customers’ operations environment. A pre-
or drones (unmanned aerial vehicle - UAV) which paration with installation/configuration should
can do or assist in the repairs, service, or main- be made at the supplier or the other stakehol-
tenance, unless humans can be present or if it der of the value-chain. Further, the IoT product
too dangerous for humans. Likely, there will be a should be prepared with where it can automati-
lot of non-human interactions with IoT products cally fetch/download, in a cybersecure manner,
in the future. the full installation and configuration.
68
Handbook for Development of Cybersecure IoT Products
• Remote administration and configuration or a group of customers that are part of the
– centrally be able to change settings and fleet. The last functionality should require
configurations in one IoT product or group of that more than one administrator do it, i.e., it
IoT products and initiate the change. Further, should require cooperation of 2-3 people with
updates and upgrades can be initiated this adequate authorizations to minimize mistakes
way too and be synchronized with various asset and any sabotage. Further, there should be a
management functions below. verification notification (and logging) as such
operations are completed. Read more on this in
• Emptying/removal/wiping of data and deinstal-
the following chapter.
lation – the ability to remotely, at the end of
the usage in the customer’s operations environ- • An IoT product’s functionality and operations-
ment or end of the life-cycle, empty/remove/ level should be possible to limit in case of pro-
wipe IPR and data from all parts where such blems (e.g., graceful degradation) to lessen the
are or have been stored (i.e., applies to the IoT load or in worst case automatically initiate a
product, any middle-steps and middle-stora- shutdown to avoid serious and costly damages
ges, in cloud services or server parts). It should or breakdowns. Depending on context, such
be possible to control if this applies to only one decisions may sometimes require a human
IoT product instance, a group of IoT product decision, but a high level of automation of such
instances, one/some/all at a certain customer decisions can save dear expenses or in worst
69
Handbook for Development of Cybersecure IoT Products
70
TECHNOLOGY NETWORK BACKGROUND
PHOTO: ADOBE STOCK.
Handbook for Development of Cybersecure IoT Products
case to have to buy a new IoT product. If iden- • Configuration management – store confi-
tifying such problems at an early stage, using guration data to know what hardware and
the fleet management functions, the users/ components each IoT product has, which
operations at the customer can then make versions of software, and when updates/
decisions for how to handle it or if a temporary upgrades/patching are made to what ver-
replacement is needed until the primary one is sion of such. This can save a lot of time
good to go again. and facilitate planning of updates/upgra-
des/patching and also enable searches at
• Collection of feedback and complaints from the
ongoing cyberattacks when there is a need
customers’ users on the IoT product – if there
for finding out if there is a certain software
are no other channel to the product manager,
and what version. An example is the recent
for instance via a web site, social media or user
log4j issue.
groups, for to collect feedback and complaints,
the fleet management functions can potenti- • Obsolescence management – this pertains
ally be used here as well. The feedback and to planning of storing of and how many
complaints can generate new development spare parts/components and old versions
requirements or ideas for improvements as well of software that need to be available and
as the correction of errors or unclarities. The for how long. This is expensive and binds
use of a standardized input for different areas capital, which is not certain to convert
and functions (using normalized measurement to revenue, and may also require a lot of
data and estimations) with possibility for free space (which also may cost a lot). The
text input can be beneficial to enable this data obsolescence management can be a good
to be matched with the data from support, and profitable part of the business if ma-
service, and maintenance. naged adequately and optimized.
71
Handbook for Development of Cybersecure IoT Products
Prior to the start of the operational phase of economy, but lately also the concept elliptic
the life-cycle, it is hard for suppliers of IoT economy , where the life-cycle’s usage phase
products to foresee how the actual use and is extended further to lessen the consumption
operation will be as well as which users that will of the world’s resources, has emerged and is
use/operate the IoT products. Further, it is also being investigated by suppliers. To be able to
hard to foresee new areas of use and potential reach such sustainability, a supplier should also
extensions of requirements, etc., that materi- consider which existing/improved/new business
alize and can be capitalized upon in terms of model to use, how should the foundational and
business, social, or ecological sustainability. In cybersecurity infrastructure look like, and what
addition, it is rather common that object owners knowledge and training packages are needed.
