Code of Practice
Code of Practice
Securing the
Internet of Things
for Consumers
© Commonwealth of Australia 2020
With the exception of the Commonwealth Coat of Arms, all material presented
in this publication is provided under a Creative Commons Attribution 4.0
International license at https://creativecommons.org/licenses/by/4.0/legalcode.
This means this license only applies to material as set out in this document.
Contact us
Enquiries regarding the licence and any use of this document are welcome at:
P - 20-02351
Introduction
The Internet of Things (IoT), which includes the Australian Signals Directorate’s Australian
everyday smart devices that connect to Cyber Security Centre, and follows nation-wide
the internet – such as smart TVs and home engagement with industry and the Australian
assistants – provides significant benefits public. The Code of Practice was recognised
to Australians; enhancing our convenience, as a necessary step to lifting the cyber security
comfort and efficiency. Many of these devices of internet-connected devices domestically.
are developed with functionality as a priority,
and security features are often absent or an The Code of Practice is designed for an industry
afterthought. By 2030, it is estimated that audience and comprises 13 principles. The
there will be more than 21 billion IoT devices Australian Government recommends industry
connected to the internet globally, with the prioritise the top three principles because action
highest estimations predicting over 64 billion on default passwords, vulnerability disclosure
devices. It is essential that these devices in our and security updates will bring the largest
homes and businesses have cyber security security benefits in the short term.
provisions that defend against potential threats
and malicious cyber activity. In acknowledgement of the global nature
of this issue, the Code of Practice aligns with
The Code of Practice: Securing the Internet and builds upon guidance provided by the
of Things for Consumers (Code of Practice) United Kingdom and is consistent with other
represents a first step in the Australian international standards. The principles will help
Government’s approach to improve the security inform domestic and international manufacturers
of IoT devices in Australia. This Code of Practice about the security features expected of devices
is a voluntary set of measures the Australian available in Australia.
Government recommends for industry as the
minimum standard for IoT devices. The Code of Ensuring the security and integrity of IoT
Practice will also help raise awareness of security devices will enhance the way we live and
safeguards associated with IoT devices, build work. By improving the overall cyber security
greater consumer confidence in IoT technology of these devices, we also deter the risks they
and allow Australia to reap the benefits of pose to Australian families, our economy and
greater IoT adoption. national security.
The Code of Practice was developed by the This Code of Practice will be reviewed on a
Department of Home Affairs, in partnership with regular basis to ensure it remains fit for purpose.
2 Code of Practice
Principles
Principle Description
2. Implement a IoT device manufacturers, IoT service providers and mobile application
vulnerability developers should provide a public point of contact as part of a
disclosure vulnerability disclosure policy in order for security researchers and others
policy to report issues. Disclosed vulnerabilities should be acted on in a timely
manner. Implementing a bug bounty program encourages and rewards
the cyber security community for identifying and reporting vulnerabilities,
thereby facilitating the responsible and coordinated disclosure and
remediation of vulnerabilities.
3. Keep software Software (including firmware) on IoT devices, including third party and open
securely source software, as well as associated web services, should be securely
updated updateable. Updates should be timely and not impact the device’s
functionality. Updates should also not change user-configured preferences,
security or privacy settings without prior approval from the user. The need
for each update should be made clear to consumers, and updates should
be easy to implement and applied automatically by default. The device
should verify that updates are from a trusted source e.g. via use of a trusted
digital signature. Updates should be distributed via secure IT infrastructure
to mitigate the trusted source being compromised. For constrained devices
that cannot physically be updated, the product should be isolatable and
replaceable. Where possible, vendors should inform the user when their
constrained device is no longer fit for purpose.
4. Securely store Any credentials should be stored securely within devices and on services.
credentials Hard-coded credentials (e.g. usernames and passwords) should not be
embedded in device software or hardware since they can be discovered
via reverse engineering.
