iotsf_security_architecture_policy_home-featured.png

IoT Security Architecture and Policy for the Home - a Hub Based Approach - 15 Nov 2018


One of a series of architecture and policy proposal documents, this paper provides a hub based approach to home IoT security. Based on well-known security principles and best practices, the example architecture focuses on three areas of security: network management, connecting devices and lifecycle management.


This document is not aimed at consumers. However, it is aimed at a wide audience including CxOs and IoT purchasers, IT departments, developers and OEM product management, the IoT Security Foundation security architecture series intends to:

  • Reduce/manage complexity of IoT systems by simplifying implementation options
  • Demonstrate what a good security regime looks like, by example
  • Explain the benefits of a hub-based approach including achieving security goals, maintaining system hygiene and resilience, managing extensions and life-cycle provisioning

This architecture focuses on IoT devices and solutions implemented and managed in the home. The document first explores what a ‘hub architecture’ is in a home environment, and how this supports the key security principles promoted by the IoT Security Foundation. The paper also includes sections on:

  • Security principles and threat assessment
  • Hub-based reference architecture
  • Network management and security
  • Connecting devices securely
  • Lifecycle management
Download this report

This report is available as a free download from this website.


Details

  • Publisher: IoTSF
  • File Type: PDF
  • Page Count: 40
  • File Size: 1.4 MB
Top