0% found this document useful (0 votes)
30 views

Code of Practice

This document presents a voluntary Code of Practice for securing Internet of Things devices for consumers in Australia. It was developed by the Department of Home Affairs in partnership with the Australian Signals Directorate's Australian Cyber Security Centre. The Code of Practice contains 13 principles for industry regarding secure practices around passwords, vulnerability disclosure, software updates, credential storage, and personal data protection. Compliance with the principles is encouraged but optional. The principles are intended to improve IoT security and raise consumer confidence in IoT technology.

Uploaded by

Arnis Rrustemaj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views

Code of Practice

This document presents a voluntary Code of Practice for securing Internet of Things devices for consumers in Australia. It was developed by the Department of Home Affairs in partnership with the Australian Signals Directorate's Australian Cyber Security Centre. The Code of Practice contains 13 principles for industry regarding secure practices around passwords, vulnerability disclosure, software updates, credential storage, and personal data protection. Compliance with the principles is encouraged but optional. The principles are intended to improve IoT security and raise consumer confidence in IoT technology.

Uploaded by

Arnis Rrustemaj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Code of Practice

Securing the
Internet of Things
for Consumers
© Commonwealth of Australia 2020

With the exception of the Commonwealth Coat of Arms, all material presented
in this publication is provided under a Creative Commons Attribution 4.0
International license at https://creativecommons.org/licenses/by/4.0/legalcode.

This means this license only applies to material as set out in this document.

The details of the relevant license conditions are available on the


Creative Commons website at https://creativecommons.org/ as is the full legal code
for the CC BY 4.0 license at https://creativecommons.org/licenses/by/4.0/legalcode.

Use of the Coat of Arms


The terms under which the Coat of Arms can be used are
detailed at the Department of the Prime Minister and Cabinet website—
https://www.pmc.gov.au/government/commonwealth-coat-arms.

Contact us
Enquiries regarding the licence and any use of this document are welcome at:

Department of Home Affairs


PO Box 25
BELCONNEN ACT 2616

P - 20-02351
Introduction

The Internet of Things (IoT), which includes the Australian Signals Directorate’s Australian
everyday smart devices that connect to Cyber Security Centre, and follows nation-wide
the internet – such as smart TVs and home engagement with industry and the Australian
assistants – provides significant benefits public. The Code of Practice was recognised
to Australians; enhancing our convenience, as a necessary step to lifting the cyber security
comfort and efficiency. Many of these devices of internet-connected devices domestically.
are developed with functionality as a priority,
and security features are often absent or an The Code of Practice is designed for an industry
afterthought. By 2030, it is estimated that audience and comprises 13 principles. The
there will be more than 21 billion IoT devices Australian Government recommends industry
connected to the internet globally, with the prioritise the top three principles because action
highest estimations predicting over 64 billion on default passwords, vulnerability disclosure
devices. It is essential that these devices in our and security updates will bring the largest
homes and businesses have cyber security security benefits in the short term.
provisions that defend against potential threats
and malicious cyber activity. In acknowledgement of the global nature
of this issue, the Code of Practice aligns with
The Code of Practice: Securing the Internet and builds upon guidance provided by the
of Things for Consumers (Code of Practice) United Kingdom and is consistent with other
represents a first step in the Australian international standards. The principles will help
Government’s approach to improve the security inform domestic and international manufacturers
of IoT devices in Australia. This Code of Practice about the security features expected of devices
is a voluntary set of measures the Australian available in Australia.
Government recommends for industry as the
minimum standard for IoT devices. The Code of Ensuring the security and integrity of IoT
Practice will also help raise awareness of security devices will enhance the way we live and
safeguards associated with IoT devices, build work. By improving the overall cyber security
greater consumer confidence in IoT technology of these devices, we also deter the risks they
and allow Australia to reap the benefits of pose to Australian families, our economy and
greater IoT adoption. national security.

The Code of Practice was developed by the This Code of Practice will be reviewed on a
Department of Home Affairs, in partnership with regular basis to ensure it remains fit for purpose.

