Virtualization Technology News and Information
Article
RSS
Cloud Security Alliance Releases New Guidance for "Identity and Access Management for the Internet of Things"
The Cloud Security Alliance (CSA), the world's leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced that its Internet of Things (IoT) Working Group (WG) has released a new summary guidance report titled "Identity and Access Management for the Internet of Things." The Internet of Things (IoT) has been experiencing massive growth in both consumer and business environments.  In response to this emerging market and the particular security requirements of these connected devices, The CSA established the IoT Working Group (WG) to focus on providing relevant guidance to its stakeholders who are implementing IoT solutions. To download a free copy of the guidance report, click here: https://cloudsecurityalliance.org/download/identity-and-access-management-for-the-iot/

The IoT introduces the need to manage exponentially more identities than existing IAM systems are required to support.  The security industry is seeing a paradigm shift whereby IAM is no longer solely concerned with managing people but also managing the hundreds of thousands of "things" that may be connected to a network.  In many instances these things are connected intermittently and may be required to communicate with other things, mobile devices and the backend infrastructure.  

"This document is the first in a series of summary guidance aimed at providing easily understandable recommendations to information technology staff charged with securely implementing and deploying IoT solutions," said Brian Russell, co-chair of the Internet of Things Working Group for the Cloud Security Alliance. "With this guidance, the CSA's IoT Working Group is seeking to provide prescriptive guidance to stakeholders detailing an easy-to-follow set of recommendations for establishing an IAM for IoT program within their organization."

To help security practitioners ensure the integrity of their IoT deployments, the report details 23 recommendations for implementing IAM for IoT which are drawn from real-world best practices culled by CSA's IoT Working Group along with guidance from a number of other organizations including the Kantara Initiative, FIDO, and the IETF. Some of these recommendations include:

  • Integrate your IoT implementation into existing IAM and GRC governance frameworks in your organization
  • Do not deploy IoT resources without changing default passwords for administrative access.
  • Evaluate a move to Identity Relationship Management (IRM) in place of traditional IAM.
  • Design your authentication and authorization schemes based on your system-level threat models.
Published Thursday, October 01, 2015 4:34 PM by David Marshall
Filed under:
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
Calendar
<October 2015>
SuMoTuWeThFrSa
27282930123
45678910
11121314151617
18192021222324
25262728293031
1234567