Download Publication

Future Proofing the Connected World
Release Date: 10/07/2016
Working Group: Internet of Things
The Internet of Things (IoT) is transforming consumer, business, and industrial practices by creating a world that is perpetually connected to the internet. Thus, IoT has become a significant domain of cloud security. Organizations that manufacture IoT products should endeavor to protect themselves and their customers from all threats that could arise in the future since, we’ve come to find, an IoT system is only as secure as its weakest link.
This document by the IoT Working Group provides actionable and useful guidance for securing the individual products that make up an IoT system. In it, you will find a comprehensive guide to securing IoT devices, including 13 steps to integrate into your development process, and an outline of the top IoT security considerations.
Key Takeaways:
- What the main security issues and challenges are for IoT
- Why you should care about IoT security
- How to provide a business case for IoT security
- Which security options you should use for IoT development platforms
- How to enact secure device design and development processes, including a detailed checklist for security engineers to follow
- Which threats impact specific IoT products
Who It’s For: This document is for any manufacturer of IoT products. Organizations that have begun transforming their existing products into IoT-enabled devices will find it particularly useful. In addition, IoT startups can use this document as a starting point for creating their security strategy.
Download this Resource
Prefer to access this resource without an account? Download it now.
Related Resources
Interested in helping develop research with CSA?
Related Certificates & Training
.png)
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn more
Learn more

.jpeg)
.jpeg)
.jpeg)
.jpeg)