IOT Cyber Security Framework PDF
IOT Cyber Security Framework PDF
Framework
TLP: White
TLP: White
The Traffic Light Protocol (TLP) was created in order to facilitate greater sharing of
information. TLP is a set of designations used to ensure that sensitive information is shared
with the appropriate audience. It employs four colors to indicate expected sharing
boundaries to be applied by the recipient(s). The protocol includes four colors (traffic
lights), which are detailed as follows:
October 2022
TLP: White
ABOUT VERSION
3 October 2022
TLP: White
TABLE OF CONTENTS
About Version 3
Table of Contents 4
Introduction 5
Definitions and Acronyms 8
The IoT Security Framework 10
High Level Security Controls 34
Technical Requirements 41
Conformity Assessment 80
List of tables and figures 85
References 88
Appendix-A: Case Study 90
Appendix-B: Disclaimer for Non Critical Infrastructure IoT Applications 100
4 October 2022
TLP: White
INTRODUCTION
OVERVIEW
The Internet of Things (IoT) related products and services have been massively
expanding during the last decade. According to reports, there are billions of IoT
devices installed worldwide and the number is growing every year, meaning
more and more physical devices around the world that are connected to the
internet or other networks. Those IoT solutions are very attractive for cyber-
attacks due to the amount and type of information and control they possess.
It is crucial to protect the IoT devices so people and organizations do not fall
victim to cybercrimes.
As a result of that vast expansion of IoT products and services installed
throughout the world and specifically in Egypt. And to keep on the ARE’s vision
2030, of having multiple smart cities like «the new administrative capital». And
as it is the NTRA’s responsibility to ensure that people and organizations should
benefit from the available IoT smart products and services without the fear
of falling victim to cyber-attacks. It became essential for the NTRA to provide
a set of baseline security guidelines framework for IoT service providing
organizations, to ensure and improve the security of the IoT products and
associated services, as well as the privacy of consumers and organizations,
considering requirements applicable in the Arab Republic of Egypt.
The NTRA (National Telecom Regulatory Authority) is the official authority for
communication sector regulations in the Arab Republic of Egypt (ARE), that
is responsible for providing certifications and approvals for companies and
organizations willing to provide communication related solutions and services.
The NTRA has studied the most effective IoT security and cyber security
standards, guidelines and frameworks in the world that are relevant, applicable
and effective in the ARE.
And decided to provide this IoT security guidelines framework in the ARE,
according to law 10 of year 2003 about telecom regulation. This framework
brings together most effective IoT security guidelines and cyber security
assurance processes, in a sincere attempt to help IoT service providers in
securing their products and services by following a complete set of security
guidelines, activities and processes provided. Which ensures compliance with
the baseline security controls and requirements, and thus mitigating most
known attacks in their IoT products and services. The target is to make consumer
people and organizations benefit from their IoT devices and services securely,
safely and privately.
5 October 2022
TLP: White
OBJECTIVE
TARGET AUDIENCE
DISCLAIMER
This document provides a set of procedures and activities that will be carried
out by the service provider in order to ensure that the IoT solution under
investigation is secured enough for the target application.
6 October 2022
TLP: White
1. They must reach a well understanding of the IoT solution under investigation
and the application and sectors into which the IoT solution is deployed.
2. They must ensure providing realistic and genuine information and evaluations
whenever required during the process.
3. They must ensure honesty and professionalism during the process and while
answering the questionnaire.
DOCUMENT STRUCTURE
7 October 2022
TLP: White
ACRONYMS
9 October 2022
TLP: White
Before digging into the IoT Security Assurance Process, the IoT solution of
interest should be initially classified according to figure1-. This must be initially
performed in order to decide whether the Iot solution of interest must proceed
through the IoT security assurance process aiming to assess its cybersecurity
according to the requirements provided later on, or that it can direct it into
just signing a disclaimer for non critical infrastructure applications, which is
provided in appendix-B.
10 October 2022
TLP: White
11 October 2022
TLP: White
12 October 2022
IOT SECURITY ASSURANCE PROCESS
14
After that, the entity is required to determine the high-level security
requirements relevant and applicable for the use cases of concern.
Figure-4 explains this activity, where the responsible entity shall use
the generated risk register to determine the precise impact for
each security objective in the CIA-Triad, then consequently
determine the corresponding security class for each; that class is
used to relate to the applicable security requirements. Finally, a
conformity assessment activity is conducted as described in figure-
5; it involves an assessment questionnaire that shall be answered by
the entity. Entity should consider answering all questions applicable
to the security class determined in the previous step. It should
provide reasons and evidence for their answers wherever possible.
The resulting checklist clearly determines whether the IoT solution of
concern complies with the presented security baseline or not.
15
Figure-3: Risk Assessment Procedure
16
Figure-4: Defining Applicable High Level Security Controls
Procedure
17
Figure-5: Conformity Assessment Procedure
18
RISK ASSESSMENT
19
which risks are applicable but could be skipped; this is done in a
prioritized manner having high risk threats on top of the
organization’s focus going down to the least risky ones. By carrying
out this activity, organizations can examine their assets considering
the attacker’s perspective.
Risk assessment is a general concept that is commonly found in
cyber security as well as the business field. Many techniques have
been provided to conduct a risk assessment including some well-
known risk management standards, e.g., the National Institute of
Standards & Technology (NIST) "guide for conducting risk
assessments" (NIST standard SP 800-30r1), it is recommended to
revise the NIST standard SP 800-30r1 for better understanding. The
risk assessment process provided in this document follows main
steps presented by the NIST standard SP 800-30r1, which is one of
the most reliable related standards.
As explained in figure-3, each step depends on the outcome of its
previous step, so each one must be conducted in the described
sequence. Starting by identifying the use cases of interest, then
defining the applicable attack surface areas, vulnerabilities and
their impact. Followed by performing a risk analysis and evaluation
of the considered threats and vulnerabilities. After that, a risk
register of the resulting risk factors and scores is formulated and
documented. And finally, the risk analysis output document is
reviewed for reaching a decision. These steps may be repeated if
required, e.g., if the review step found that output is not clear or not
enough to conduct a decision.
20
The outcome of this step is a list of detailed use cases of interest and
it is the base for the following steps; in which attack surface areas,
vulnerabilities and their impact that are relevant to each defined
use case are carefully identified. An example is provided in the
case study at Appendix-B.
Attack
Vulnerabilities Possible Impact
Surface
■ Inject false reading.
■ Sensing Environment ■ Steal the device.
1. Hardware Manipulation. ■ Update the firmware
(Sensors) ■ Tampering (Physically). with malicious code
■ Damage (Physically). and take control of the
device.
21
Attack
Vulnerabilities Possible Impact
Surface
■ Sensitive data exposure ■ Access the secret keys,
(backdoor accounts, user credentials and
hardcoded credentials, organization
encryption keys, sensitive credentials.
information). ■ Unauthorized access to
■ Firmware version display the IoT system.
2. Device
and/or last update date. ■ Gain sensitive
Firmware
■ Vulnerable services (web, ssh, information about the
tftp, etc.). firmware.
■ Security related function API ■ Get sensitive URLs.
exposure. ■ Create backdoor
■ Firmware downgrade accounts through the
possibility. firmware.
■ Access security keys.
■ Unauthorized access
through stolen
credentials.
■ Sensitive data
■ Access data gathered
3. Device (Cleartext usernames,
by device’s sensors.
Memory cleartext passwords,
■ Ability to decrypt
encryption keys).
sensitive information
and communication
using stolen encryption
keys.
■ Get device ID.
■ Privilege escalation.
■ Firmware extraction.
■ Device malfunction.
■ User CLI.
■ Gain shell access to the
■ Admin CLI.
OS using physical
■ Privilege escalation.
interfaces.
4. Device ■ Reset to an insecure state.
■ Modifying the source
Physical ■ Removal of storage media.
code control flow graph
Interfaces ■ Tamper resistance.
to do malicious
■ Debug port (UART (Serial),
activities.
JTAG / SWD).
■ Attacker gains full
■ Device ID/Serial number
control over the device
exposure.
through a hacked
admin CLI.
22
Attack
Vulnerabilities Possible Impact
Surface
■ Exploit the web
interface of the
■ Standard set of web device/cloud.
application vulnerabilities ■ Discover security keys
(check OWASP Web Top 10, and credentials.
OWASP ASVS, OWASP Testing ■ Grant unauthorized
guide). access to the IoT system.
■ Credential management ■ Access data
5.
vulnerabilities transmitted.
Device/Clou
(Username enumeration, ■ Misuse of insecure
d Web
Weak passwords, Account password recovery
Interface
lockout, Known default mechanisms.
credentials, Insecure ■ Unauthorized access to
password recovery the system through cross
mechanism. site scripting.
■ Transport encryption. ■ Malicious code
■ Two-factor authentication. execution on the web
interface through XSS
exploit.
23
Attack
Vulnerabilities Possible Impact
Surface
■ Poorly implemented ■ Block legitimate Over-
encryption the-air (OTA) firmware
■ Test/Development Services update.
■ Buffer Overflow ■ Analyze network traffic.
■ UPnP ■ Privacy breach.
■ Vulnerable UDP Services ■ Integrity breach.
