https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/IoTWorldToday-mobile-logo.png
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
    • Back
    • IoT World Expo Austin
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
    • Back
    • IoT World Expo Austin
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Metaverse
  • Development
  • Security
ioti.com

Security


Thinkstock

Image shows the Internet of Things social network.

IIC IoT Security Guidance Aligns Mechanisms with Maturity

New guidance from the Industrial Internet Consortium aims to help make a secure IoT a reality.
  • Written by Courtney Bjorlin
  • 10th April 2018

Aiming to make implementing IoT security more manageable, new guidance from the Industrial Internet Consortium (IIC) helps organizations map security mechanisms to maturity targets.

As IoT implementers seek to align appropriate security measures with limited security resources and budgets, it’s important to consider that not all IoT systems demand the same level of security, the authors of the “IIC IoT Security Maturity Model: Description and Intended Use” white paper said in an interview. The requirements for securing connected assets on the manufacturing floor are different than those required for, say, a smart light bulb.

In that light, the Security Maturity Model (SMM) provides a process to help organizations decide what their security target state should be and what their current state is, to help decision makers invest in security mechanisms to achieve those maturity targets. Not seeking to define what the appropriate security level of a system should be, the SMM instead provides guidance and structure for organizations to identify considerations for different maturity levels appropriate for their industry and system.

“There are so many things that can be done, and if you’re head of security, it’s not clear where to start,” said Ron Zahavi, IIC Security Applicability group co-chair, the white paper co-author and chief strategist for Azure IoT Standards at Microsoft. “We’re allowing them to see it in chunks they can manage.”

SMM builds on the concepts in the IIC Industrial Internet Security Framework (IISF), providing actionable guidance for specific IoT scenarios. First, business stakeholders define security goals and objectives, which are tied to risks, according to the white paper. Technical teams within the organization, or third-party assessment vendors, then map these objectives into tangible security techniques and capabilities and identify an appropriate security maturity level, according to the white paper. Organizations then develop a security maturity target, which includes industry and system-specific considerations. Security maturity is defined by the degree of confidence that the current security state meets all organizational needs and security-related requirements, according to the whitepaper.

“We really wrote this first document as a way of engaging all of those (stakeholders) and enabling them to get alignment on their process and their approach to security,” said Sandy Carielli, white paper co-author and director of security technologies at Entrust Datacard.

Most of the guidance currently available tells stakeholders what the mechanisms are, but doesn’t provide guidance on how to put them together for a specific scenario, Zahavi said. The SMM helps organizations understand and make intelligent choices about which mechanisms to use and the mechanism strengths needed considering their specific deployments.

For instance, “if you’re using encryption, how strong should it be, because not all connected systems need the same level of security,” Zahavi said.

As such, the document also aims to bring consistency to the manner in which security assessments are conducted by security assessment vendors, both broadly by incorporating the concept of maturity in that process, all the way through lending guidance on how results can be communicated to customers. IIC is working with vendors, and planning case studies with security assessment companies to that end.

In turn, in the next few months, IIC will release a practitioners guide for technical stakeholders.

In all, the efforts aim to help make a secure IoT a reality.

“With this type of work, we’re removing that barrier and were making great progress,” Zahavi said. “(IoT security) is something that can be addressed. It’s not something everyone needs to throw their hands up at and there are technologies and mechanisms available. What we’re doing here is making it actionable.”

Tags: Article Security Technologies News

Related Content


  • Caltech campus
    Robots Could Gain Sense of Touch, With New Artificial Skin
    New design can help businesses determine the presence of hazardous materials, offer greater safety for workers
  • Clearview AI Fined $9.4M Over Facial Data Scraping
    The company was ordered to delete any data it held on U.K. citizens.
  • Microsoft Ramping up Cybersecurity Service Offerings
    Three new managed services will boost the company’s presence in the security space
  • IoT Product Roundup
    IoT Product Roundup: PTC, Nokia, Arm and More
    All the latest Internet of Things products

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Latest News

  • Black Hat 2022: Sophisticated Cybercriminals, Increased Ransoms
  • Black Hat 2022: Adapting to the Growing Cyberthreat Landscape
  • Security: The Hidden Risks of Connected Devices
  • Northrop Grumman Harnesses IoT for New Missile Integration Facility 

Roundups

View all

IoT Product Roundup: Verizon, Microshare, SmartCow and More

15th August 2022

IoT Deals & Partnerships Roundup: Nokia, Accenture and More

29th July 2022

IoT Deals & Partnerships Roundup: Nokia, SoftBank, Microsoft and More

15th July 2022

White Papers

View all

The Role of Manufacturing Technology in Continuous Improvement Ebook

6th April 2022

IIoT Platform Trends for Manufacturing in 2022

6th April 2022

Events

View all

IoT World Expo Austin

2nd November 2022 - 3rd November 2022

Latest Videos

View all
Image shows a road within the Curiosity Lab at Peachtree Corners

Brandon Branham, Peachtree Corners, on Smart Cities

Peachtree Corners CTO and assistant city manager chats with IoT World Today’s Chuck Martin about what’s happening at Curiosity Labs

Image shows a Beep electric autonomous shuttle

Joe Moye, Beep, on Self-Driving Shuttles

Beep’s CEO chatted with IoT World Today’s Chuck Martin about the deployment of the company’s electric autonomous shuttles

E-books

View all

How Remote Access Helps Enterprises Improve IT Service and Employee Satisfaction

12th January 2022

An Integrated Approach to IoT Security

6th November 2020

Webinars

View all

Is MQTT becoming the de facto standard of Industry 4.0? The impact of IoT on industrial automation protocols

18th August 2022

Building trust for a connected world

25th August 2022

Is MQTT becoming the de facto standard of Industry 4.0? The impact of IoT on industrial automation protocols

18th August 2022

Special Reports

View all

Security: The Hidden Risks of Connected Devices

11th August 2022

Omdia’s Smart Home Market Dynamics Report

7th January 2022

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

Twitter

IoTWorldToday, IoTWorldSeries

🎉SPEAKER ANNOUNCEMENT ALERT!🎉 Brandon Satrom, the VP of experience engineering at @blueswireless, will speak at… twitter.com/i/web/status/1…

17th August 2022
IoTWorldToday, IoTWorldSeries

Meet business-wide goals with Equipment as a Service dlvr.it/SWn1g0 https://t.co/Ya1F8QUhpw

17th August 2022
IoTWorldToday, IoTWorldSeries

Smart Shopping Cart Startup Raises $35M dlvr.it/SWmd0Q https://t.co/qIAhJNfvDG

17th August 2022
IoTWorldToday, IoTWorldSeries

The Forrester Total Economic Impact of Lightbend Akka Platform dlvr.it/SWmcFd https://t.co/L9JSOlkiOr

17th August 2022
IoTWorldToday, IoTWorldSeries

Semtech Acquires Sierra Wireless for $1.2 Billion dlvr.it/SWmXWz https://t.co/oa2WgxyZyI

17th August 2022
IoTWorldToday, IoTWorldSeries

Robotaxi via Lyft App Launched in Las Vegas dlvr.it/SWmXT0 https://t.co/2i9bNaWRwG

17th August 2022
IoTWorldToday, IoTWorldSeries

Smart Cities Featured at IoT World in Austin dlvr.it/SWmVt7 https://t.co/I7jdnEI89w

17th August 2022
IoTWorldToday, IoTWorldSeries

📣 Join us on August 18th to explore how MQTT has been helping system integrators to overcome the challenges of hybr… twitter.com/i/web/status/1…

16th August 2022

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X