Blog

Review our blog for latest articles, industry news, tips and more.

Read our blog

Newsroom

Latest Press Releases, summary company information and contact information for Press and Media.

Visit our Newsroom

iotsf_security_architecture_policy_enterprise-featured.png

IoT Security Architecture and Policy for the Enterprise - a Hub Based Approach - 15 Nov 2018


One of a series of architecture and policy proposal documents, this paper provides a hub based approach to enterprise IoT security. Based on well-known security principles and best practices, the example architecture focuses on three areas of security: network management, connecting devices and lifecycle management.


Aimed at a wide audience including CxOs and IoT purchasers, IT departments, developers and OEM product management, the IoT Security Foundation security architecture series intends to:

  • Reduce/manage complexity of IoT systems by simplifying implementation options
  • Demonstrate what a good security regime looks like, by example
  • Explain the benefits of a hub-based approach including achieving security goals, maintaining system hygiene and resilience, managing extensions and life-cycle provisioning

This architecture focuses on IoT devices and solutions implemented and managed by the enterprise. The document first explores what a ‘hub architecture’ is in an enterprise environment, and how this supports the key security principles promoted by the IoT Security Foundation. The paper also includes sections on:

  • The threat assessment
  • Hub-based reference architecture
  • Network management and security
  • Connecting devices securely
  • Lifecycle management
Download this report

This report is available as a free download from this website.


Details

  • Publisher: IoTSF
  • File Type: PDF
  • Page Count: 37
  • File Size: 1.3 MB
Top