Research Paper
Visit our research →

IoT Security Architecture and Policy for the Enterprise - a Hub Based Approach

IoT Security Architecture and Policy for the Enterprise - a Hub Based Approach

Abstract

One of a series of architecture and policy proposal documents, this paper provides a hub based approach to enterprise IoT security. Based on well-known security principles and best practices, the example architecture focuses on three areas of security: network management, connecting devices and lifecycle management.

Aimed at a wide audience including CxOs and IoT purchasers, IT departments, developers and OEM product management, the IoT Security Foundation security architecture series intends to:


Reduce/manage complexity of IoT systems by simplifying implementation options
Demonstrate what a good security regime looks like, by example
Explain the benefits of a hub-based approach including achieving security goals, maintaining system hygiene and resilience, managing extensions and life-cycle provisioning

This architecture focuses on IoT devices and solutions implemented and managed by the enterprise. The document first explores what a ‘hub architecture’ is in an enterprise environment, and how this supports the key security principles promoted by the IoT Security Foundation. The paper also includes sections on:


The threat assessment
Hub-based reference architecture
Network management and security
Connecting devices securely
Lifecycle management

Access Publication

Publication Document

IoT-Security-Architecture-and-Policy-for-the-Enterprise-a-Hub-Based-Approach.pdf


Research Details

IoT Security Architecture and Policy for the Enterprise - a Hub Based Approach
Publisher
IoTSF
Published
November 15, 2018
Last Updated
August 5, 2022
Pages
37
IoT Security Architecture and Policy for the Enterprise - a Hub Based Approach - Research