at customers wish to extend their agreements/ Thus, the below should be considered:
contracts far longer than the supplier would like • Application of plus-1 strategy, which may
to. This is due to that the object owners find the entail that one or a few functions are added,
IoT products to work well and still create value in and other features are improved a bit so that
an environment where new investments mostly the IoT product can continue its life-cycle
are made as assets break down or cause to high and be sold a few more years to create value
risks or physical danger. To extend the life-cycle at object owners at customers. In particular,
and offer support, service, and maintenance for this can made for satisfied object owners.
an IoT product will cause an extra load on the Such a strategy has often been used by for
supplier and value-chain. To compensate for this, instance personal car manufacturers, where
it is common to raise the price for object owners some models have been sold up to 20 years
to reflect the extra load and costs as well as the or more.
possibility to have less focus on the recent IoT
products. • Application of re-manufacturing or re-fur-
bishment, and extend the life-cycle through
As the world’s resources are used up, new
exchanging worn/torn parts or components
forms of thinking and concepts are getting
and potentially combining this with upgrades
adopted among suppliers and value-chains,
or parts or components required to improve
which manages some sort of physical product or
the IoT product’s functionality further on.
system. In order to improve the resource mana-
A similar concept is re-conditioning, which
gement and optimize the usage, with increased
encompasses cleaning up and potentially
sustainability as a result, there are some potential
restoring surface layers and test that all are
variants for how to extend an IoT product’s
OK. Sometimes a few parts can be exchang-
life-cycle. This is often denoted as circular
ed, but that is commonly not part of the
10
https://www.ltu.se/research/Framtidsomraden/creaternity/Aktuellt/Elliptisk-ekonomi-annu-mer-hallbar-an-cirkular-1.224542
72
Handbook for Development of Cybersecure IoT Products
re-conditioning. Re-conditioning is applied by At the very end of the life-cycle, the docu
suppliers of used servers, network equipment, mentation/user manual should comprise instruc-
cars and mobile phones that are in good tions for how to prepare the IoT product and
condition. its parts for end of life/scrapping/destruction/
re-cycling without compromising any IPR or data/
• Application of re-purposing, which may com-
information (such as configurations, set-ups,
prise using the IoT product for applications it
recipes/programming, operational information
was not initially intended for, and where an ol-
as IP-addresses, etc.) to unauthorized persons.
der version of an IoT product will be adequate.
Thus, all mentioned need to be emptied/wiped
• Application of down-cycling, which means regarding IPR and data/information as well as
that an IoT product can be continued to use that it should be possible to verify.
in markets or contexts that have lower requi- To observe is that the emptying/wiping is
rements, or the capacity to pay is lower, than applicable for locations where IPR and data/
the primary market but the business volume information are stored, which may include a lot
is still of interest. An example market is deve- more than just the IoT product. Cloud services,
lopment countries. servers and middle-step storages used should be
included too – and be possible to verify. Thus,
The above requires that, at the end of the it is favorable to have a function which empties/
primary life-cycle, an IoT product is emptied/ wipes all IPR and data/information at all places,
wiped regarding IPR and data/information or that concerning one IoT product, a group of such, one
such is replaced with factory settings or dummy customers’ IoT products, a group of customers’
contents. The picture below shows a part of the IoT products, or all customers’ IoT products, at
re-cycling process of electronics and metals, the very end of the life for an IoT product.
where IoT products should have been emptied/
wiped prior to being input to such a process.