■ DoS ■ Access network security
■ Device Firmware OTA update keys and decrypt the
block communications.
■ Firmware loaded over ■ Grant unauthorized
insecure channel (no TLS) access to the IoT system.
■ Replay attack
■ Lack of payload verification
■ Lack of message integrity
check
■ Credential management
vulnerabilities (Username
enumeration, Weak
passwords, Account lockout,
Known default credentials,
Insecure password recovery
mechanism).
■ LAN ■ Prevent the transmission
■ LAN to Internet of legitimate data.
■ Short range ■ Get sensitive data and
7. Network
■ Non-standard information.
Traffic
■ Wireless (WiFi, Z-wave, XBee, ■ Analyze network traffic.
Zigbee, Bluetooth, LoRA) ■ Privacy breach.
■ Protocol fuzzing ■ Integrity breach.
■ Get a copy of the
■ Update sent without
firmware.
encryption
■ Inject a rogue firmware
■ Updates not signed
update to the device
8. Update ■ Update location writable
resulting in getting
Mechanism ■ Update verification
access to sensitive
■ Update authentication
information and modify
■ Malicious update
the code control flow
■ Missing update mechanism
graph.
24
Attack
Vulnerabilities Possible Impact
Surface
■ No manual update
mechanism
25
Attack
Vulnerabilities Possible Impact
Surface
■ Authentication/Authorization
related values (session key,
token, cookie, etc.)
disclosure
■ Gain unauthorized
■ Reusing of session key, token,
access to the system.
etc.
■ Take control of the
■ Device to device
system
11. authentication
■ Change system
Authenticatio ■ Device to mobile Application
parameters and
n/ authentication
configuration.
Authorization ■ Device to cloud system
■ Inject malicious data.
authentication
■ Unauthorized access to
■ Mobile application to cloud
the system using a legit
system authentication
account.
■ Web application to cloud
system authentication
■ Lack of dynamic
authentication
■ Unencrypted data. ■ Discover secret
■ Data encrypted with credentials.
12. Local discovered keys. ■ Access sensitive
Data Storage ■ Lack of data integrity checks. information.
■ Use of static same enc/dec ■ Modify pre-stored
key. information.
■ Inherent trust of cloud or ■ Inject false data.
mobile application ■ Spy on sensitive data.
13. Vendor
■ Weak authentication ■ Rogue devices can
Backend
■ Weak access controls authenticate to the APIs
APIs
■ Injection attacks leading to taking down
■ Hidden services the whole service.
■ Inject false data.
■ Spy on sensitive data.
■ Unencrypted PII sent
14. Third- ■ Vulnerabilities in
■ Encrypted PII sent
party backend APIs may lead
■ Device information leaked
Backend APIs to privilege escalation,
■ Location leaked
unauthorized access,
and information leaks.
26
Attack
Vulnerabilities Possible Impact
Surface
■ User data disclosure ■ Access user’s personal
■ User/device location information.
15. Privacy
disclosure ■ User and organization
■ Differential privacy privacy breaches.
■ Interoperability standards.
■ Data governance.
■ Individual stakeholder risks.
■ Implicit trust between ■ Compromise of the
16. components. device or its related
Ecosystem ■ Enrollment security. components.
and ■ Decommissioning system. ■ System wide failure.
Communicati ■ Lost access procedures. ■ Manipulate exchanged
on ■ Health checks commands and
■ Heartbeats messages.
■ Ecosystem commands
■ Deprovisioning
■ Pushing updates
Table-2: IoT attack surfaces, related vulnerabilities and its impact
27
Risk analysis is highly subjective, that weights of probability levels
and of impact level should be determined by the organization.
Thus, the organization is required to formulate their own version of
the risk assessment matrix that is a combination of both likelihood
and impact levels, which shows the level of risk at each possible
combination. To evaluate threats of interest, the organization is
required to assess likelihood (probability) and impact (cost) levels
for each, based on their understanding of the use cases and its
characteristics.
28
The risk assessment matrix is a combination of both likelihood
(probability) and impact (severity) of a vulnerability (or a threat). It
is a simple and effective method for organizations to assess the risks
of concern by defining its risk level, considering estimated likelihood
level of the events occurring and impact level that would result
from those events. In quantitative methods, risk levels are
commonly calculated as the product of the likelihood and impact
levels. However, in qualitative methods, it is evaluated by mapping
determined likelihood and impact levels to get the corresponding
risk level, e.g., a threat of Low likelihood and moderate impact has
an assessed risk level of moderate. The calculated level of risk
represents the degree to which the organization is threatened by
such events.
Table-3 presents an example of a classic 5x5 risk assessment matrix
between risk’s likelihood and impact (consequences/severity)
levels. Table-4 describes the risk score range for each risk level
rating. Tables 3 and 4 follow concepts provided by the NIST
standard SP 800-30r1 of the assessment scale tables (Appendix I,
table I-2) and (Appendix I, table I-3) respectively. Table-3 represents
risk levels in a qualitative manner, which could be converted into
quantitative by mapping respective score ranges provided in
table-4. This is a starting point that should be tailored and adjusted
by the organization for its specific conditions.
Impact Level
Moderat Very
Very Low Low High
e High
Multiple
Negligibl Limited Serious Severe
severe
e effect effect effect effect
effects
Very Almost Moderat Very
Very Low Low High
High certain e High
Moderat Very
High Highly likely Very Low Low High
e High
Li
k
29
Highly
Very Low Very Low Very Low Very Low Low Low
unlikely
Table-4: Risk levels and scores for risk assessment matrix described
in table-3
Another direct quantitative method for evaluating risk scores, is to
multiply the calculated likelihood (probability) value by the
calculated impact (cost) value directly. This will produce the risk
score as a quantitative value, which could be mapped into its
corresponding risk level using ranges defined in table-4.
After finishing the risk analysis step and providing risk factors and
scores of each threat, the organization’s team is required to well
document the results for review and decision making. The risk
register is an appropriate and organized way for documenting
these results. The organization should create a risk register
document based on the outcomes evaluated in the former step.
This risk register document should include all applicable threats with
their associated risk factor scores. In which threat events of concern
are ordered descending by the level of risk determined earlier, with
30
the highest attention going to high-risk events. Risks of the same risk
level can be further prioritized by experience or based on their
quantitative risk factor scores. Thus, the risk with the highest risk score
should be at the top of the table going down to that of the least
score at the bottom. The reason for this prioritization criteria is to
guide and justify the word needed for the IoT solution’s security. This
work shall mainly focus on reducing the risk likelihood (probability)
factor to an acceptable level.
Risks with higher risk factors could highly compromise the IoT
solution, and must be highly and strictly considered for treatment
and mitigation; the organization should assign as many resources
as possible to decrease their risk factors. However, risks with lower
priority, having lower risk factors, can be postponed or even
neglected if their risk factor scores are not significant at all.
An example of a simplified risk register is presented in table-5,
however, the risk register document could have more columns with
extra information for each considered threat. This is the base for
determining the relevant security requirement, as will be explained
in later sections.
Risk
Impa Likelihoo Risk
Threat Description Level
ct d Factor
[Output]
An attacker could initiate an
unauthorized access attack to
Unauthoriz Very Very Very
access the IoT system for 97
ed access High High High
monitoring or pushing
information.
An attacker attacks the system
Denial of
to prevent devices from Very
service High 88 High
accessing the system’s High
attack
network.
An attacker dumps the
Firmware firmware from the IoT device Moderat Moderat
High 50
extraction chipset, to extract useful e e
information.
31
Table-5: Example of a simplified risk register
The last, but not least, step of the risk assessment activity is to review
the output risk register document and the whole process output.
The final risk register is used by the following activity; it is the base to
determine the proper impact for each security objective
according to the CIA-Triad for the IoT solution under investigation,
that is consequently used to determine the corresponding security
class for the whole solution. The determined security class is the key
to determine the relevant security requirements, as described
through the next activity.
32
- It is the responsibility of the service provider to follow all steps
of the risk assessment activity and provide appropriate and
exact information as required, and to review and provide the
final risk register document.
- If requested by the service provider, the NTRA security staff is
responsible for auditing the activity output for approval or
rejection, with the aim of providing consultation concerning
the risk assessment procedure.
33
HIGH LEVEL SECURITY CONTROLS
OVERVIEW
34
Figure-7: Defining applicable high level security controls procedure
Following are definitions for the security objectives of the CIA triad:
● Confidentiality:
- Preserving authorized restrictions on information access and
disclosure, including means for protecting personal privacy
and proprietary information.
- Unauthorized access or unauthorized information disclosure is
considered a violation.
● Integrity:
- Guarding against improper information modification or
destruction, and includes ensuring information non-
repudiation and authenticity.
- Unauthorized modifications and manipulations are
considered a violation.
● Availability:
- Ensuring timely and reliable access to and use of information.
- Disrupting or denying access to the system or the information
is considered a violation.
35
Based on these definitions, the impact levels are specified in Table-
6 as defined in FIPS 199 (FIPS: Federal Information Processing
Standards), Standards for Security Categorization of Federal
Information and Information Systems. These impact levels are used
later to determine the required security controls.
