Security Best Practice Check-list for IoT Application Design

To ensure confidentiality, integrity and availability in IoT systems, a number of security aspects need to be considered, in order to achieve security and privacy by design. In this first blog of a series we give an overview with checklist which you can download.

With IoT forecast to connect billions of everyday home, office or industrial devices, it is hard not to imagine how vast the potential damage could be if a weak security platform (or application) is used for controlling devices and handling exchange of data between them. While IoT promises to improve productivity and help people to do their jobs better and faster, cyber-attacks can potentially wipe out any productivity gains, and, in an extreme case, they can cause unthinkable damage (e.g. hacking of a self-driving car).

Thus, having a secure platform and environment for IoT devices to operate is important, in order to ensure safety of users and prevent unwanted consequences that might occur as a result of a security loophole. In this sense, organizations delivering and using IoT systems must be diligent in their defense of device data and security aspects must be considered and implemented in their early design phase, not as an afterthought.

We made a security best practice check-list for IoT application design, which we describe in a series of white papers. You can download our first white paper by registering here.
In this first white paper we identify the high-level security aspects that need to be considered when designing security- and privacy-aware IoT applications.

In the next instalment in this blog series, we will discuss in detail each security feature and its associated solution. We will also highlight some of the lessons learnt from IoT security failure of both IoT products and services.

Would you like to know more about this topic? Sirris has built up extensive experience and knowhow in IoT security. Contact us!