73
Handbook for Development of Cybersecure IoT Products
9. Use cases
It is hard, at an early stage, to get an understanding • Other – here is what else that can be of interest
for and capture a complete set of requirements for which is not already brought up
an IoT product, as when it starts to be used new
ideas and experiences are generated. To facilitate 9.1.1 Use case – domestic (home)
the capturing process, the usage of adequate and
• In a domestic setting, the use case ranges
relevant use cases may provide a better initial
from apartments in multi-tenant buildings to
understanding of the set of requirements for all
townhouses, houses and cabins. The domestic
involved in the development process. Chapter 9
context gets an increasingly improved standard,
is a continuation of chapter 4 and provides a few
which also applies to infrastructure in the
examples of use cases. Prior to starting up the
form of Internet connections via fiber, cable-TV,
development process, such use cases should be
or mobile networks. Most households have
complemented with additional information regar-
a low level of cybersecurity awareness and
ding the operations/usage of the IoT product.
related knowledge about how to cybersecure
the household and reach a hygiene level for
9.1 Use cases with cybersecurity.
concrete examples • Many persons spend a lot of time in the
household and use a variety of connected
Below, there are five different use cases ranging
products, machines and systems. There are
from domestic (home) to various professional
requirements for sustainability/recyclability,
environments. The purpose of the use cases is
energy efficiency and cybersecurity. Further,
to enhance the understanding that the various
there are also mandatory requirements
contexts’ requirements on cybersecurity are not
for electric safety and type approval with
the same. The more cybersecurity needed, the
CE-marking, and recently added also for
more it will cost to develop, test, certify, etc.,
personal data (GDPR), IoT-security for consu-
later on during the IoT product’s life-cycle. Fur-
mers (ETSI TS 103 645/TS 103 701) and the
ther, the more functionality the more effort will
forthcoming EU Resilience and Cybersecurity
be required later on as well for further develop-
Acts comprising expected requirements for a
ment and maintenance.
hygiene level of cybersecurity within digital
To outline the use cases, a common structure
consumer and professional products.
has been used to make it easier to compare them.
The structure is as follows: • In a domestic setting, there is an ongoing
replacement of unintelligent home electro-
• Organizational type – brief description.
nics and appliances, machines and systems
• Operations/processes – introduction of the to increasingly smarter and connected IoT
operations/processes to understand the set of products such as: refrigerators, washing
requirements for the IoT product. The require- machines, toasters, baby monitors, TV and
ments may emancipate from: customers/users, media equipment, smart watches with pulse
laws/regulations, industry standards and other meters and GPS, mobile phones, home
stakeholders. computers/pads, game consoles, Alexa- or
• Type of IoT products and how these are used. Nest-like devices from Amazon/Google/Apple,
heating/cooling systems, building automation
• Cybersecurity requirements around IoT systems, lock- and alarm systems, cars and
products.
74
Handbook for Development of Cybersecure IoT Products
75 DIFFE-
MANY PEOPLE SPEND A LOT OF THEIR TIME AT HOME AND USE MANY
RENT CONNECTED PRODUCTS, MACHINES AND SYSTEMS..
PHOTO: ADOBE STOCK.
Handbook for Development of Cybersecure IoT Products
A PROCESS ENGINEER.
PHOTO: SHUTTERSTOCK.
armatures/lighting. All these increasingly destroy IoT products, learn if the habitants
smarter IoT products are used to increase are at home, access alarm/surveillance
the comfort, ability to remotely monitor and system cameras, be able to open locks or
control functions or control per automation disable alarm systems, plant encryption
(e.g., control by energy cost level), be able to viruses, or use the IoT product as part of
learn the status of locks- and alarm system bot-nets. The hygiene level comprises having
including water leakage. Thus, all this should a competent firewall/router at the Internet
improve the daily life and simplify as much connection and to preferably also segregate/
as possible. There may also be instances of segment the network or networks. If there
e-health or home care, which use sensors and are individual IoT products that need a higher
safety alarms. In such cases, the personal level of protection due to sensitivity, such
data and its integrity plus availability are of as alarms, cars, mobile phones, computers,
great importance. building automation, these should be extra
protected. Above the network, there should
• The domestic context requires cybersecurity
also, if possible, be protection by anti-virus
considerations regarding what the habitants
or anti-malware solutions, local firewalls, etc.
want to protect. Usually, there are plenty
However, some current IoT products may not
of personal data, which should only be
have the capacity for that and will therefore
accessible by whom are concerned, which
be vulnerable. At high requirements for avai-
implicates that also mobile phone security
lability, for instance at instances of e-health
must be part of this. There are many apps
or home care as well as for alarm and monito-
that collect and transmit data or information
ring systems, extra measures may be needed
as well as what various sensors, microphones
regarding the cybersecurity-level as well as
and cameras pick up. A hygiene level, or
possibly having a redundant Internet connec-
baseline, for cybersecurity is needed to
tion via fiber, cable-TV or mobile networks.
protect from cyberattacks and intrusions.