36
The disruption of The disruption of The disruption of
access to or use of access to or use access to or use of
information or an of information or an
information information or an information system
system information could be expected
could be system to
expected to could be have a severe or
Availabilit
have a limited expected to catastrophic
y
adverse have a serious adverse
effect on adverse effect on effect on
organizational organizational organizational
operations, operations, operations,
organizational organizational organizational
assets, assets, assets,
or individuals. or individuals. or individuals.
Table-6: CIA Triad impact levels explained
Class Description
Where compromise to the data generated or loss of control
Class 0 is likely to result in little discernible impact on an individual or
organization.
Where compromise to the data generated or loss of control
Class 1 is likely to result in no more than limited impact on an
individual or organization.
In addition to class 1, the device is designed to resist attacks
on availability that would have significant impact on an
Class 2 individual or organization or impact many individuals. For
example, by limiting operations of an infrastructure to which
it is connected.
In addition to class 2, the device is designed to protect
Class 3 sensitive data including Personally identifiable information
(PII).
In addition to class 3, where compromise to the data
Class 4 generated or loss of control have the potential to affect
critical infrastructure or cause personal injury.
37
Table-7: Security requirement classes for the IoT Cybersecurity
framework
40
TECHNICAL REQUIREMENTS
Req. Securit
Security Requirements
No y Class
Manda
HP- The product’s processor system has an irrevocable tory for
01 hardware Secure Boot process. all
classes
Manda
tory for
HP- The product’s processor system has an irrevocable
Class 2
02 “Trusted Root Hardware Secure Boot”
and
above
The product’s processor boot process provides an
Manda
appropriate level of trustworthiness by using a
tory for
HP- hardware root of trust to verify trusted boot or
Class 3
03 measured boot methods. This may be referred to as
and
'secure boot', but absolute security cannot be
above
assured.
Manda
HP- tory for
The Secure Boot process is enabled by default.
04 all
classes
41
Req. Securit
Security Requirements
No y Class
Any debug interface only communicates with Manda
authorized and authenticated entities on the tory for
HP-
production devices. Class 1
05
The functionality of any interface should be and
minimized to its essential task(s). above
Manda
The hardware incorporates protection against
tory for
HP- tampering and this has been enabled. The level of
Class 1
06 tamper protection must be determined by the risk
and
assessment.
above
Manda
The hardware incorporates physical, electrical and
tory for
HP- logical protection against tampering to reduce the
Class 2
07 attack surface. The level of protection must be
and
determined by the risk assessment.
above
Manda
The hardware incorporates physical, electrical &
tory for
HP- logical protection against reverse engineering. The
Class 3
08 level of protection must be determined by the risk
and
assessment.
above
Manda
All communications port(s) which are not used as
tory for
HP- part of the product’s normal operation are not
Class 1
09 physically accessible or only communicate with
and
authorized and authenticated entities.
above
Manda
All the product’s development test points are tory for
HP-
securely disabled or removed wherever possible in Class 2
10
production devices. and
above
Manda
Tamper Evident measures have been used to tory for
HP-
identify any interference to the assembly to the end Class 2
11
user. and
above
In production devices the microcontroller/ Manda
HP-
microprocessor(s) shall not allow the firmware to be tory for
12
read out of the products non-volatile [FLASH] Class 1
42
Req. Securit
Security Requirements
No y Class
memory. Where a separate non-volatile memory and
device is used the contents shall be encrypted. above
Where the product's credential/key storage is Manda
external to its processor, the storage and processor tory for
HP-
shall be cryptographically paired to prevent the Class 1
13
credential/key storage being used by unauthorized and
software. above
Manda
Where a production device has a CPU watchdog,
tory for
HP- it is enabled and will reset the device in the event
Class 1
14 of any unauthorized attempts to pause or suspend
and
the CPU’s execution.
above
Where the product has a hardware source for Manda
generating true random numbers, it is used for all tory for
HP-
relevant cryptographic operations including Class 1
15
nonce, initialization vector and key generation and
algorithms. above
Manda
tory for
HP- The product shall have a hardware source for
Class 2
16 generating true random numbers.
and
above
Manda
The product should have hardware mechanisms to tory for
HP-
control access to memory to reduce the risk of Class 3
17
running malicious code. and
above
DEVICE IDENTIFICATION AND AUTHENTICATION:
1. devices and/or types of devices to be Manda
HP- uniquely identified and authenticated before tory for
18 establishing a connection are defined; all
2. device ability to support unique device classes
identifier
Manda
Actions Based on Device Identity:
HP- tory for
1. Ability to configure IoT device access control
19 all
policies using IoT device identity.
classes
43
Req. Securit
Security Requirements
No y Class
2. Ability to hide IoT device identity from non-
authorized entities.
3. Ability for the IoT device to differentiate
between authorized and unauthorized
remote users.
4. Ability for the IoT device to differentiate
between authorized and unauthorized
physical device users (e.g., using a method of
authentication to verify the identity of
physical device users).
5. Ability to monitor specific actions based on
the IoT device identity.
6. Ability to identify software loaded on the IoT
device based on IoT device identity.
7. Ability for the device identifier to be used to
discover the IoT device for the purpose of
network asset identification and
management
Physical Identifiers: Manda
HP- 1. Ability to add a unique physical identifier at tory for
20 an external or internal location on the device all
authorized entities can access. classes
DEVICE CONFIGURATION: Manda
HP- 1. The capability to configure the IoT device tory for
21 through logical and/or physical interfaces to all
meet organizational requirements. classes
Table-10: Device hardware and physical security Policies, and
controls
DEVICE SOFTWARE
44
access, software reversion, sensitive information, inputs and
outputs, device boot, configuration, maintenance and storage.
Req. Securit
Security Requirements
No y Class
The product has measures to prevent unauthorized and
Manda
unauthenticated software, configurations and files being
DS- tory for
loaded onto it. If the product is intended to allow
01 all
unauthenticated software, such software should only be
classes
run with limited permissions and/or sandbox.
Where remote software updates can be supported by
Manda
the device, the software images must be digitally signed
DS- tory for
by an appropriate signing authority - e.g.,
02 all
manufacturer/supplier or public. The Signing Authority
classes
should be clearly identified.
Where updates are supported, the software update Manda
DS- package has its digital signature, signing certificate and tory for
03 signing certificate chain verified by the device before the all
update process begins. classes
Manda
If remote software upgrade is supported by a device, tory for
DS-
software images shall be encrypted or transferred over Class 2
04
an encrypted channel. and
above
If the product has any virtual port(s) that are not required
for normal operation, they are only allowed to
communicate with authorized and authenticated Manda
entities or are securely disabled when shipped. When a tory for
DS-
port is initialized or used for field diagnostics, the port Class 2
05
input commands are deactivated and the output and
provides no information which could compromise the above
device, such as credentials, memory address or function
names.
45
Req. Securit
Security Requirements
No y Class
Manda
To prevent the stalling or disruption of the device’s tory for
DS-
software operation, watchdog timers are present, and Class 1
06
cannot be disabled. and
above
Manda
tory for
DS- The product’s software signing root of trust is stored in
Class 1
07 tamper-resistant memory.
and
above
Manda
The product has protection against unauthorized
tory for
DS- reversion of the software to an earlier and potentially less
Class 2
08 secure version. Only authorized entities can restore the
and
software to an earlier secure version.
above
Manda
There are measures to prevent the installation of non- tory for
DS-
production (e.g., development or debug) software onto Class 1
09
production devices. and
above
Manda
Production software images shall be compiled in such a
tory for
DS- way that all unnecessary debug and symbolic
Class 1
10 information is removed, to prevent accidental release of
and
superfluous data.
above
Manda
Development software versions have any debug
tory for
DS- functionality switched off if the software is operated on
Class 2
11 the product outside of the product vendor’s trusted
and
environment.
above
Manda
Steps have been taken to protect the product's software tory for
DS-
from sensitive information leakage, including at network Class 3
12
interfaces during initialization, and side-channel attacks. and
above
Manda
DS- The product’s software source code follows the basic
tory for
13 good practice of a language subset coding standard.
Class 2
46
Req. Securit
Security Requirements
No y Class
and
above
Manda
The product’s software source code follows the basic tory for
DS-
good practice of static vulnerability analysis by the Class 2
14
developer. and
above
The software must be architected to identify and ring
fence sensitive software components, including
Manda
cryptographic processes, to aid inspection, review and
tory for
DS- test. The access from other software components must
Class 1
15 be controlled and restricted to known and acceptable
and
operations. For example, security related processes
above
should be executed at higher privilege levels in the
application processor hardware.
Manda
tory for
DS- Software source code is developed, tested and
Class 1
16 maintained following defined repeatable processes.
and
above
Manda
The build environment and toolchain used to compile the tory for
DS-
application is run on a build system with controlled and Class 2
17
auditable access. and
above
Manda
The build environment and toolchain used to create the tory for
DS-
software is under configuration management and Class 2
18
version control, and its integrity is validated regularly. and
above
Manda
DS- Where present, production software signing keys are tory for
19 under access control. all
classes
The production software signing keys are stored and Manda
DS-
secured in a storage device compliant to FIPS-140-2/FIPS- tory for
20
140-3 level 2, or equivalent or higher standard. Class 1
47
Req. Securit
Security Requirements
No y Class
and
above
Manda
Where the device software communicates with a
tory for
DS- product related web server or application over TCP/IP or
Class 2
21 UDP/IP, the device software uses certificate pinning or
and
public/private key equivalent, where appropriate.
above
For a device with no possibility of a software update, the
Manda
conditions for and period of replacement support should
DS- tory for
be clear. A replacement strategy must be
22 all
communicated to the user, including a schedule for
classes
when the device should be replaced or isolated.