Securing the Internet of Things for Consumers 1


Application
This Code of Practice constitutes a voluntary set of principles, and compliance with these principles
is encouraged but optional. Any entity choosing to comply with the Code of Practice may do
so in accordance with all or some of the principles contained in the Code of Practice. Where the
Code of Practice has been partially complied with, the entity should state the specific principle
that is in compliance. For example, by stating, “Our organisation has complied with
principles 1, 2 and 3 of the Code of Practice: Securing the Internet of Things for Consumers”.

2 Code of Practice
Principles

Principle Description

1. No duplicated IoT device (and associated backend/cloud account) passwords should


default or weak be unique, unpredictable, complex and unfeasible to guess, and not
passwords resettable to any factory default value that is common to multiple devices.
Associated web services should use Multi-Factor Authentication, not
provide any unnecessary user information prior to authentication, and
any password reset process should appropriately authenticate the user.

Primarily applies to Device Manufacturers.

2. Implement a IoT device manufacturers, IoT service providers and mobile application
vulnerability developers should provide a public point of contact as part of a
disclosure vulnerability disclosure policy in order for security researchers and others
policy to report issues. Disclosed vulnerabilities should be acted on in a timely
manner. Implementing a bug bounty program encourages and rewards
the cyber security community for identifying and reporting vulnerabilities,
thereby facilitating the responsible and coordinated disclosure and
remediation of vulnerabilities.

Primarily applies to Device Manufacturers, IoT Service Providers


and Mobile Application Developers.

Securing the Internet of Things for Consumers 3


Principle Description

3. Keep software Software (including firmware) on IoT devices, including third party and open
securely source software, as well as associated web services, should be securely
updated updateable. Updates should be timely and not impact the device’s
functionality. Updates should also not change user-configured preferences,
security or privacy settings without prior approval from the user. The need
for each update should be made clear to consumers, and updates should
be easy to implement and applied automatically by default. The device
should verify that updates are from a trusted source e.g. via use of a trusted
digital signature. Updates should be distributed via secure IT infrastructure
to mitigate the trusted source being compromised. For constrained devices
that cannot physically be updated, the product should be isolatable and
replaceable. Where possible, vendors should inform the user when their
constrained device is no longer fit for purpose.

An end-of-life policy should be clear to the consumer including when they


acquire the device, which explicitly states the minimum length of time for
which a device will receive software updates, the reasons for this timeframe
and a commitment and method to warn consumers when the product will
no longer receive updates. If a user interface is available it should clearly
display when a device has reached its end-of-life, inform the user of the
risk of security updates no longer being available and provide suggestions
for mitigating this risk.

Primarily applies to Device Manufacturers, IoT Service Providers


and Mobile Application Developers.

4. Securely store Any credentials should be stored securely within devices and on services.
credentials Hard-coded credentials (e.g. usernames and passwords) should not be
embedded in device software or hardware since they can be discovered
via reverse engineering.

Primarily applies to Device Manufacturers, IoT Service Providers


and Mobile Application Developers.

4 Code of Practice
Principle Description

5. Ensure that Where devices and/or services process personal data, they must do so
personal data in accordance with data protection law e.g. the Privacy Act 1988 and
is protected Australian Privacy Principles. Personal data should only be collected if
necessary for the operation of the device, and privacy settings on a device
should be set to privacy protective by default. Adequate industry-standard
encryption, as articulated in the Australian Government Information
Security Manual, should be applied to personal data in transit and data at
rest. Consumers should be provided with clear and transparent information
about what data is being used and how, by whom, and for what purposes,
for each device and service. This also applies to any third parties that
may be involved (including advertisers). Where personal data is processed
on the basis of consumers’ consent, this should be validly and lawfully
obtained from an adult, with those consumers being given the opportunity
to withdraw it at any time.

Several other principles in this document are related to protecting personal


data, such as installing and securely configuring devices, as well as
deleting personal data.

Primarily applies to Device Manufacturers, IoT Service Providers,


Mobile Application Developers and Retailers.

6. Minimise Devices and services should operate on the ‘principle of least privilege’.
exposed attack Unused functionality should be disabled; hardware should not
surfaces unnecessarily expose access (e.g. unrequired ports should be closed,
the web management interface should only be accessible to the local
network unless the device needs to be managed remotely via the
Internet); functionality should not be available if they are not used; and
code should be minimised to the functionality necessary for devices and
services to operate. Software should run with appropriate privileges, taking
account of both security and functionality. To further reduce the number
of vulnerabilities, use a secure software development process and perform
penetration testing.