Further, hardening of the network and IoT
Preferably, the protection should be made in
products should be considered to improve the
layers starting from the Internet connection
cybersecurity-level. Hardening encompasses
and inwards to prevent malicious actors to:
76
Handbook for Development of Cybersecure IoT Products
that not needed services are removed or 9.1.2 Use case – industrial
inactivated, the communications is limited to organizations or companies
only authorized and needed communications with production and distribution
(i.e., not needed communication ports should processes
be closed and, if possible, only the needed
• Within manufacturing- and process industries
protocols allowed on the open ports and in
there are often an administrative environment
between network segments). Concerning har-
(IT) and another environment where the
dening, it would be good if the supplier had
manufacturing/production is (OT). Further,
already from start hardened the IoT product
distribution processes are sometimes connected
and if needed it can be opened up at com-
to the OT environment with the manufacturing/
missioning (i.e., secure-by-design). The main
production but are commonly partly or wholly
issue for households is the cost level, as an
separated. Previously, in many cases only
adequate level of cybersecurity costs, leading
the IT-environment was connected to the
to that many households spend too little
Internet. However, now it is common that
and get a poor hygiene level which in turn
OT environments are also connected and
is not maintained over time. Another large
possible to connect to from the outside.
issue is if the supplier has not developed an
Some OT environments still do not have any
adequate level of cybersecurity, as it seldom
connection, or a poor one, to Internet. The
gets improved over time. Further, it is good
cybersecurity awareness and maturity have
practice to enable automatic updating/upgra-
always been satisfactory in parts of indu-
ding and get cybersecurity updates installed
stries. However, the awareness and maturity
timely (i.e., fast) and that a warning is issued
need to be strengthened among almost all
in case there is something that are or seems
employees and the industries must organize
not to be OK.
their cybersecurity for both the IT- and OT
• In addition, a common sense of cybersecurity environments as these are usually connected
hygiene and basic knowledge what to do and to each other.
not to do, are necessary. This should include:
• Many industrial companies and organizations
to not click on unknown links or files sent by
have their processes operating outside of normal
unknown persons, to not open up attached
working hours, often run multiple shifts or
files which have not been checked by an
around the clock, having only stops during
anti-virus solution, to not get conned/frauded
one or a few weeks per year. The increasingly
by strangers calling on the phone, or by text
continuous the operations is, the harder it
messages/emails with links. This is also refer-
is to make any changes in the production
red to as cybersecurity awareness. Further, all
processes and this requires detailed planning
new procurements or re-installations of an IoT
for all changes or new installations to be able
product’s basic configuration should require
to complete these within the planned stops.
mandatory changes of: device name, user
Further important is to be able to re-start and
account names, passwords, network addres-
be operational as soon as possible again after
ses and IP-masks. There is often a possibility
the planned stop – preferably without problems
to apply a high level of cybersecurity, but this
or disruptions. For efficiency reasons, it is
may require that the basic configuration is
getting more and more common that suppliers
walked through, following reading the in-
and consultants need to be able to connect in
structions, and be elevated using for instance
from the outside in order to provide services.
stronger encryption algorithms and authenti-
Further, many IoT products need to share data
cation level.
with both internal and external recipients.
There are a number of sustainability requirements
77
Handbook for Development of Cybersecure IoT Products
posed on IoT products, for instance related to the most important. Further, the integrity of
the surrounding environment, to have a the processes must be kept high and avoid
robust and stable function, as well as being variations, stops or disruptions, to ensure that
recyclable, energy efficient and cybersecure. the resulting output have an even and wanted
In addition to workplace environment require- level of quality. There are large amounts of
ments, electric safety requirements and type information in such processes, whereof some
approval with CE-marking, there are the EU can be confidential encompassing knowhow
GDPR and the forthcoming EU Cyber Resilience regarding processes and implementations,
and Cybersecurity Acts with requirements methods, recipes/patterns, programming, etc.
for a hygiene level of cybersecurity for digital Just to know if a manufacturing/production
consumer and professional products. process is operational or not can be valuable.
