This whitepaper is for historical reference only. Some content might be outdated and some links might not be available.
United States
The National Institute of Standards and Technology – Department of Commerce
The United States Department of Commerce is spearheading multiple efforts to address
IoT security. The National Institute of Standards and Technology (NIST) published a whitepaper
Department of Defense
Another example within the government is found in the defense
community. In 2016, the Chief Information Officer of the United
States Department of Defense (DoD) issued
policy
recommendations
DoD’s recommended approach and policy action to address IoT security risks include:
-
A security and privacy risk analysis supporting each IoT implementation and associated data streams
-
Encryption at every point, where costs are commensurate with risk and value
-
Monitoring IoT networks to identify anomalous traffic and emergent threat
Federal Trade Commission
The Federal Trade Commission (FTC) has been an important participant in IoT security conversations, pursuing action against device manufacturers who have misrepresented or demonstrated negligence in their security commitments. The FTC has set its bar to reasonable data security and identified the following repeated security deficiencies in device manufacturers:
-
Security not built into devices
-
Developers are not training their employees on good security practices
-
Not ensuring downstream security and compliance (by contracts)
-
Lack of defense in depth strategies
-
Lack of reasonable access controls (customers can bypass or guess default passwords)
-
Lack of a data security program
State of California
California is among the first states within the United States to
pass legislation on IoT. The current bills address issues such
as security of device design and data protection, but do not
have specific requirements of IoT manufacturers. Instead,
lawmakers have focused on security at the design phase, writing
in
SB-327
Information privacy: connected devices