Primarily applies to Device Manufacturers and IoT Service Providers.

7. Ensure Data requiring confidentiality or integrity protection, or associated


communication with remote management and control, should be encrypted in transit,
security appropriate to the properties of the technology and usage. All credentials
and certificates should be managed securely. All remote access should
be logged, with logs including the date, time and source of access at
a minimum.

Primarily applies to Device Manufacturers, IoT Service Providers


and Mobile Application Developers.

Securing the Internet of Things for Consumers 5


Principle Description

8. Ensure Software (including firmware) on IoT devices should be verified using


software secure boot mechanisms. If an unauthorised change is detected, the
integrity device should alert the consumer/administrator to an issue and should
not connect to wider networks than those necessary to perform
the alerting function.

Primarily applies to Device Manufacturers.

9. Make systems Resilience should be built into IoT devices and services where required by
resilient to their usage or by other relying systems, taking into account the possibility
outages of outages of data networks and power. As far as reasonably possible, IoT
devices should remain operating and locally functional in the case of a loss
of network, without compromising security or safety. They should recover
cleanly in the case of restoration of a loss of power. Devices should be able
to return to a network in a sensible state and in an orderly fashion, rather
than all attempt to reconnect at the same time. Implementing redundancy
and DDoS mitigation helps ensure that IoT services remain online. Architect
IoT devices to continue functioning as much as possible if an associated
IoT service becomes unavailable, and disclose upfront to the consumer
which features will cease working in this case. IoT service providers
should also update data when network connection is restored.

Primarily applies to Device Manufacturers and IoT Service Providers.

10. Monitor system If telemetry data is collected from IoT devices and services, such as usage
telemetry data and measurement data, it should be monitored for security anomalies.

Primarily applies to Device Manufacturers and IoT Service Providers.

11. Make it easy Devices and services should be configured such that personal data
for consumers can easily be removed when there is a transfer of ownership, when the
to delete consumer wishes to delete it and/or when the consumer wishes to dispose
personal data of the device. Consumers should be given clear instructions on how
to delete their personal data, including how to reset the device to
“factory default” and delete data stored on the device and in
associated backend/cloud accounts and mobile applications.

Primarily applies to Device Manufacturers, IoT Service Providers


and Mobile Application Developers.

6 Code of Practice
Principle Description

12. Make Installation and maintenance of IoT devices should employ minimal steps
installation and and follow Australian Government best practice on security1 and usability.2
maintenance Consumers should also be provided with clear and straightforward
of devices easy guidance on how to securely set up their device and maintain it through
its lifecycle. Accessibility options on a device should be enabled by default.

Primarily applies to Device Manufacturers, IoT Services Providers


and Mobile Application Developers.

13. Validate Data received via user interfaces, application programming interfaces
input data (APIs) and network interfaces should be validated. Ensure data input
is authorised and conforms to expectations.

Primarily applies to Device Manufacturers, IoT Service Providers


and Mobile Application Developers.

1 Australian Signals Directorate’s ‘How to implement the Code of Practice: Securing the Internet of Things for Consumers’.
2 Digital Transformation Agency’s ‘Accessibility and Inclusivity Guide’.

Securing the Internet of Things for Consumers 7


Definitions

Consumer IoT: Consumers may take many forms. Mobile Application Developers: Entities that
Governments, businesses and individuals may develop and provide applications that run
all be consumers of IoT devices. This Code of on mobile devices. These are often offered
Practice particularly focuses on consumer grade, as a way of interacting with devices as part
internet-connected devices and associated of an IoT solution.
applications (e.g. wearable devices, and home
appliances such as “smart” televisions and Retailers: The sellers of internet-connected
refrigerators). This group of devices does not products and associated services to consumers.
include mobile phones – as they are considered
sophisticated devices and other guidance may
more accurately apply.

Device Manufacturer: The entity that creates


an assembled final internet-connected product.
A final product may contain the products of
many different manufacturers.

IoT Service Providers: Companies that provide


services such as networks, cloud storage and
data transfer which are packaged as part of IoT
solutions. Internet-connected devices may be
offered as part of the service.

8 Code of Practice

You might also like