One of a series of architecture and policy proposal documents, this paper provides a hub based approach to enterprise IoT security. Based on well-known security principles and best practices, the example architecture focuses on three areas of security: network management, connecting devices and lifecycle management.
Aimed at a wide audience including CxOs and IoT purchasers, IT departments, developers and OEM product management, the IoT Security Foundation security architecture series intends to:
This architecture focuses on IoT devices and solutions implemented and managed by the enterprise. The document first explores what a ‘hub architecture’ is in an enterprise environment, and how this supports the key security principles promoted by the IoT Security Foundation. The paper also includes sections on:
This report is available as a free download from this website.