Dear All,
The Background…and NIST’s Plan for Improving IoT Cybersecurity
The passage of the Internet of Things (IoT) Cybersecurity Improvement Act in 2020 marked a pivotal step in enhancing the cybersecurity of IoT products. Recognizing the increasing internet connectivity of physical devices, this legislation tasked NIST with developing cybersecurity guidelines to manage and secure IoT effectively. As an early building block, we developed NIST IR 8259, Foundational Cybersecurity Activities for IoT Device Manufacturers, which describes recommended activities related to cybersecurity for manufacturers, spanning pre-market and post-market, to help them develop products that meet their customers’ needs and expectations for cybersecurity.
Five Years Later: Evolving IoT Cybersecurity Guidelines
Looking forward, what emerging trends or technologies do you believe will have the most significant impact on the evolution of IoT cybersecurity guidelines and practices in the next five years? Think about areas like AI, edge computing, and new communication protocols.
Share your perspectives and insights. Let's learn and explore together!
There is a lot more information available on IoT security now than in the past:
NISR SP800-213A
ETSI EN 303 645
ENISA WP2017 baseline security recommendations for IoT
It would also be worth looking at the PSTI regulations on IoT goods for resale.
This is very informative. Thank you for sharing your time and expertise on this topic @Steve-Wilme.
I'm eager to hear more insights from other members of the group.
@Kyaw_Myo_Oo Well, I will add to the mix, the advent of Smart Cities - IoT, OT, SDN, and how to architect trust zones using zero trust principles and applying architectural approaches to protecting both consumers and cities whilst Post Quantum Cryptography marches towards us especially from an Australian Government context. Can NIDS and NIPS scope with the influx of IoT related events and safely determine threats or do we need to apply Blockchain and Quantum technology approaches along with automation and AI to assist threat analyst?
Regards
Caute_Cautim