{"id":34401,"date":"2020-07-01T03:47:00","date_gmt":"2020-07-01T07:47:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=34401"},"modified":"2020-07-01T03:47:00","modified_gmt":"2020-07-01T07:47:00","slug":"nist-provides-important-guidance-for-iot-industry","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2020\/07\/01\/nist-provides-important-guidance-for-iot-industry\/","title":{"rendered":"NIST Provides Important Guidance For IOT Industry"},"content":{"rendered":"\n<p>Similar to HIPAA, NIST compliance for <strong>IoT <\/strong>device will be as much about how the device is used or interacted with as the device itself. <\/p>\n\n\n\n<p>More prevalent than ever before, Internet of Things (\u201c<strong>IOT<\/strong>\u201d) devices, a term that includes connected \u201csmart\u201d devices, such as internet connected TVs, wearables, smart speakers, such as the Amazon Echo and Google Home, are fast becoming a staple of how we interact with each other, and obtain and consume entertainment and information.\u00a0 We have previously written about California\u2019s\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.mintz.com\/insights-center\/viewpoints\/2826\/2018-10-hey-alexa-tell-me-about-your-security-measures\" target=\"_blank\">legislation\u00a0<\/a>requiring manufacturers to provide reasonable security features \u201cappropriate to the nature and function of the device, appropriate to the information it may collect, contain, or transmit, [and] designed to protect the device and any information contained therein from unauthorized access, destruction, use, modification, or disclosure.\u201d\u00a0<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.pixabay.com\/photo\/2017\/05\/23\/14\/47\/security-2337429__340.png\" alt=\"\" width=\"802\" height=\"634\"\/><\/figure><\/div>\n\n\n\n<p>The National Institute of Standards and Technology (\u201cNIST\u201d) has recently published two concurrent publications that provide exciting new guidance in this space.\u00a0<strong> IOT<\/strong> device manufacturers have a multipart problem when designing security processes and procedures for their devices.\u00a0 Security will depend on not only the device itself, but also its interactions with human users, and those other resources and systems that the devices interact with.\u00a0<\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2020\/NIST.IR.8259.pdf\" target=\"_blank\">NISTIR 8259<\/a>\u00a0\u201cFoundational Cybersecurity Activities for<strong> IoT <\/strong>Device Manufacturers\u201d provides six activities that <strong>IOT<\/strong> manufacturers can use to inform primarily the manufacturing of new devices:  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.natlawreview.com\/article\/nist-provides-important-guidance-iot-industry&amp;ct=ga&amp;cd=CAEYACoTODAyODA1ODU4NzU5MTYyNzI3NTIaYTJkNzVhMDE0OWE4MjFkNzpjb206ZW46VVM&amp;usg=AFQjCNFCalWImP0QzdUEhDeiIMiM46hrPA\">Read On:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Similar to HIPAA, NIST compliance for IoT device will be as much about how the device is used or interacted with as the device itself. More prevalent than ever before, Internet of Things (\u201cIOT\u201d) devices, a term that includes connected <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2020\/07\/01\/nist-provides-important-guidance-for-iot-industry\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[626,14],"tags":[698,627],"class_list":["post-34401","post","type-post","status-publish","format-standard","hentry","category-iot","category-security","tag-cyber-security","tag-iot"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/34401","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=34401"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/34401\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=34401"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=34401"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=34401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}