Thus, IoT products, such as sensors, measu-
• Within the manufacturing/production environ-
rement equipment, monitoring systems, and
ment, there is often a wide variety of IoT
maintenance systems, need to have proper
products with for instance sensor solutions
physical protection combined with a wanted
for monitoring and control of processes and
least level of cybersecurity hygiene. If there
production equipment. Further, common are
are weak areas, these are where problems
also alarm/lock systems, building automation
mostly occur. Regarding a hygiene level, the
with ventilation/heating/cooling, maintenance
first to do is to segregate the networks into IT
systems that monitor the condition of produc-
and OT and further to divide up/segment the
tion equipment and assets, measurement
OT environment into smaller segments to keep
systems for piles of production input materials
the processes apart and isolated to protect
(i.e., raw materials), warehouse systems pro-
these from problems and only allow authorized
viding bar-codes for production output, etc.
communication in and out of the segment (as
Distribution processes also use IoT products
well as between the segments). Besides the
to keep order of where output is and that the
above, the users should only be allowed to do
output quality is kept at a wanted level (e.g.,
what they must (and not more) and any external
moisture, cooling or keeping the right tem-
connections should be controlled and that
perature) until delivered. Within distribution
data is shared only with the right recipients.
environments, the physical security is often
In addition, monitoring of networks, patch
lower than in the manufacturing/production
routines, incident management, backup and
environment and this must be considered
restore processes, etc., are necessary to have.
properly. Manufacturing/production and
Unfortunately, many IoT products have poor
distribution environments can be tough on IoT
inherent cybersecurity and it is not possible
products concerning physical protection (i.e.,
to upgrade or replace in a rational way. Thus,
environmental protection for water/dirt/dust/
some IoT products should not be connected
cold/heat, impacts and physical intrusion at-
into the OT-networks but be in islands.
tempts trying to connect to internal networks
via the IoT product) and cybersecurity.
Another issue in OT environments is to manage
• Within industrial companies and organiza- third parties (i.e., suppliers/vendors and consul-
tions there are protectable information in tants) moving around in the environment, and
both the IT- and OT environments. As most to ensure that these do not bring in any virus/
of the value is created in the manufacturing/ malware or connects “things” without having
production environment it needs to function proper authorization from the OT-security
and operate well. Thus, aspects such as responsible to do so. Distribution environments
availability, robustness and stability within the often comprise IoT products that are exposed
manufacturing/production processes are often and can be used as entry points to get access
78
Handbook for Development of Cybersecure IoT Products
to networks and spread viruses/malware. Thus, strial organizations and companies is often lack
these IoT products need physical protection and of competence and clear rules on this, which
there should be control who can communicate may cause cybersecurity problems within the OT
with these too. Thus, the cybersecurity must environment as a result. Another problem is that
be considered and kept up over time as well as the cybersecurity in OT environments is underin-
at decommissioning when these may otherwise vested compared to the IT-environment, which is
be thrown away in public recycling containers somewhat strange as most value is generated in
together with their packaging box. the OT environment. An additional, but smaller
In addition, IoT products should be hardened. problem, is that suppliers’ function warranties
This entails removing or inactivating not needed require that upgrades and patches must be app-
services, and limiting the communication to roved/authorized prior to installation and that this
only what is needed on specific ports, applica- often lags in time causing open vulnerabilities.