Manda
All inputs and outputs are checked for validity e.g., use
tory for
DS- “Fuzzing” tests to check for acceptable responses or
Class 2
23 output for both expected (valid) and unexpected
and
(invalid) input stimuli.
above
The software has been designed to meet the safety
Manda
requirements identified in the risk assessment; for
tory for
DS- example, in the case of unexpected invalid inputs, or
Class 2
24 erroneous software operation, the product does not
and
become dangerous, or compromise security of other
above
connected systems.
Support for partially installing updates is provided for Advisor
DS-
devices whose on-time is insufficient for the complete y for all
25
installation of a whole update (constrained devices). classes
Advisor
DS- Support for partially downloading updates is provided for
y for all
26 devices whose network access is limited or sporadic.
classes
Where real-time expectations of performance are
present, update mechanisms must not interfere with Manda
DS- meeting these expectations (e.g., by running update tory for
27 processes at low priority, or notifying the user of the all
priority and duration of the update and with the option classes
of postponing or disabling the update).
Where a device doesn’t support secure boot, upon a
DS- Manda
firmware update the user data and credentials should be
28 tory for
re-initialized.
48
Req. Securit
Security Requirements
No y Class
all
classes
Where a device cannot verify authenticity of updates Manda
DS- itself (e.g., due to no cryptographic capabilities), only a tory for
29 local update by a physically present user is permitted all
and is their responsibility. classes
An update to a device must be authenticated before it
Manda
is installed. Where the update fails authentication, the
DS- tory for
device should, if possible, revert to the last known good
30 all
(current stable) configuration/software image which was
classes
stored on the device.
Manda
There is secure provisioning of cryptographic keys for tory for
DS-
updates during manufacture in accordance with Class 1
31
industry standards. and
above
Memory locations used to store sensitive material (e.g.,
Manda
cryptographic keys, passwords/passphrases, etc.) are
tory for
DS- sanitized as soon as possible after they are no longer
Class 2
32 needed. These can include but are not limited to
and
locations on the heap, the stack, and statically-allocated
above
storage.
Manda
Any caches which potentially store sensitive material are tory for
DS-
cleared flushed after memory locations containing Class 3
33
sensitive material have been sanitized. and
above
An end-of-life policy shall be published which explicitly
states the minimum length of time for which a device will
receive software updates and the reasons for the length
of the support period. The need for each update should
Manda
be made clear to users and an update should be easy to
DS- tory for
implement. At the end of the support period, the device
34 all
should reduce the risk of a latent vulnerability being
classes
exploited. This could be by indicating an error condition
to the user or curtailing functionality. This action should be
clearly communicated to the user during the
procurement stage.
49
Req. Securit
Security Requirements
No y Class
Updates should be provided for a period appropriate to
the device, and this period shall be made clear to a user Manda
DS- when supplying the device. Updates should, where tory for
35 possible, be configurable to be automatically or all
manually installed. The supply chain partners should classes
inform the user that an update is required.
The device manufacturer should ensure that shared
libraries (e.g., Clib or Crypto libraries) that deliver network
and security functionalities have been reviewed or Manda
evaluated (note that the actual review or evaluation tory for
DS-
does not have to be conducted by the manufacturer if Class 2
36
it has been conducted by another reputable and
organization or government entity). Cryptography above
libraries should be re-reviewed for known security
vulnerabilities on each update of the device.
Manda
tory for
DS- Maintenance changes should trigger full security
Class 2
37 regression testing.
and
above
Manda
tory for
DS- IoT devices must allow software updates to maintain
Class 2
38 security over the product lifetime.
and
above
Manda
Hard-coded critical/ security parameters in device
DS- tory for
software source code shall not be used; if needed these
39 all
should be injected in a separate (secure) process.
classes
Where the device is capable, it should check after Manda
initialization, and then periodically, whether security tory for
DS-
updates are available, either autonomously or as part of Class 1
40
the support service. Otherwise, the support service should and
push updates to the device. above
Manda
BASELINE CONFIGURATION:
DS- tory for
1. automated mechanisms for maintaining baseline
41 all
configuration of the system are defined;
classes
50
Req. Securit
Security Requirements
No y Class
2. software programs not authorized to execute on
the system are defined;
3. frequency at which to review and update the list of
unauthorized software programs is defined;
MAINTENANCE TOOLS: Manda
DS- 1. maintenance tools are inspected to ensure that tory for
42 the latest software updates and patches are all
installed. classes
DEVELOPER CONFIGURATION MANAGEMENT: Manda
DS- 1. the developer of the system, system component, or tory for
43 system service is required to enable integrity all
verification of software and firmware components. classes
Secure Storage:
1. Ability to support encryption of data at rest
2. Ability to cryptographically store passwords at rest,
as well as device identity and other authentication
data
3. Ability to support data encryption and signing to
prevent data from being altered in device storage. Manda
4. Ability to secure data in device storage. tory for
DS-
5. Ability to secure data stored locally on the device. Class 1
44
6. Ability to secure data stored in remote storage areas and
(e.g., cloud, server, etc.). above
7. Ability to utilize separate storage partitions for
system and user data.
8. Ability to securely back-up the data on the IoT
device.
9. Ability to “sanitize” or “purge” specific or all data in
the device.
Table-11: Device software Policies, and controls
51
kernel, execution, resource usage, device integrity and device
operations.
Req. Security
Security Requirements
No Class
Mandat
ory for
DO- The OS is implemented with relevant security updates prior
Class 2
01 to release.
and
above
Mandat
All unnecessary accounts or logins have been disabled or
ory for
DO- eliminated from the software at the end of the software
Class 1
02 development process, e.g., development or debug
and
accounts and tools.
above
Mandat
ory for
DO- Files, directories and persistent data are set to minimum
Class 1
03 access privileges required to correctly function.
and
above
Security parameters and passwords should not be hard-
Mandat
coded into source code or stored in a local file. If
ory for
DO- passwords absolutely must be stored in a local file, then the
Class 1
04 password file(s) are owned by, and are only accessible to
and
and writable by, the Device's OS most privileged account
above
and are obfuscated.
Mandat
ory for
DO- All OS non-essential services have been removed from the
Class 1
05 product’s software, image or file systems.
and
above
DO- All OS command line access to the most privileged Mandat
06 accounts has been removed from the OS ory for
52
Req. Security
Security Requirements
No Class
Class 1
and
above
All of the product’s OS kernel and services or functions are Mandat
disabled by default unless specifically required. Essential ory for
DO-
kernel, services or functions are prevented from being Class 1
07
called by unauthorized external product level interfaces and
and applications. above
Mandat
All software is operated at the least privilege level possible ory for
DO-
and only has access to the resources needed as controlled Class 1
08
through appropriate access control mechanisms. and
above
Mandat
ory for
DO- All the applicable security features supported by the OS
Class 1
09 are enabled.
and
above
Mandat
ory for
DO- The OS is separated from the application(s) and is only
Class 1
10 accessible via defined secure interfaces.
and
above
Mandat
ory for
DO- The OS implements a separation architecture to separate
Class 2
11 trusted from untrusted applications.
and
above
The product’s OS kernel is designed such that each Mandat
component runs with the least security privilege required ory for
DO-
(e.g. a microkernel architecture), and the minimum Class 2
12
functionality needed. (2.4.6.6/8 requires non-essential and
components to be disabled or removed). above.
The Product OS should be reviewed for known security Mandat
vulnerabilities particularly in the field of cryptography prior ory for
DO-
to each update and after release. Cryptographic Class 1
13
algorithms, primitives, libraries and protocols should be and
updateable to address any vulnerabilities. above
53
Req. Security
Security Requirements
No Class
Mandat
ory for
DO- The user interface is protected by an automatic session idle
Class 1
14 logout timeout function.
and
above
Secure Execution:
1. Ability to enforce organizationally-defined execution
policies.
2. Ability to execute code in confined virtual Mandat
environments. ory for
DO-
3. Ability to separate IoT device processes into Class 2
15
separate execution domains. and
4. Ability to separate the levels of IoT device user above
functionality.
5. Ability to authorize various levels of IoT device
functionality.
Secure Resource Usage:
1. Ability to support shared system resources.
2. Ability to release resources back to the system.
3. Ability to separate user and process resources.
4. Ability to manage memory address space assigned
to processes.
5. Ability to enforce access to memory space through
the kernel.
Mandat
6. Ability to prevent a process from accessing memory
ory for
DO- space of another process.
Class 1
16 7. Ability to enforce configured disk quotas.
and
8. Ability to continue operation when associated
above
networks are unavailable (e.g., a smart smoke
detector must still go off when a fire occurs even if it
is not attached to the associated network).
9. Ability to provide sufficient resources to store and run
the operating environment (e.g., operating systems,
firmware, applications).
10. Ability to utilize file compression technologies (e.g., to
provide denial of service protection).
