Brianna White

Administrator
Staff member
Jul 30, 2019
4,656
3,456
The Internet of Things (IoT) includes items such as smart appliances, smartwatches, and medical sensors.  For organizations to enjoy all of the benefits and convenience of IoT devices, enterprise customers must fully understand the potential risks and threats to their systems and the underlying data. IoT devices often lack built-in security controls, a situation which creates risks and threats for federal agencies and consumers. 
As IoT devices proliferate, it is important for manufacturers to provide secure and safe devices. According to NIST, built-in security controls include device cybersecurity capabilities as well as non-technical support relevant to cybersecurity. Both can be used to mitigate risks related to IoT devices.
IoT Device Non-Technical Supporting Capabilities
The National Institute of Standards and Technology (NIST) Cybersecurity for the Internet of Things (IoT) program announced the drafting of four public documents that provide guidance for federal agencies and IoT device manufacturers on defining IoT cybersecurity requirements. The purpose of this initiative is to help manufacturers and federal government agencies better understand what kinds of device cybersecurity capabilities and non-technical supporting capabilities may be needed from or around IoT devices used by federal government agencies. 
In distinguishing technical and non-technical means for securing IoT devices, NIST notes that IoT devices are primarily secured using technical means, referred to as “device cybersecurity capabilities,” and that non-technical supporting capabilities include actions that manufacturers or third-parties take in support of the initial and on-going security of IoT devices. 
Continue reading: https://www.tripwire.com/state-of-security/security-data-protection/iot/iot-devices-built-to-meet-cybersecurity-needs/
 

Attachments

  • p0004645.m04317.iot_devices_built_to_meet_cybersecurity_needs.jpg
    p0004645.m04317.iot_devices_built_to_meet_cybersecurity_needs.jpg
    80.7 KB · Views: 69
  • Like
Reactions: Kathleen Martin