+ All Categories
Home > Documents > Do you comply with Government’s Digital Initiative? · 2020. 12. 7. · 2 Do you comply with the...

Do you comply with Government’s Digital Initiative? · 2020. 12. 7. · 2 Do you comply with the...

Date post: 26-Feb-2021
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
1
2 Do you comply with the Government’s new Digital Initiative? “Secure by Design” - Improve IoT Security 2 2 2 2 2 “Secure by Design” specifies the “What?”, if you need help with the “How?”, contact us: [email protected] No default passwords Passwords unique to each device 2 Implement a Vulnerability disclosure policy Provide a public contact to liaise with security researchers Keep software updated Ensure your IoT devices can be securely updated 3 4 Securely store credentials All security credentials must be securely stored with the service and on devices 6 Minimise exposed attack surfaces Devices should operate on the principle of least privilege 5 Communicate securely Security related or sensitive data should be encrypted during transit Ensure software integrity Device software must be verified using a secure bootloader 7 8 Protect Personal Data Comply with General Data Protection Regulations (GDPR) 9 Resilient systems Systems and devices should be resilient and remain functional through outages 10 Monitor system telemetry data Monitor the data for anomalies Consumers control their data Ensure that consumers are informed how to delete personal data 11 12 Easy installation and maintenance Minimal steps required by the consumer to install and maintain device security 13 Validate inputs Validate all data via user and application interfaces 1
Transcript
Page 1: Do you comply with Government’s Digital Initiative? · 2020. 12. 7. · 2 Do you comply with the Government’s new Digital Initiative? “Secure by Design” - Improve IoT Security

2

Do you comply with the Government’s new Digital Initiative?

“Secure by Design” - Improve IoT Security

2

2

2

2

2

“Secure by Design” speci�es the “What?”, if you need help with the “How?”,

contact us: [email protected]

No default passwordsPasswords unique to each device

2Implement a Vulnerability disclosure policyProvide a public contact to liaise with security

researchers

Keep software updatedEnsure your IoT devices can be securely updated3

4Securely store credentials

All security credentials must be securely stored with the service and on devices

6Minimise exposed attack surfacesDevices should operate on the principle of least

privilege

5 Communicate securelySecurity related or sensitive data should be encrypted during transit

Ensure software integrityDevice software must be verified using a secure bootloader

7

8Protect Personal Data

Comply with General Data Protection Regulations (GDPR)

9 Resilient systemsSystems and devices should be resilient and remain functional through outages

10Monitor system telemetry data

Monitor the data for anomalies

Consumers control their dataEnsure that consumers are informed how to delete personal data

11

12Easy installation and maintenance

Minimal steps required by the consumer to install and maintain device security

13Validate inputsValidate all data via user and application interfaces

1

Recommended