54
Req. Security
Security Requirements
No Class
11.Ability to use or enforce hardware-based, write
protection to protect certain software (e.g.,
firmware).
Device Integrity:
1. Ability to perform security compliance checks on
system components (e.g., verify acceptable baseline
configuration, perform a tamper check).
2. Ability to detect unauthorized hardware and
software components and other tampering with the
Mandat
IoT device when used.
ory for
DO- 3. Ability to detect tampering throughout the system
Class 2
17 development life cycle.
and
4. Ability to take organizationally-defined actions when
above
unauthorized hardware and software components
are detected (e.g., disallow a flash drive to be
connected even if a USB port is present).
5. Ability to store the operating environment (e.g.,
firmware image, software, applications) in read-only
media (e.g., Read Only Memory).
Secure Device Operation:
1. Ability to keep an accurate internal system time.
2. Ability to compare and synchronize internal system
time with an organizationally defined authoritative
source.
3. Ability to define various operational states.
Mandat
4. Ability to support various modes of IoT device
ory for
DO- operation with more restrictive operational states.
Class 2
18 5. Ability to define differing failure types.
and
6. Ability to fail in a secure state.
above
7. Ability to disable operations and/or functionality in the
event of security violations.
8. Ability to restrict components/features of the IoT
device (e.g., ports, functions, protocols, services, etc.)
in accordance with organizationally-defined policies.
55
DEVICE WIRED AND WIRELESS INTERFACES
Req. Security
Security Requirements
No Class
Mandat
ory for
DW- The product prevents unauthorized connections to it or
Class 1
01 other devices the product is connected to.
and
above
Mandat
The network component and firewall (if applicable) ory for
DW-
configuration has been reviewed and documented for Class 1
02
the required/defined secure behavior. and
above
Mandat
To prevent bridging of security domains within products ory for
DW-
with network interfaces, forwarding functions should be Class 1
03
blocked by default. and
above
Mandat
Devices support only the versions of application layer ory for
DW-
protocols that have been reviewed and evaluated Class 1
04
against publicly known vulnerabilities. and
above
56
Req. Security
Security Requirements
No Class
If a potential unauthorized change is detected (e.g.: an
access fails authentication or integrity checks), the Mandat
device should alert the user/administrator to the issue ory for
DW-
and should not connect to wider networks than those Class 1
05
necessary to perform the alerting function. Failed and
attempts should be logged, but without providing any above
information about the failure to the initiator.
Mandat
ory for
DW- All the product's unused ports (or interfaces) are closed
Class 1
06 and only the necessary ones are active.
and
above
Mandat
If a connection requires a password or passcode or
DW- ory for
passkey for connection authentication, the factory issued
07 all
or reset password is unique to each device.
classes
Mandat
Where using the initial pairing process, a Strong
ory for
DW- Authentication shall be used, requiring physical
Class 1
08 interaction with the device or possession of a shared
and
secret.
above
Mandat
Where a wireless interface has an initial pairing process,
DW- ory for
the passkeys are changed from the factory issued, or
09 all
reset password prior to providing normal service.
classes
For any Wi-Fi connection, WPA-2 AES or a similar strength Mandat
encryption has been used. Migration to the latest ory for
DW-
standard should be planned. (e.g., WPA3) Older insecure Class 1
10
protocols such as WEP, WPA/WPA2 (Auto), WPA-TKIP and and
WPA-2 TKIP/AES (Mixed Mode) are disabled. above
Mandat
Where WPA-2 WPS is used it has a unique, random key ory for
DW-
per device and enforces exponentially increasing retry Class 1
11
attempt delays. and
above
Mandat
DW- All network communications keys are stored securely, in
ory for
12 accordance with industry standards.
Class 1
57
Req. Security
Security Requirements
No Class
and
above
Mandat
Where a TCP protocol, such as MQTT, is used, it is ory for
DW-
protected by a TLS connection with no known Class 1
13
vulnerabilities. and
above
Mandat
Where a UDP protocol is used, such as CoAP, it is ory for
DW-
protected by a DTLS connection with no known Class 1
14
vulnerabilities. and
above
Where cryptographic suites are used such as TLS, all Mandat
cipher suites shall be listed and validated against the ory for
DW-
current security recommendations such as NIST 800-131A Class 1
15
or OWASP. Where insecure ciphers suites are identified and
they shall be removed from the product. above
Mandat
All use of cryptography by the product, such as TLS cipher
ory for
DW- suites, shall be listed and validated against the
Class 1
16 import/export requirements for the territories where the
and
product is to be sold and/or shipped.
above
Mandat
ory for
DW- Where there is a loss of communications or availability it
Class 1
17 shall not compromise the local integrity of the device.
and
above
Mandat
The product only initializes and enables the
ory for
DW- communications interfaces, network protocols,
Class 1
18 application protocols and network services necessary for
and
the product’s operation.
above
Mandat
Communications protocols should be the latest versions ory for
DW-
with no publicly known vulnerabilities and/or appropriate Class 1
19
for the product. and
above
58
Req. Security
Security Requirements
No Class
Mandat
Post product launch, communications protocols should
ory for
DW- be reviewed throughout the product life cycle against
Class 1
20 publicly known vulnerabilities and changed to the most
and
secure versions available if appropriate.
above
Mandat
ory for
DW- If a factory reset is made, the device should warn that
Class 1
21 secure operation may be compromised until updated.
and
above
Where RF communications are enabled (e.g., ZigBee, Advisor
DW-
etc.) antenna power is configured to limit the ability of y for all
22
mapping assets to limit attacks such as WAR-Driving. classes
Advisor
DW- Protocol anonymity features are enabled in protocols
y for all
23 (e.g., Bluetooth) to limit location tracking capabilities.
classes
Mandat
As far as reasonably possible, devices should remain ory for
DW-
operating and locally functional in the case of a loss of Class 1
24
network connection. and
above
Following restoration of power or network connection, Mandat
devices should be able to return to a network in a sensible ory for
DW-
state and in an orderly fashion, rather than in a massive Class 1
25
scale reconnect, which collectively could overwhelm a and
network. above
Table-13: Device wireless and wired interfaces security Policies,
and controls
59
securing passwords creation, passwords storing, password recovery
and reset, passwords entry and device authentication and
identification.
Req. Security
Security Requirements
No Class
The product contains a unique and tamper-resistant
device identifier. E.g., the chip serial number or other
Manda
unique silicon identifier, for example to bind code and
AA- tory for
data to a specific device hardware. This is to mitigate
01 all
threats from cloning and also to ensure authentication
classes
may be done assuredly using the device identifier e.g.,
using a device certificate containing the device identifier.
Manda
tory for
AA- Where the product has a secure source of time there is a
Class 1
02 method of validating its integrity.
and
above
Where a user interface password is used for login
Manda
authentication, the factory issued or reset password is
AA- tory for
randomly unique for every device in the product family. If
03 all
a password-less authentication is used the same principles
classes
of uniqueness apply.
Manda
AA- The product does not accept the use of null or blank tory for
04 passwords. all
classes
Manda
The product will not allow new passwords containing the
AA- tory for
user account name with which the user account is
05 all
associated.
classes
Manda
Password entry follows industry standard practice on
AA- tory for
password length, characters from the groupings and
06 all
special characters.
classes
60
Req. Security
Security Requirements
No Class
Manda
The product has defense against brute force repeated tory for
AA-
login attempts, such as exponentially increasing retry Class 1
07
attempt delays. and
above
Manda
The product securely stores any passwords using an tory for
AA-
industry standard cryptographic algorithm, compliant with Class 1
08
an industry standard. and
above
Manda
The product supports access control measures to the tory for
AA-
root/highest privilege account to restrict access to Class 1
09
sensitive information or system processes. and
above
Manda
tory for
AA- The access control privileges are defined, justified and
Class 1
10 documented.
and
above
Manda
The product only allows controlled user account access; tory for
AA-
access using anonymous or guest user accounts is not Class 1
11
supported without justification. and
above
The product allows the factory issued or OEM login Advisor
AA-
accounts to be disabled or erased or renamed when y for all
12
installed or commissioned. classes
Manda
The product supports having any or all of the factory
AA- tory for
default user login passwords altered when installed or
13 all
commissioned.
classes
Manda
If the product has a password recovery or reset
tory for
AA- mechanism, an assessment has been made to confirm
Class 1
14 that this mechanism cannot readily be abused by an
and
unauthorized party.
above
61
Req. Security
Security Requirements
No Class
Manda
tory for
AA- Where passwords are entered on a user interface, the
Class 1
15 actual pass phrase is obscured by default.
and
above
Advisor
AA- The product allows an authorized and complete factory
y for all
16 reset of all of the device’s authorization information.
classes
Where the product has the ability to remotely recover from Manda
attack, it should rely on a known good state, to enable tory for
AA-
safe recovery and updating of the device, but should limit Class 1
17
access to sensitive assets until the device is in a known and
secure condition. above
Manda
tory for
AA- Devices are provided with a RoT-backed unique
Class 1
18 authenticable logical identity.
and
above
Manda
Device Authentication Support:
tory for
AA- 1. Ability for the IoT device to identify itself as an
Class 1
19 authorized entity to other devices.
and
2. Ability to verify the identity of other devices.
above
Authentication Support:
1. Ability for the IoT device to require authentication prior
to connecting to the device, including using remote
access.