tions and protocols. The supplier should do this
hardening as part of the basic configuration, and • Else, in general, needed is a good cyber
that if wanted or needed some things can be hygiene and knowledge on what to do and not
opened up during the installation. General basic do. For instance, mobile phones must not be
configurations for hardenings should be applied charged via USB-ports on equipment, to not
as general practice. The main problem for indu- use non-controlled media (USB-disks), to not
80
Handbook for Development of Cybersecure IoT Products
81
Handbook for Development of Cybersecure IoT Products
82
Handbook for Development of Cybersecure IoT Products
There are often, within maritime distribution 9.1.4 Use case – municipalities
environments, IoT products which are exposed (which are affected by the laws
and can be used as a steppingstone to get into of public procurement)
networks and spread virus/malware. Thus, there
• Swedish municipalities have operations with a
is a need for physical protection, to keep control
wide range and varying extent, where certain
of whom can communicate with them, as well as
parts are very similar to critical infrastructures,
to consider how to maintain the cybersecurity-
industrial organizations and companies, and
level over time and what happens at the end
healthcare, while other parts are oriented
of the life-cycle. Further, hardening of maritime
towards administration. There are only a few
IoT products are necessary. The hardening
very large municipalities, some middle-sized
encompasses to remove or inactivate services
and most are small with a population of a few
not needed, strictly limit the communications to
thousands to ten thousand. The small number
only the ports, applications, and protocols where
of populations in most municipalities, and
authorized traffic should pass. The supplier
if situated in rural areas, causes a negative
should make the hardening, as part of basic
effect on the possibility to find adequate
or factory settings, and if needed this can be
competence within IT, OT, IoT products and
opened during the installation. Base configura-
cybersecurity in general. Some parts of the
tions for hardenings are good to use to minimize
operations are further challenging than others,
human error. The large problem for the maritime
e.g., the primary and secondary schools
industry is often lack of enough competencies
where almost all pupils are connected as well
and organization as well as locally implemented
as public locations such as libraries, sport
rules, which may cause, as a consequence,
arenas, busses and squares all having public
cybersecurity-related problems in the OT
municipal Wi-Fi-connectivity.
environment. A smaller problem is that the
suppliers’ function warranty commonly needs • A municipality is commonly divided into
approval by the suppler prior to upgrades and administrative districts/areas, such as: public
patches can be installed. Unfortunately, the service, primary and secondary school, social
suppliers take some time to do their own testing care, recreational activities, culture, environ-
required and this leaves a time gap where the ment and construction/building, digitalization,
IoT product is vulnerable. rescue services, harbours, etc. In addition,
• In general, required are to have a high level of there may be election and guardian districts/
cybersecurity and knowledge about what not areas. Regarding urban construction/building,
to do, e.g., to not charge mobile phones in there is often a technical office that deals
USB-ports on devices or equipment, to not use with real estate, traffic control and lights,
uncontrolled media (e.g., USB-disks), to not sewage and clean water production, as well
install any uncontrolled software, to not click as IT (unless that is an own function within
on any unknown links or open any files/attach- the municipality). The other districts/areas
ments which have not been scanned for virus/ have responsibility for schools, libraries, sport
malware, etc. Further, each new procurement arenas and facilities, elderly care and shelters,
or re-installation of a maritime IoT product’s local public traffic (busses and trams etc.),
base configuration should require mandatory which all may have their own IT-, OT-, or MT
changes of device name, user accounts, (medical technology) infrastructure using IoT
passwords and network addresses and IP- products in multiple locations. Within a muni-
mask. The cybersecurity-level should be set to cipality, the boundary and definitions regar-
the required, or above that, baseline (which can ding what is classified as critical infrastructure
be determined by the potential class action). may be somewhat unclear and should be
given more attention. The critical context con-
83
Handbook for Development of Cybersecure IoT Products
cerns for instance sewage management and for monitoring of patients, in equipment for
clean water production, energy production/ remote care (which likely will increase a lot),
distribution, traffic, rescue services, and elderly safety alarms, and other applications enabling
care. Further, also larger roads, airports, and health and elderly care at the care takers’ own
harbours with large logistical impact should homes at increasingly higher age. Thus, there
be part of the critical context. Depending on are a lot of IoT products installed and used
the size of a municipality’s population and within the operation of a municipality – and
the operation’s impact on society in large, the number will increase as long as the cyber-
the critical districts/areas mentioned may be security-level allows that.