4 Code of Practice
Principle Description
5. Ensure that Where devices and/or services process personal data, they must do so
personal data in accordance with data protection law e.g. the Privacy Act 1988 and
is protected Australian Privacy Principles. Personal data should only be collected if
necessary for the operation of the device, and privacy settings on a device
should be set to privacy protective by default. Adequate industry-standard
encryption, as articulated in the Australian Government Information
Security Manual, should be applied to personal data in transit and data at
rest. Consumers should be provided with clear and transparent information
about what data is being used and how, by whom, and for what purposes,
for each device and service. This also applies to any third parties that
may be involved (including advertisers). Where personal data is processed
on the basis of consumers’ consent, this should be validly and lawfully
obtained from an adult, with those consumers being given the opportunity
to withdraw it at any time.
6. Minimise Devices and services should operate on the ‘principle of least privilege’.
exposed attack Unused functionality should be disabled; hardware should not
surfaces unnecessarily expose access (e.g. unrequired ports should be closed,
the web management interface should only be accessible to the local
network unless the device needs to be managed remotely via the
Internet); functionality should not be available if they are not used; and
code should be minimised to the functionality necessary for devices and
services to operate. Software should run with appropriate privileges, taking
account of both security and functionality. To further reduce the number
of vulnerabilities, use a secure software development process and perform
penetration testing.
9. Make systems Resilience should be built into IoT devices and services where required by
resilient to their usage or by other relying systems, taking into account the possibility
outages of outages of data networks and power. As far as reasonably possible, IoT
devices should remain operating and locally functional in the case of a loss
of network, without compromising security or safety. They should recover
cleanly in the case of restoration of a loss of power. Devices should be able
to return to a network in a sensible state and in an orderly fashion, rather
than all attempt to reconnect at the same time. Implementing redundancy
and DDoS mitigation helps ensure that IoT services remain online. Architect
IoT devices to continue functioning as much as possible if an associated
IoT service becomes unavailable, and disclose upfront to the consumer
which features will cease working in this case. IoT service providers
should also update data when network connection is restored.
10. Monitor system If telemetry data is collected from IoT devices and services, such as usage
telemetry data and measurement data, it should be monitored for security anomalies.
11. Make it easy Devices and services should be configured such that personal data
for consumers can easily be removed when there is a transfer of ownership, when the
to delete consumer wishes to delete it and/or when the consumer wishes to dispose
personal data of the device. Consumers should be given clear instructions on how
to delete their personal data, including how to reset the device to
“factory default” and delete data stored on the device and in
associated backend/cloud accounts and mobile applications.
6 Code of Practice
Principle Description
12. Make Installation and maintenance of IoT devices should employ minimal steps
installation and and follow Australian Government best practice on security1 and usability.2
maintenance Consumers should also be provided with clear and straightforward
of devices easy guidance on how to securely set up their device and maintain it through
its lifecycle. Accessibility options on a device should be enabled by default.
13. Validate Data received via user interfaces, application programming interfaces
input data (APIs) and network interfaces should be validated. Ensure data input
is authorised and conforms to expectations.
1 Australian Signals Directorate’s ‘How to implement the Code of Practice: Securing the Internet of Things for Consumers’.
2 Digital Transformation Agency’s ‘Accessibility and Inclusivity Guide’.
Consumer IoT: Consumers may take many forms. Mobile Application Developers: Entities that
Governments, businesses and individuals may develop and provide applications that run
all be consumers of IoT devices. This Code of on mobile devices. These are often offered
Practice particularly focuses on consumer grade, as a way of interacting with devices as part
internet-connected devices and associated of an IoT solution.
applications (e.g. wearable devices, and home
appliances such as “smart” televisions and Retailers: The sellers of internet-connected
refrigerators). This group of devices does not products and associated services to consumers.
include mobile phones – as they are considered
sophisticated devices and other guidance may
more accurately apply.
8 Code of Practice