2. Ability for the IoT device to support and require Manda
appropriate authentication. tory for
AA-
3. Ability for the IoT device to support a second, or more, Class 1
20
authentication method(s) through an out of band path and
such as: Temporary passwords or other one-use logon above
credentials, Third-party credential checks, Biometrics,
Text messages, other methods
4. Ability for the IoT device to hide or mask authentication
information during the authentication process.
62
Table-14: Device Authentication and Authorization Policies, and
controls.
Req. Security
Security Requirements
No Class
Mandat
ory for
If present, a true random number generator source has
EK-01 Class 2
been validated for true randomness.
and
above
Mandat
There is a process for secure provisioning of security
ory for
parameters and keys that includes random and
EK-02 Class 2
individual (unique) generation, distribution, update,
and
revocation and destruction.
above
Mandat
ory for
There is a secure method of key insertion that protects
EK-03 Class 1
keys against copying.
and
above
All the product related cryptographic functions have
Mandat
no publicly known unmitigated weaknesses in the
EK-04 ory for
algorithms or implementation, for example MD5, SHA-1,
Class 1
and DES are not used.
63
Req. Security
Security Requirements
No Class
and
above
Mandat
All the product related cryptographic functions are
ory for
sufficiently secure for the lifecycle of the product, or
EK-05 Class 1
cryptographic algorithms and primitives should be
and
updateable ("crypto agility").
above
Mandat
The product stores all sensitive unencrypted ory for
EK-06 parameters (e.g., keys) in a secure, tamper-resistant Class 1
location. and
above
The cryptographic key chain used for signing
Advisory
production software is different from that used for any
EK-07 for all
other test, development or other software images or
classes
support requirement.
Mandat
In device manufacture, all asymmetric encryption
ory for
private keys that are unique to each device are
EK-08 Class 2
secured. They must be truly randomly internally
and
generated or securely programmed into each device.
above
Mandat
ory for
All key lengths are sufficient for the level of assurance
EK-09 Class 2
required.
and
above
Mandat
In systems with many layered sub devices, key ory for
EK-10
management should follow best practice. all
classes
Cryptography Capabilities and Support:
1. Ability to execute cryptographic mechanisms of Mandat
appropriate strength and performance. ory for
EK-11 2. Ability to obtain and validate certificates. Class 2
3. Ability to verify digital signatures. and
4. Ability to run hashing algorithms (i.e., compute and above
compare hashes).
64
Req. Security
Security Requirements
No Class
5. Ability to perform authenticated encryption
algorithms.
Cryptographic Key Management:
2. Ability to manage cryptographic keys securely
Mandat
3. Ability to generate key pairs.
ory for
4. Ability to store encryption keys securely.
EK-12 Class 2
5. Ability to change keys securely.
and
6. Ability to maintain exclusive control of
above
cryptographic keys when used by external
systems.
Secure Transmission:
1. Ability to configure the cryptographic algorithm to
protect data in transit.
2. Ability to support trusted data exchange with a
specified minimum strength cryptography
algorithm.
Mandat
3. Ability to support data encryption and signing to
ory for
EK-13 prevent data from being altered in transit.
all
4. Ability to utilize one or more capabilities to protect
classes
the data it transmits from unauthorized access
and modification.
5. Ability to use cryptographic means to validate the
integrity of data transmitted.
6. Ability to use organization-internal normalized
formats to protect the data it transmits.
SEPARATION OF SYSTEM AND USER FUNCTIONALITY:
Mandat
1. user functionality, including user interface services,
ory for
is separated from system management
EK-14 Class 2
functionality
and
2. state information is stored separately from
above
applications and software
TRANSMISSION OF SECURITY AND PRIVACY ATTRIBUTES:
1. the integrity of transmitted security attributes is Mandat
verified ory for
EK-15 2. the integrity of transmitted privacy attributes is Class 1
verified. and
3. anti-spoofing mechanisms are implemented to above
prevent adversaries from falsifying the security
65
Req. Security
Security Requirements
No Class
attributes indicating the successful application of
the security process
Mandat
ory for
EK-16 Information at rest requiring protection is defined; Class 1
and
above
Table-15: Encryption and key management security Policies, and
controls
Req. Security
Security Requirements
No Class
Access to Event Information:
1. Ability to access information about the IoT
Mandatory
CS-01 device's cybersecurity state and other
for all classes
necessary data.
2. Ability to preserve system state information.
Event Identification & Monitoring:
1. Ability to identify organizationally-defined
Mandatory
CS-02 cybersecurity events (e.g., expected state
for all classes
change) that may occur on or involving the
IoT device.
66
Req. Security
Security Requirements
No Class
2. Ability to monitor for organizationally-defined
cybersecurity events (e.g., expected state
change) that may occur on or involving the
IoT device.
3. Ability to support a list of events that are
necessary for auditing purposes (to support
the organizational auditing policy).
4. Ability to identify unique users interacting with
the device (to allow for user session
monitoring).
5. Ability to support a monitoring process to
check for disclosure of organizational
information to unauthorized entities. (The
device may be able to perform this check
itself or provide the information necessary for
an external process to check)
6. Ability to monitor communications traffic.
7. Ability to monitor changes to the
configuration settings.
8. Ability to detect remote activation attempts.
9. Ability to define the characteristics of
unapproved content.
10. A
bility to scan files for unapproved content.
Event Response:
7. Ability to generate alerts for specific
events.
8. Ability to respond to alerts according to
predefined responses.
9. Ability to alert connected information Mandatory
CS-03 systems of potential issues found during the for Class 2
auditing process. and above
10. Ability to provide information to an external
process that will issue auditing process
alerts.
11. Ability to notify users of activation of a
collaborative computing device.
67
Req. Security
Security Requirements
No Class
12. Ability to provide a physical indicator of
sensor use.
13. Ability to respond following an auditing
failure (either by the device or an external
auditing process).
14. Ability to prevent download of
unapproved content
15. Ability to delete unapproved content.
16. Ability to support alternative security
mechanisms when primary mechanisms
(e.g., login protocol, encryption, etc.) are
compromised.
17. Ability to configure organizationally-
defined aspects of the event response.
Table-16: Cybersecurity state awareness Policies, and controls
Req Security
Security Requirements
. No Class
Mandat
Where the product or service provides a web-based user ory for
UI-
interface, Authentication is secured using current best Class 1
01
practice cryptography. and
above
68
Req Security
Security Requirements
. No Class
Mandat
Where the product or service provides a web browser- ory for
UI-
based interface, access to any restricted/administrator Class 1
02
area or functionality shall require authentication. and
above
Mandat
Where the product or service provides a web-based ory for
UI-
management interface, Authentication is secured using Class 1
03
current best practice cryptography. and
above
Mandat
Where a web user interface password is used for login
UI- ory for
authentication, the initial password or factory reset
04 all
password is unique for every device in the product family.
classes
Mandat
ory for
UI- The web user interface is protected by an automatic
Class 1
05 session idle logout timeout function.
and
above
Mandat
UI- ory for
User passwords are not stored in plain text.
06 all
classes
Mandat
ory for
UI- Strong passwords are required, and a random salt value
Class 1
07 is incorporated with the password.
and
above
Mandat
Where passwords are entered on a user interface, the ory for
UI-
actual pass phrase is obscured by default to prevent the Class 1
08
capture of passwords. and
above
Mandat
ory for
UI- The web user interface shall follow good practice
Class 1
09 guidelines.
and
above
69
Req Security
Security Requirements
. No Class
Mandat
A vulnerability assessment has been performed before ory for
UI-
deployment and is repeated periodically throughout the Class 1
10
lifecycle of the service or product. and
above
Mandat
All data being transferred over interfaces should be
ory for
UI- validated where appropriate. This could include
Class 1
11 checking the data type, length, format, range,
and
authenticity, origin and frequency.
above
Mandat
Sanitize input in Web applications by using URL encoding ory for
UI-
or HTML encoding to wrap data and treat it as literal text Class 1
12
rather than executable script. and
above
Mandat
All inputs and outputs are validated using for example an ory for
UI-
allow list (formerly 'whitelist') containing authorized origins Class 1
13
of data and valid attributes of such data. and
above
Mandat
Administration Interfaces are accessible only by
ory for
UI- authorized operators. Mutual Authentication is used over
Class 1
14 administration interfaces, for example, by using
and
certificates.
above
Mandat
Reduce the lifetime of sessions to mitigate the risk of
ory for
UI- session hijacking and replay attacks. (For example, to
Class 1
15 reduce the time an attacker has to capture a session
and
cookie and use it to access an application).
above
Mandat
All inputs and outputs are checked for validity. Tests to ory for
UI-
include both expected (valid) and unexpected (invalid) Class 1
16
input stimuli. and
above
Mandat
UI- Web Interfaces should be developed using best practice
ory for
17 secure coding techniques and server frameworks.
Class 1
70
Req Security
Security Requirements
. No Class
and
above
Mandat
UI- ory for
Password entry follows industry standard practice.