subject to national security protection laws
• Common problems in municipalities, which
and secondary laws form the Swedish Civil
are related to cybersecurity and the use of IoT
Contingencies Agency and Swedish Food
products, are the lack of required competencies,
Agency as well as other authorities. There
tough and prioritized budgets, and that the
are sensitive personal data/information within
law on public procurement discourages some
many of the districts/areas, which requires a
potential suppliers. In addition, the wide
high level of cybersecurity. Thus, legal and
extent of the operations add burden to this too.
regulatory frameworks, such as EU GDPR and
Regarding small and mid-sized municipalities,
potentially NIS/NIS2 and the forthcoming EU
often the main problem is to acquire the right
Cybersecurity Act need to be considered.
competencies. The use of consultants is a short-
• Due to the wide extent of a municipality’s term solution, and due to the COVID pandemic
operations, there are numerous IoT products and the digitalization efforts following it is
installed at many locations (depending on the nowadays easier to get support or help via
level of digitalization). Many IoT products are distance. Small municipalities usually have
used in similar ways as in industrial organi small budgets and an IT-department compri-
zations and companies as well as critical sing 2-3 employees, who shall manage 100+
infrastructure to monitor and control, and systems and cybersecurity plus everything
examples of application areas are building else. This equation simply does not add up.
automation (ventilation, heating, and cooling), To find solutions for the future, adjacent
surveillance/locks/alarm systems, etc. Within municipalities have started to collaborate
health and elderly care, IoT products are used and share systems and competencies.
84
Handbook for Development of Cybersecure IoT Products
Larger municipalities usually have access to a a significant impact on society and cause
wider range of competencies and consultants. large disruptions, in particular if value-chains
Unfortunately, the law on public procurement involved with production of components and
discourages IoT-suppliers to do business with merchandise, food production, and logistics,
larger municipalities too. are impaired. Operations within EU, which
by the NIS Directive are classified as critical
• In general, municipalities need to adhere to
infrastructures, differs slightly from the USA’s
the increasing requirements for improved
classification as EU has seven sectors and
cybersecurity, as they store and process a
the USA sixteen sectors part of the classifica-
lot of both sensitive information and have
tion. The EU’s seven sectors today comprise
critical operations and infrastructures. Thus,
the following ones (these are likely to be
a general improvement of the cybersecurity-
augmented within the next following years):
level is needed, which also applies for the
banks, infrastructure for financial markets,
IoT products used within the wide range of
digital infrastructure, energy, healthcare/
operations in the districts/areas. Of course,
hospitals, distribution of clean water, and
there is a variation in terms of cybersecurity
transports. The USA also further includes
requirements depending on type of operation
chemical industries, critical manufacturing/
and if the IoT products are connected in the
process industries, food production, farming,
IT- or OT environments or operate in smaller
and emergency services – all of which should
isolated networks. Paramount for municipalities
be of interest for the EU as well.
is to recruit and ensure access to cybersecurity
competencies and the additional competencies • Most critical infrastructures, having produc-
needed for IoT products. The usage of IoT tion and distribution, operate their processes
products is likely to increase a lot within the around the clock and may only have possibi-
next 20-30 years as older infrastructure is lities for shorter stops in production and dist-
gradually replaced and additional monitoring ribution. Some may have shorter stops, such
using different types of sensor solutions will as clean water production when the water
be applied. Previously, mentioned was that towers are full until they need to be refilled
small and mid-sized municipalities ought while sewage management and distribution
to cooperate and share systems, staff and of electricity must operate continuously. The
competencies. If such cooperation and colla- more continual the operations are, the harder
boration is initiated, the municipalities need to it is to change in the production and distri-
agree upon coordination of which IoT products bution processes. In such cases, all changes
to use and what cybersecurity-level to apply and new installations must be planned and
– so that the adequate competencies can coordinated well so that when there is a suitable
be acquired. stop, they can be executed and operations
resume smoothly again afterwards. Employees
may, due to efficiency reasons, need to
9.1.5 Use case – critical connect from the outside and conduct work
infrastructures tasks and monitor that all progress well.
