Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Let’s talk about IoT device security

IoT

NIST’s Cybersecurity for the Internet of Things (IoT) Program is beginning stakeholder engagement on identifying a core set of cybersecurity capabilities that could be a baseline for IoT devices, and we want to hear from you!

In September 2018, NIST released draft NIST Internal Report (NISTIR) 8228, a publication to help federal agencies manage IoT cybersecurity and privacy risks. Over the course of related stakeholder engagement, comments received during the NISTIR 8228 public comment period, and the Report to the President on Enhancing the Resilience of the Internet and Communications Ecosystem Against Botnets and Other Automated, Distributed Threats, NIST identified a critical gap area in guidance on baselines for IoT device cybersecurity.

We want to hear from you! The NIST Cybersecurity for IoT Program just released a discussion draft introducing our initial thoughts for a core cybersecurity capabilities baseline for IoT devices.

We are interested in feedback on the discussion draft – especially insights into identifying a minimum set of cybersecurity capabilities that could be achieved by almost all IoT devices. Each capability comes from our initial research in draft NISTIR 8228, Appendix A of identifying common themes in existing domestic and international IoT cybersecurity guidance documents. In addition, the utility, verifiability, and feasibility of these capabilities were taken into account. These serve as a starting point for candidates of a core capabilities baseline. This list will be updated based on stakeholder feedback.

NIST welcomes feedback from all stakeholders on preliminary ideas for developing baselines that can be used by IoT device manufacturers, and other interested parties to determine baseline pre-market cybersecurity capabilities for devices.

NIST is particularly interested in stakeholder input on the following questions:

  1. Are these reasonable capabilities for a core baseline?
    1. Is the value to cybersecurity for each capability apparent?
    2. Should we add or remove any capabilities?
  2. Are the capabilities defined with enough specificity to be useful to a manufacturer or other stakeholders?
  3. Is this a reasonable approach to establish high-level objectives/principles/capabilities for devices and allow for communities of interest to identify the appropriate standards or detailed guidance on how best to support those capabilities?
  4. Are the criteria reasonable for identifying baseline capabilities?
  5. Would a taxonomy be helpful or needed to describe classes or types of devices to further parse or frame the baseline capabilities?

While we are particularly interested in stakeholder input on these questions, all feedback will be considered when developing the next iteration of this baseline, which will become part of a broader NIST paper about core cybersecurity capabilities for IoT devices.

You can email us with feedback on the discussion draft, your thoughts on the topic, and collaboration ideas. Get in touch – we can be reached at iotsecurity [at] nist.gov (iotsecurity[at]nist[dot]gov).

Can’t wait to talk about #IoTSecurityNIST with you! Follow us on Twitter via @NISTcyber.

About the author

Katerina Megas

Katerina Megas is Program Manager for the NIST Cybersecurity for Internet of Things (IoT) program. With a Masters in Information Systems, PMP and ScrumMaster certifications, she has over 25 years of experience developing and leading technology and corporate strategies for organizations in both the private and public sectors. She has over 25 years of experience working in a wide range of technology areas ranging from organizations' development and execution of technology strategies to achieving their CMMI certification. She loves traveling and appreciates her wonderful colleagues who cover for her at work while she piles her family into a minivan taking road trips across Europe and the U.S. in search of the non-touristy experience.

Related posts

Comments

Add new comment

CAPTCHA
Image CAPTCHA
Enter the characters shown in the image.
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.
Please be respectful when posting comments. We will post all comments without editing as long as they are appropriate for a public, family friendly website, are on topic and do not contain profanity, personal attacks, misleading or false information/accusations or promote specific commercial products, services or organizations. Comments that violate our comment policy or include links to non-government organizations/web pages will not be posted.