Definition - IoT Lens


There are five best practice areas for security in the cloud:

  1. Identity and access management (IAM)

  2. Detective controls

  3. Infrastructure protection

  4. Data protection

  5. Incident response

Infrastructure and data protection encompass the IoT device hardware, as well as the end to end solution. IoT implementations require expanding your security model to ensure that devices implement hardware security best practices and your IoT applications follow security best practices for factors such as adequately scoped device permissions and detective controls.

The security pillar focuses on protecting information and systems. Key topics include confidentiality and integrity of data, identifying and managing who can do what with privilege management, protecting systems, and establishing controls to detect security events.