18 all
classes
Mandat
Web interface should provide a simple method (one to
UI- ory for
two clicks) to initiate any security update to the end
19 all
device.
classes
Any personal data communicated between the web Mandat
UI- interface and the device shall be encrypted. Where the ory for
20 data includes sensitive personal data then the all
encryption must be appropriately secure. classes
Table-17: Web UI Policies, and controls
MOBILE APPLICATION
Req. Security
Security Requirements
No Class
Where an application’s user interface password is used Mandat
MA- for login authentication, the initial password or factory ory for
01 reset password is unique to each device in the product all
family. classes
71
Req. Security
Security Requirements
No Class
Mandat
MA- ory for
Password entry follows industry standard practice.
02 all
classes
Mandat
The mobile application ensures that any related
ory for
MA- databases or files are either tamper resistant or restricted
Class 1
03 in their access. Upon detection of tampering of the
and
databases or files, they are re-initialized.
above
Mandat
Where the application communicates with a product ory for
MA-
related remote server(s), or device, it does so over a Class 1
04
secure connection. and
above
Mandat
ory for
MA- The product securely stores any passwords using an
Class 1
05 industry standard cryptographic algorithm.
and
above
Mandat
Where passwords are entered on a user interface, the ory for
MA-
actual pass phrase is obscured by default to prevent the Class 1
06
capture of passwords. and
above
Mandat
All data being transferred over interfaces should be
ory for
MA- validated where appropriate. This could include
Class 1
07 checking the data type, length, format, range,
and
authenticity, origin and frequency.
above
Secure Administration Interfaces; It is important that Mandat
configuration management functionality is accessible ory for
MA-
only by authorized operators and administrators. Enforce Class 1
08
Strong Authentication over administration interfaces, for and
example, by using certificates. above
All application inputs and outputs are validated using for Mandat
MA-
example a allowed list containing authorized origins of ory for
09
data and valid attributes of such data. Class 1
72
Req. Security
Security Requirements
No Class
and
above
Mandat
ory for
MA- Mobile Apps should be developed using best practice
Class 1
10 secure coding techniques and server frameworks.
and
above
Mandat
App interface should provide a simple method (one to ory for
MA-
two clicks) to initiate any security update to the end Class 1
11
device. and
above
Mandat
Access to device functionality via a network/web
ory for
MA- browser interface in the initialized state should only be
Class 1
12 permitted after successful Authentication using current
and
best practice secure cryptographic modules.
above
Mandat
Any personal data communicated between the mobile
ory for
MA- app and the device shall be encrypted. Where the data
Class 1
13 includes sensitive personal data then the encryption
and
must be appropriately secure.
above
Table-18: Mobile application security Policies, and controls.
73
and mitigating password brute force attacks, DDOS attacks and
malfunctioning or malicious activities.
Req. Security
Security Requirements
No Class
Mandat
All the product related cloud and network elements
ory for
CN- have the latest operating system(s) security updates
Class 2
01 implemented and processes are in place to keep them
and
updated.
above
Mandat
Any product related web servers have their web server ory for
CN-
identification options (e.g., Apache or Linux) switched Class 1
02
off. and
above
Mandat
ory for
CN- All product related web servers have their web server
Class 1
03 HTTP trace and trace methods disabled.
and
above
Mandat
All the product related web servers’ TLS certificate(s) are
ory for
CN- signed by trusted certificate authorities; are within their
Class 1
04 validity period; and processes are in place for their
and
renewal.
above
Mandat
The Product Manufacturer or Service Provider has a
ory for
CN- process to monitor the relevant security advisories to
Class 1
05 ensure all the product related web servers use protocols
and
with no publicly known weaknesses.
above
The product related web servers support appropriately Advisor
CN-
secure TLS/DTLS ciphers and disable/remove support for y for all
06
deprecated ciphers. classes
Mandat
CN- The product related web servers have repeated
ory for
07 renegotiation of TLS connections disabled.
Class 1
74
Req. Security
Security Requirements
No Class
and
above
Mandat
ory for
CN-
The related servers have unused IP ports disabled. Class 1
08
and
above
Mandat
Where a product related to a web server encrypted
ory for
CN- communications using TLS and requests a client
Class 1
09 certificate, the server(s) only establishes a connection if
and
the client certificate and its chain of trust are valid.
above
Where a product related to a web server encrypted Advisor
CN-
communications using TLS, certificate pinning is y for all
10
implemented. classes
Mandat
ory for
CN- All the related servers and network elements prevent the
Class 1
11 use of null or blank passwords.
and
above
Mandat
ory for
CN- All the related servers and network elements enforce
Class 1
12 passwords that follow industry good practice.
and
above
Mandat
Brute force attacks are impeded by introducing
ory for
CN- escalating delays following failed user account login
Class 1
13 attempts, and/or a maximum permissible number of
and
consecutive failed attempts.
above
Mandat
All the related servers and network elements store any ory for
CN-
passwords using a cryptographic implementation using Class 1
14
industry standard cryptographic algorithms. and
above
All the related servers and network elements support Mandat
CN-
access control measures to restrict access to sensitive ory for
15
information or system processes to privileged accounts. Class 1
75
Req. Security
Security Requirements
No Class
and
above
Mandat
All the related servers and network elements prevent ory for
CN-
anonymous/guest access except for read only access to Class 1
16
public information. and
above
Advisor
CN- If run as a cloud service, the service meets industry
y for all
17 standard cloud security principles.
classes
Mandat
Where a Product or Services includes any safety critical
ory for
CN- or life-impacting functionality, the services infrastructure
Class 2
18 shall incorporate protection against DDOS attacks, such
and
as dropping of traffic or sink-holing.
above
Mandat
Where a Product or Service includes any safety critical or
ory for
CN- life-impacting functionality, the services infrastructure
Class 1
19 shall incorporate redundancy to ensure service
and
continuity and availability.
above
Mandat
ory for
CN- Input data validation should be maintained in
Class 1
20 accordance with industry best practice methods.
and
above
Mandat
If run as a cloud service, the cloud service TCP based
ory for
CN- communications (such as MQTT connections) are
Class 1
21 encrypted and authenticated using the latest TLS
and
standard.
above
Mandat
If run as a cloud service, UDP-based communications are ory for
CN-
encrypted using the latest Datagram Transport Layer Class 1
22
Security (DTLS). and
above
Where device identity and/or configuration registries Mandat
CN-
(e.g., "thing shadows") are implemented to "on-board" ory for
23
devices within a cloud service, the registries are Class 1
76
Req. Security
Security Requirements
No Class
configured to restrict access to only authorized and
administrators. above
Mandat
Product-related cloud services bind API keys to specific ory for
CN-
IoT applications and are not installed on non-authorized Class 2
24
devices. and
above
Mandat
CN- Product-related cloud services API keys are not hard- ory for
25 coded into devices or applications. all
classes
Mandat
If run as a cloud service, privileged roles are defined and ory for
CN-
implemented for any gateway/service that can Class 2
26
configure devices. and
above
Mandat
ory for
CN- Product-related cloud service databases are encrypted
Class 1
27 during storage.
and
above
Mandat
Product-related cloud service databases restrict ory for
CN-
read/write access to only authorized individuals, devices Class 1
28
and services. and
above
Mandat
Product-related cloud services are designed using a
ory for
CN- defense-in-depth architecture consisting of Virtual
Class 1
29 Private Clouds (VPCs), firewalled access, and cloud-
and
based monitoring.
above
Mandat
ory for
CN- When implemented as a cloud service, all remote access
Class 1
30 to cloud services is via secure means (e.g., SSH).
and
above
77
Req. Security
Security Requirements
No Class
Mandat
Product-related cloud services monitor for compliance ory for
CN-
with connection policies and report out-of-compliance Class 2
31
connection attempts. and
above
Mandat
IoT edge devices should connect to cloud services using ory for
CN-
secure hardware and services (e.g., TLS using private keys Class 1
32
stored in secure hardware). and
above
Mandat
Any personal data communicated between the mobile
ory for
CN- app and the device shall be encrypted. Where the data
Class 2
33 includes sensitive personal data then the encryption must
and
be appropriately secure.
above
Mandat
Subject to user permission, telemetry data from the ory for
CN-
device should be analyzed for anomalous behavior to Class 2
34
detect malfunctioning or malicious activity. and
above
Table-19: Cloud and Network elements security Policies, and
controls.
78
Req. Security
Security Requirements
No Class
Develop a control assessment plan that describes the
scope of the assessment including: Mandat
1. Controls and control enhancements under assessment; ory for
AM-
2. Assessment procedures to be used to determine control Class 2
01
effectiveness; and and
3. Assessment environment, assessment team, and above
assessment roles and responsibilities;
79
CONFORMITY ASSESSMENT
OVERVIEW
COMPLIANCE CHECKLIST
Mar
No Response Description
k
1 C Compliant The requirement is fully satisfied.
Partially
2 PC The requirement is partially satisfied.
Compliant
3 NC Not Compliant The requirement is not satisfied.
82
The requirement is not applicable for
4 N/A Not Applicable
the IoT solution of concern.
ASSESSMENT METHODOLOGY
RESPONSIBILITIES SUMMARY
The following table (table-22) presents a summary of the security
assurance process set of activities and the responsibility of each
stakeholder through each one.
LIST OF TABLES
Table-
Device hardware and physical security Policies, and controls.
