Research PaperVisit our research →
IoT Security Architecture and Policy for the Enterprise - a Hub Based Approach

Abstract
One of a series of architecture and policy proposal documents, this paper provides a hub based approach to enterprise IoT security. Based on well-known security principles and best practices, the example architecture focuses on three areas of security: network management, connecting devices and lifecycle management.
Authors:
Aimed at a wide audience including CxOs and IoT purchasers, IT departments, developers and OEM product management, the IoT Security Foundation security architecture series intends to:
Reduce/manage complexity of IoT systems by simplifying implementation options
Demonstrate what a good security regime looks like, by example
Explain the benefits of a hub-based approach including achieving security goals, maintaining system hygiene and resilience, managing extensions and life-cycle provisioning
This architecture focuses on IoT devices and solutions implemented and managed by the enterprise. The document first explores what a ‘hub architecture’ is in an enterprise environment, and how this supports the key security principles promoted by the IoT Security Foundation. The paper also includes sections on:
The threat assessment
Hub-based reference architecture
Network management and security
Connecting devices securely
Lifecycle management
Access Publication
Publication Document
IoT-Security-Architecture-and-Policy-for-the-Enterprise-a-Hub-Based-Approach.pdf
Research Details

- Publisher
- IoTSF
- Published
- November 15, 2018
- Last Updated
- August 5, 2022
- Pages
- 37
- Author
- Stacie Hoffmann