ChaptersEventsBlog
How is your enterprise using AI Agents? Help us benchmark security and take the survey before November 30 →

Download Publication

CSA IoT Security Controls Framework v2
CSA IoT Security Controls Framework v2

CSA IoT Security Controls Framework v2

Release Date: 01/28/2021

Working Group: Internet of Things

The IoT Security Controls Framework Version 2 is relevant for enterprise IoT systems that incorporate multiple types of connected devices, cloud services, and networking technologies. The Framework has utility across many IoT domains from systems processing only “low-value” data with limited impact potential, to highly sensitive systems that support critical services. The classification of a system is assigned by the system owner based on the value of the data being stored and processed and the potential impact of various types of physical security threats. 

Updates for Version 2 include...
• Updated Controls - All Controls have been reviewed and updated for technical clarity
• New Domain Structure - Control domains have been reviewed and updated to better categorize each control.
• New Legal Domain - Introduces relevant legal controls
• New Security Testing Domain - Introduces Security testing of architectural allocations.
• Simplified Infrastructure Allocations - Device types have been consolidated to a single type in order to simplify the allocation of controls to architectural components.

The Guide to the IoT Security Controls Framework Version 2 provides instructions for using the companion CSA IoT Security Controls Framework v2. This guide explains how to use the framework to evaluate and implement an IoT system for your organization by providing a column by column description and explanation.

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
IoT Controls Matrix v3
IoT Controls Matrix v3
Guide to the IoT Controls Matrix v3
Guide to the IoT Controls Matrix v3
Cybersecurity Best Practices for the Manufacturing Industry
Cybersecurity Best Practices for the Manufactur...
Machine Identities: Definition, How They Work, and Security Best Practices
Machine Identities: Definition, How They Work, and Security Best Pr...
Published: 09/03/2025
Navigating IT-OT Convergence: A Strategic Imperative for Enterprise Success
Navigating IT-OT Convergence: A Strategic Imperative for Enterprise...
Published: 07/01/2024
Threats to Water: The Achilles’ Heel of Critical Infrastructure
Threats to Water: The Achilles’ Heel of Critical Infrastructure
Published: 04/08/2024
Defining 12 CSA Research Topics
Defining 12 CSA Research Topics
Published: 02/09/2024

Interested in helping develop research with CSA?

Related Certificates & Training