10
Table-
Device software Policies, and controls.
11
Table-
Device OS Policies, and controls.
12
85
Table- Device wireless and wired interfaces security Policies, and
13 controls.
Table-
Cybersecurity state awareness Policies, and controls.
16
Table-
Web UI Policies, and controls.
17
Table-
Mobile application security Policies, and controls.
18
Table-
Cloud and Network elements security Policies, and controls.
19
Table-
Continuous assessment and monitor Policies, and controls.
20
Table-
Checklist response options.
21
LIST OF FIGURES
Figure-
IoT Application Classification.
1
Figure-
IoT Security assurance process activities.
2
86
Figure-
Risk Assessment Procedure.
3
Figure-
Defining Applicable High Level Security Controls Procedure.
4
Figure-
Conformity Assessment Procedure.
5
Figure-
Risk assessment main steps.
6
Figure-
Defining applicable high level security controls procedure.
7
Figure-
Conformity assessment procedure
8
87
REFERENCES
● European Telecommunications Standards Institute (ETSI) EN
303 645 V2.1.1 (2020-06) - Cyber Security for Consumer Internet
of Things: Baseline Requirements -
https://www.etsi.org/deliver/etsi_en/303600_303699/303645/0
2.01.01_60/en_303645v020101p.pdf
● UK Code of Practice for Consumer IoT Security - 2018 -
https://assets.publishing.service.gov.uk/government/uploads
/system/uploads/attachment_data/file/971440/Code_of_Pra
ctice_for_Consumer_IoT_Security_October_2018_V2.pdf
● Datta Burton, S.., Tanczer, L.M., Vasudevan, S., Hailes, S., Carr,
M. (2021). The UK Code of Practice for Consumer IoT Security:
‘where we are and what next’. The PETRAS National Centre of
Excellence for IoT Systems Cybersecurity. DOI:
10.14324/000.rp.10117734 -
https://assets.publishing.service.gov.uk/government/uploads
/system/uploads/attachment_data/file/978692/The_UK_cod
e_of_practice_for_consumer_IoT_security_-
_PETRAS_UCL_research_report.pdf
88
● The OWASP IoT Attack Surface Areas -
https://wiki.owasp.org/index.php/OWASP_Internet_of_Things
_Project#IoT_Attack_Surface_Areas
89
APPENDIX-A: CASE STUDY
This section is intended to show how to use the framework to secure
the IoT service provided by the service provider. It explains the
complete step by step process to determine the compliance of an
IoT service, and service provider to the cybersecurity framework.
Consider a practical example of a smart grid service provider who
offers an IoT connected smart electricity meter to the customers.
The smart meters communicate to the AMI backend system to
automatically send the readings and receive the commands from
the service provider. The network keeps personal information about
the clients since every meter is logically mapped to a specific client
at a specific location, and the network collects information about
the electricity consumption of the clients. These data are stored on
the data centers of the service provider for further procession. The
following process explained in figure-A-1 is needed to comply with
the framework.
90
1. Risk Assessment
Use
Ca Use Provided System
Functionality
se Case Service Components
ID
1. Smart meters to measure the
Gather Automati
power consumption.
ing c Smart meter.
2. Smart meters store the
readin readings LTE
consumption values securely
01 gs from submissio Communicati
on the device till transmission.
the n to the on modem.
3. Smart meters send the
smart service AMI Backend.
calculated readings to the AMI
meters provider
backend through LTE
Executi 1. Smart meters receive
Comman
ng commands from the AMI
d
comm backend based on the Smart meter.
executio
ands identity of every smart LTE
n based
02 from meter. Communicati
on the
the 2. Smart meter is able to on modem.
service
service execute the command. AMI Backend.
provider
provid 3. Smart meters report back
requests.
er the status to the AMI system.
Table-A-1: Use case identification of the case study.
91
Attack
Vulnerabilities Impact
Surface
Injecting backdoor
account on the smart
■ Sensitive data exposure (backdoor meter can lead to
accounts, hardcoded credentials, sending incorrect
encryption keys, sensitive readings and data to the
information). service provider which
■ Firmware version display and/or leads to:
Device
last update date. - Taking wrong
Firmware
■ Vulnerable services (web, ssh, tftp, decisions based on
etc.). false data
■ Security related function API - Financial loss to the
exposure. service provider
■ Firmware downgrade possibility. - Opening the door for
more attacks on the
device and network
Getting access to the
combination encryption
keys and parameters
■ Sensitive data
Device reveals the network data.
(Cleartext usernames, cleartext
Memory This results in a huge
passwords, encryption keys).
information leak including
personal information of
the customers.
Leaking personal user
■ User data disclosure information such as
Privacy ■ User/device location disclosure identity, address, and
■ Differential privacy consumption leads to
privacy violations.
Weak access controls
■ Inherent trust of cloud or mobile lead to injection attacks
application and account takeover
Vendor
■ Weak authentication attacks. This may lead to
Backend
■ Weak access controls taking control over the
APIs
■ Injection attacks meters in a specific area
■ Hidden services or a complete denial of
service.
92
Attack
Vulnerabilities Impact
Surface
■ Authentication/Authorization
related values (session key, token,
cookie, etc.) disclosure
■ Reusing of session key, token, etc.
Weak authentication
■ Device to device authentication
between the meter and
Authenticat ■ Device to mobile Application
backend leads to rogue
ion/ authentication
device attacks. This can
Authorizatio ■ Device to cloud system
lead to complete denial
n authentication
of service or taking control
■ Mobile application to cloud system
over the smart grid.
authentication
■ Web application to cloud system
authentication
■ Lack of dynamic authentication
Rogue updates sent to
■ Update sent without encryption
the smart grid network
■ Updates not signed
resulting in taking control
■ Update location writable
over the whole smart
Update ■ Update verification
meters network. May lead
Mechanism ■ Update authentication
to catastrophic results
■ Malicious update
such as power outage
■ Missing update mechanism
and faults in load
■ No manual update mechanism
balance.
■ Firmware extraction.
■ User CLI.
Ability to access the
■ Admin CLI.
device may lead to
■ Privilege escalation.
Device modifying sensitive data
■ Reset to an insecure state.
Physical such as encryption
■ Removal of storage media.
Interfaces parameters, and tariff. This
■ Tamper resistance.
leads to financial loss for
■ Debug port (UART (Serial), JTAG /
the service provider.
SWD).
■ Device ID/Serial number exposure.
93
1.3. Risk Analysis and Evaluation:
Impact Level
Moderat Very
Very Low Low High
e High
Multiple
Negligibl Limited Serious Severe
severe
e effect effect effect effect
effects
Very Almost Moderat Very
Very Low Low High
High certain e High
Moderat Very
High Highly likely Very Low Low High
e High
Moderat Somewhat Moderat Moderat
Very Low Low High
Lik
eli
e likely e e
Moderat
Low Unlikely Very Low Low Low Low
e
Highly
Very Low Very Low Very Low Very Low Low Low
unlikely
94
High [80-95] Threat could be expected to have a severe or
catastrophic effect.
Table-A-4: Risk levels and scores for risk assessment matrix of the
case study
Impact/Cost to
Probabilit
Threat company of threat Risk
y
Description happening Factor
(0-100%)
(0-5)
Tampering the physical
interface and taking (0.95*5)
95% 5
control over the smart = 4.75
meter
Exploiting update (0.1*4)
10% 4
mechanism =0.4
Breaking Authentication (0.1*4)
10% 4
Mechanisms = 0.4
95
1.5. Risk analysis review & update
96
destruction of destruction of destruction of
information could be information could be information could
expected to have a expected to have a be expected to
limited adverse serious adverse effect have a severe or
effect on on organizational catastrophic
organizational operations, adverse effect on
operations, organizational assets, organizational
organizational or individuals. operations,
assets, or individuals. organizational
assets, or individuals.
The disruption of
The disruption of The disruption of
access to or use of
access to or use of access to or use of
information or an
information or an information or an
information system
information system information system
could be expected
could be expected could be expected to
to have a severe or
Availability to have a limited have a serious adverse
catastrophic
adverse effect on effect on
adverse effect on
organizational organizational
organizational
operations, operations,
operations,
organizational organizational assets,
organizational
assets, or individuals. or individuals.
assets, or individuals.
Table-A-6: CIA Objective
As a practical example for the smart meter case study, the risk
register table-A-7 shows a very high impact and likelihood for the
physical tampering threat. The impact of this threat can be
mapped to the CIA as follows:
97
the service provider
and clients
Table-A-7: Impact of threat on the CIA objectives regarding the
case study
In this step, the output CIA impact is used to determine the correct
security class for the provided service. In this case study, it is clear
that the output is “Class 3” security requirements and controls.
2.3. Determine Applicable Security Class Controls
Finally, all controls and requirements marked as the following:
1. Mandatory for class 3 and above.
98
provided technical service are compliant with the cybersecurity
framework.
99
APPENDIX-B: DISCLAIMER
FOR NON CRITICAL INFRASTRUCTURE IOT APPLICATIONS
The IoT Solution User/Provider signing below is responsible for
execution and confidentiality of all information described in this
document.
Responsible Person
IoT Solution User/Provider
…………………………….
Date: ………………………
100