NCCoE
9700 Great Seneca Highway, Rockville, MD 20850
Brad Goodman
FIDO DO Working Group Chair
Distinguished Member of Technical Staff, Edge Computing Architect, Dell
Leveraging FIDO Alliance cybersecurity standards in support of IR8259
As highlighted in IR8259, “If a device is expected to be more trusted by customers, particularly to remain in a secure state and stay outside the control or access of unauthorized entities, then it is likely that technical means implemented on or with that device will have to be more robust.”.
For IR8259 to be implemented effectively, devices must cooperate reliably and securely. This requires that there be a strongly authenticated and protected communication channel between M2M and IoT devices. Existing protocols and authentication techniques can help to create and maintain such a channel. However, an absolute requirement for this is a rigorous enrollment process, providing positive assurance of each machine’s identity, in order to establish the necessary foundation for secure interactions. A weak enrollment procedure of even one part leaves the system vulnerable to impersonation and compromise.
From a cybersecurity viewpoint this requires that IoT products must: (a) be able to establish secure communication channels, (b) provide uses with a secure and private method of accessing their IoT data (c) be able to be provisioned with robust software, (d) be securely connected to their management platform (whether in the cloud or on-site), (e) be software upgradable (to respond to cyber threats and also to deliver new features) and (f) can be returned to a ‘Known Good State’ in a worse case situation. Additionally, users of a device must be able to log-in securely via their cloud portal to access their data.
In this presentation, Brad will review key points raised by IR8259 and show how:
By submitting this form, you are consenting to receive communications from: FIDO Alliance, 3855 SW 153rd Drive, Beaverton, OR 97003, US, http://www.fidoalliance.org. You can revoke your consent to receive emails at any time by using the unsubscribe link found at the bottom of every email.