IPWG IoT Frameworks Overview
wdt_ID | Title | Date | Source Type | Author | Encryption | Security Updates | Passwords/Authentication | Third-Party Access | Collection Limits | Transparency | User Controls | Device Lifecycle/Lifespan | Supply Chain | Status |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | Internet of Things (IoT) Broadband Internet Technical Advisory Group |
Nov 2016 | Civil Society | Broadband Internet Technical Advisory Group |
- Encryption by default |
- Supports automatic software updates (for security) |
- Secured by default |
- Only with notice at time of purchase |
N/A |
- Policies should be easy to understand and locate |
- Controls "may be important to some end-users." |
- Provide continued support for a device over its - Alert consumers to what they should expect from |
- Recognition of supply chain security vulnerabilities |
0 |
2 | IoT Security Guidance | May 2016 | Civil Society | Open Web Application Security Project |
- Encryption in transit |
- Supports alerts and notification to user of security |
- Require strong passwords |
N/A |
- Support for data minimization strategies, including |
N/A |
- Controls for data collected "beyond what is |
- Design all stages of the lifecycle to be evolutionary |
N/A |
0 |
3 | Establishing Principles for Internet of Things Security |
2016 | Civil Society | IoT Security Foundation |
- Promotes strong encryption |
- Authenticate update/patching sources |
- Promotes strong passwords |
- Encourages inventorying and isolating data to |
N/A |
N/A |
- Promotes managed access via IoT data hubs |
- Consider that IoT devices may change owership |
N/A |
0 |
4 | IoT Trust Framework | Jan 2017 | Civil Society | Online Trust Alliance |
- Promotes deployment of strong encryption |
- Promotes automated updates based on user |
- Promotes strong passwords and authentication |
- No independent third-party sharing and implement |
- Encourages data minimization |
- Promotes easily readable and discoverable policies |
- User controls should be carefully explained |
- Disclose lifecycle update expectations to the |
- Supply chain management and security risk |
0 |
5 | Future-proofing the Connected World: |
2016 | Civil Society | Cloud Security Alliance |
- Promotes encryption at-rest and in-transit |
- Promotes secure update capabilities |
- Promotes end-to-end authentication, authorization, |
- Cautions against third parties have extensive data |
- Promotes FTC data minimization and retention |
N/A |
- End-user controlled features are critical |
- Consider security during the entire device lifecycle, |
- Examine and monitor supply chain for attacks |
0 |
6 | Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms |
2016 | Civil Society | Charith Perera et al. |
- Promotes encryption "wherever possible." |
N/A |
N/A |
- Limit third-party access to data |
- Recommends minimizing the number of data |
N/A |
- Encourages end-user controls ("some kind of |
- Provide full support and protetion for the complete |
N/A |
0 |
7 | Strategic Principles for Securing |
Nov 2016 | Government | U.S. Department of Homeland Security |
- Encourages use of hardware that incorporates |
- Supports ongoing vulnerability management |
- Require strong passwords |
N/A |
N/A |
N/A |
N/A |
- Developers should communicate to manufactureres |
- Know the supply chain and whether there are any software components |
0 |
8 | NYC Guidelines for the Internet of Things | 2016 | Government | New York City, Office of Tech & Innovation |
N/A |
- Promotes audit-based and continuous system |
- Stresses identity and access management controls |
- Information should be easily sharable via open |
- Encourages data minimization |
N/A |
N/A |
N/A |
N/A |
0 |
9 | IoT Security Guidelines Overview Document | Feb 2016 | Industry | GSM Alliance |
- Calls for strong (and evolving) encryption practices |
- Encourages over-the-air firmware updates |
- Highlights authentication challenges in IoT devices |
- Calls on third parties to "respect context" of data |
- Calls on organizations to engage in a PIA |
- Promotes "raising consumer awareness" of |
- Suggests trust can be promoted by offering |
- Security lifecycle needs to be monitored for the |
N/A |
0 |
10 | IoT Design Manifesto | May 2015 | Industry | www.iotmanifesto.com |
N/A |
- High level commitment to security |
N/A |
- Encourages notice/consumer education of third |
- Encourages "deliberate" data collection that serves |
- Promotes raising consumer awareness of potential |
- Explicitly encourages development of user-controls |
- Lifespans of physical products and digital services |
N/A |
0 |
wdt_ID | Title | Date | Source Type | Author | Encryption | Security Updates | Passwords/Authentication | Third-Party Access | Collection Limits | Transparency | User Controls | Device Lifecycle/Lifespan | Supply Chain | Status |
Note: The footer row is actually a column filter. Simply type your query in a column to filter the content. You can filter by multiple columns. For example, typing “ind” in the “Source Type” footer area will filter the data to only “Industry” source types.