IOT MOBILE
DIGICERT : ESSENTIAL STRATEGIES FOR THE IDOT
80
• DigiCert , a leading player at the intersection of the IoT and cybersecurity , has several strategies and best practices for companies looking to safely incorporate IoT technology into their day to day operations .
• Establish a naming system for IoT devices .
• Determine an identity lifecycle for IoT devices , making sure it can be modified to meet the projected lifetime of these devices .
• Create a well-defined process for registering the IoT devices ; the type of data that the device will be transmitting and receiving should shape the registration process .
• Define security safeguards for data streams from IoT devices .
• Outline well-defined authentication and authorisation process for admin local access to connected devices .
• Create safeguards for protecting different types of data , making sure to create privacy safeguards for personallyidentifiable information ( PII ).
• Define and document who can access the different types of data ( e . g ., local admins , outside companies ).
• Establish guidelines for authenticating and authorising occasionally connected IoT devices .
• Determine procedures for access control to IoT devices and systems based on the company ’ s policies .
Companies that follow these guidelines will , according to DigiCert , be far better protected against threats to their IoT networks .
SEPTEMBER 2020