• There are many similarities in between industri- Concerning third parties, these should not be
al organizations/companies as well as maritime allowed to connect from the outside unless
industries (see earlier use cases), but critical there are strong reasons for to do so. Further,
infrastructures have further importance for there is an increasing need for sharing of IoT
society and are therefore classified as critical. products’ data both internally and externally.
Of course, parts of industrial organizations/ In addition, there are a lot of requirements
companies and maritime industries can have pertaining to environmental sustainability, for
85
Handbook for Development of Cybersecure IoT Products
a robust and stable function, that they are over vast geographical areas. Unfortunately,
recyclable and energy efficient, as well as sabotage operations/activities are nowa-
adequately cybersecure. Besides laws related days something that must be factored into
to national security and safety, there are also the risk analyses. Thus, the physical and
requirements for work safety and environ- cybersecurity-related requirements are higher
ment, electric safety and type approval with compared to in the industrial and maritime
CE-marking. In addition, there are guidelines settings. This requires a very high physical
from the ENISA, Swedish Civil Contingencies security level in production environments,
Agency, and Swedish Food Agency, as well strict access management, clearer separation
as laws/regulations concerning EU’s GDPR, of environments, hardening of the networks
NIS/NIS2 and the forthcoming Resilience and and equipment/devices (including the IoT
Cybersecurity Acts (with requirements for a products). Regarding the distribution processes,
hygiene level regarding cybersecurity for digital monitoring and intrusion detection are com-
consumer and professional products). monly required in terms of physical access
and cybersecurity wise. The monitoring of
• IoT products operated within critical infra-
distribution processes and networks’ function
structures are often very similar to the ones
are needed to ensure that they function well
used in industrial organizations/companies
(i.e., are available and operate as expected).
and maritime industries but may have further
If these processes fail, fast pinpointing of the
challenges in the distribution processes due
issue is needed for to be able to fix the issue
their exposure and that these are hard to
accordingly.
physically protect due to their extent ranging
86
Handbook for Development of Cybersecure IoT Products
• Within critical infrastructures, the cyberse- installed in a controlled way without disrup-
curity requirements for, and surrounding, IoT tions (unless installed at planned stops). In
products are higher or considerably higher general, IoT products need to be simple and
compared to industrial settings. The baseline fast to upgrade or change.
level for cybersecurity must be adequate and
• Finally, needed is a very high level of know-
there should not be any weak spots or areas.
ledge concerning cybersecurity and what not
The large problems for critical infrastructures
to do. Examples are to not charge mobile
are lack of enough staff with adequate com-
phones in USB-ports, to not use uncontrolled
petencies and security clearance combined
media (USB-disks), to not install uncontrolled
with sometime unclear local rules, which may
software, to not click on unknown links or
cause cybersecurity issues in OT environments
open any attached files that have not been
because of the extent and need for continuous
checked for virus/malware, etc. Further, all
improvement. Not adequate budgets are
new procurements or re-installations of an IoT
another pressing issue. A smaller problem
product’s base settings shall require a man-
is the suppliers’ function warranties, which
datory change of device name, user accounts,
often require that upgrades and patches are
passwords and network addresses and IP-
pre-approved by the supplier prior to that they
masks. Unless the IoT products can live up
can be installed. An issue is that this results
to these expectations, they will not be used
in a time window with potentially open vulne-
in critical infrastructures – whereof there are
rabilities. Due to the continuous operations, a
many as well as extensive ones.
certain level of redundancy is needed, which
further enables that some updates can be
87
Handbook for Development of Cybersecure IoT Products
88
Handbook for Development of Cybersecure IoT Products
89
Handbook for Development of Cybersecure IoT Products
90
Handbook for Development of Cybersecure IoT Products
THERE ARE MANY FRAMEWORKS/STANDARDS, NEW LAWS AND REGULATIONS THAT91 REQUIRES
YOU TO STAY TUNED WHEN IT COMES TO CYBER SECURITY AND IOT PRODUCTS.
PHOTO: ADOBE STOCK
With support from:
STRATEGIC
INNOVATION
PROGRAMMES