Blog

Review our blog for latest articles, industry news, tips and more.

Read our blog

Newsroom

Latest Press Releases, summary company information and contact information for Press and Media.

Visit our Newsroom

iotsf_security_architecture_policy_home-featured.png

IoT Security Architecture and Policy for the Home - a Hub Based Approach - 15 Nov 2018


One of a series of architecture and policy proposal documents, this paper provides a hub based approach to home IoT security. Based on well-known security principles and best practices, the example architecture focuses on three areas of security: network management, connecting devices and lifecycle management.


This document is not aimed at consumers. However, it is aimed at a wide audience including CxOs and IoT purchasers, IT departments, developers and OEM product management, the IoT Security Foundation security architecture series intends to:

  • Reduce/manage complexity of IoT systems by simplifying implementation options
  • Demonstrate what a good security regime looks like, by example
  • Explain the benefits of a hub-based approach including achieving security goals, maintaining system hygiene and resilience, managing extensions and life-cycle provisioning

This architecture focuses on IoT devices and solutions implemented and managed in the home. The document first explores what a ‘hub architecture’ is in a home environment, and how this supports the key security principles promoted by the IoT Security Foundation. The paper also includes sections on:

  • Security principles and threat assessment
  • Hub-based reference architecture
  • Network management and security
  • Connecting devices securely
  • Lifecycle management
Download this report

This report is available as a free download from this website.


Details

  • Publisher: IoTSF
  • File Type: PDF
  • Page Count: 40
  • File Size: 1.4 MB
Top