This whitepaper is for historical reference only. Some content might be outdated and some links might not be available.
United Kingdom
The UK’s Department for Digital, Culture, Media and Sport (DCMS)
published the final version of its
Code
of Practice for Consumer IoT Security
The Code of Practice emphasizes three leading practices for enabling users to achieve the greatest and most immediate security benefits, and urges IoT stakeholders to prioritize them:
-
No default passwords – Many users do not change the default password, which has been the source of many IoT security issues.
-
Implement a vulnerability disclosure policy – IoT device, service, and app developers should have a vulnerability disclosure policy and public point of contact to allow for the reporting (and remediation) of vulnerabilities in a timely manner.
-
Keep software updated – Software updates need to be timely, easy to implement, and not disruptive to the functioning of the device.
As evidenced by the approaches outlined by both the US and UK, the
security of IoT will continue to be top of mind for governments.
Efforts are also underway by national and international standards
bodies to develop standards, guidelines, and
best
practices for securing IoT
In the context of IoT, customers should have the flexibility of
using existing, time-tested practices already in use in what’s
considered more traditional network cybersecurity. For example,
when trying to identify vulnerabilities, detect irregularities,
respond to potential incidents, and recover from damage or
disruption to IoT devices, customers can use the cybersecurity
controls mapped against the
NIST
Cybersecurity Framework (CSF)