Download Publication
Security Guidance for Early Adopters of the Internet of Things - Chinese Translation
Release Date: 08/03/2017
Working Group: Internet of Things
This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].
This document provides guidance for the secure implementation of Internet of Things (IoT)-based systems. We have provided the guidance in this document to aid implementers of the IoT in deploying and using IoT in a secure manner. Traditional enterprise security solutions do not sufficiently address the security needs of the IoT as the IoT introduces new challenges including increased privacy concerns that are often confusing, platform security limitations that make basic security controls challenging and ubiquitous mobility that makes tracking and asset management a challenge.
This document provides guidance for the secure implementation of Internet of Things (IoT)-based systems. We have provided the guidance in this document to aid implementers of the IoT in deploying and using IoT in a secure manner. Traditional enterprise security solutions do not sufficiently address the security needs of the IoT as the IoT introduces new challenges including increased privacy concerns that are often confusing, platform security limitations that make basic security controls challenging and ubiquitous mobility that makes tracking and asset management a challenge.
Download this Resource
Prefer to access this resource without an account? Download it now.
Are you a research volunteer? Request to have your profile displayed on the website here.
Interested in helping develop research with CSA?
Related Certificates & Training
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn more