IoT Security Architecture and Policy for the Enterprise - a Hub Based Approach - 15 Nov 2018

One of a series of architecture and policy proposal documents, this paper provides a hub based approach to enterprise IoT security. Based on well-known security principles and best practices, the example architecture focuses on three areas of security: network management, connecting devices and lifecycle management.

Aimed at a wide audience including CxOs and IoT purchasers, IT departments, developers and OEM product management, the IoT Security Foundation security architecture series intends to:

  • Reduce/manage complexity of IoT systems by simplifying implementation options
  • Demonstrate what a good security regime looks like, by example
  • Explain the benefits of a hub-based approach including achieving security goals, maintaining system hygiene and resilience, managing extensions and life-cycle provisioning

This architecture focuses on IoT devices and solutions implemented and managed by the enterprise. The document first explores what a ‘hub architecture’ is in an enterprise environment, and how this supports the key security principles promoted by the IoT Security Foundation. The paper also includes sections on:

  • The threat assessment
  • Hub-based reference architecture
  • Network management and security
  • Connecting devices securely
  • Lifecycle management
Download this report

This report is available as a free download from this website.


  • Publisher: IoTSF
  • File Type: PDF
  • Page Count: 37
  • File Size: 1.3 MB