viernes, 31 marzo 2023
Visitas totales a la web: 88477399

El portal de los profesionales de seguridad y emergencias

Nº 1 del mundo en español en seguridad global

Soluciones de seguridad global

Good Practices for Security of IoT – Secure Software Development Lifecycle

enisa. EUROPEAN UNION AGENCY FOR CYBERSECURITY  English (en) European Union Agency for Cibersecurity

This ENISA study introduces good practices for IoT security, with a particular focus on software development guidelines for secure IoT products and services throughout their lifetime. Establishing secure development guidelines across the IoT ecosystem, is a fundamental building block for IoT security. By providing good practices on how to secure the IoT software development process, this study tackles one aspect for achieving security by design, a key recommendation that was highlighted in the ENISA Baseline Security Recommendations study which focused on the security of the IoT ecosystem from a horizontal point of view.

EXECUTIVE SUMMARY

This ENISA study introduces good practices for IoT security, with a particular focus on software
development guidelines for secure IoT products and services throughout their lifetime.
Establishing secure development guidelines across the IoT ecosystem, is a fundamental
building block for IoT security. By providing good practices on how to secure the IoT software
development process, this study tackles one aspect for achieving security by design, a key
recommendation that was highlighted in the ENISA Baseline Security Recommendations study
which focused on the security of the IoT ecosystem from a horizontal point of view.


Software lies at the core of every IoT system and service, enabling their functionality and
providing value added features. The firmware of IoT devices, implementations of IoT
communication protocols and stacks, Operating Systems (OSs) for IoT products, Application
Programming Interfaces (APIs) supporting interoperability and connectivity of different IoT
services, IoT device drivers, backend IoT cloud and virtualization software, as well as software
implementing different IoT service functionalities, are some examples of how software provides
essence to IoT. Due consideration to supply chain issues, including integration of software and
hardware, is given.


Making use of secure Software Development Life Cycle (SDLC) principles is an effective and
proactive means to avoid vulnerabilities in IoT and thus assist in developing software
applications and services in a secure manner. Several security challenges of the IoT can be
addressed by establishing a baseline of secure development guidelines, such as checking for
security vulnerabilities, secure deployment, ensuring continuity of secure development in cases
of integrators, continuous delivery etc.


It is therefore important to analyze the relevant IoT cybersecurity threats and accordingly to set
forward security measures and specific secure development guidelines to avoid common
software vulnerabilities deriving from insecure practices that might be followed throughout the
SDLC (requirements analysis, software design, software development, implementation,
deployment, integration, maintenance and disposal).


The main contributions of the study include:
 Analysis of security concerns in all phases of IoT SDLC and key points to consider.
 Detailed asset and threat taxonomies concerning the IoT secure SDLC.
 Concrete and actionable good practices to enhance the cybersecurity of the IoT SDLC.
 Mapping of ENISA good practices to related existing standards, guidelines and
schemes.


The study is mainly targeted at IoT software developers, integrators and platform and system
engineers and aims to serve as a point of reference for secure IoT development. Security
considerations and guidelines for all phases of software development are provided, starting from
requirements, software design and development/implementation, all the way to testing and
acceptance, integration and deployment, as well as maintenance and disposal.

The study underlines the need to consider end-to-end IoT security, not only focusing on smart
devices, network protocols and communications, but also taking a step back and methodically
integrating cybersecurity by design principles throughout the software development lifecycle.

Lea aquí el experto completo

Fecha de publicaciónAño 2019

BELT.ES no se hace responsable de las opiniones de los artículos reproducidos en nuestra Revista de Prensa, ni hace necesariamente suyas las opiniones y criterios expresados. La difusión de la información reproducida se realiza sin fines comerciales. 

Listado de Expertos

Recomendado

Profesión militar: Obediencia debida frente a la obligación de disentir

Con ocasión de la realización de estudios en el Instituto Universitario Gutiérrez Mellado tuve la ocasión de leer y analizar una serie de documentos de opinión que trataban en profundidad las diferentes facetas presentes en el campo de las relaciones cívico-militares; temas que , habitualmente, no han estado presentes en los diferentes cursos y actividades formativas en la enseñanza militar, ni, por supuesto, en la civil.

El amor de Macarena Olona por la Guardia Civil empieza por su pareja, un joven oficial condecorado

El padre de su hijo llegó a la Benemérita como militar de carrera y, los que le...

La artillería ‘made in USA’ comprada por Marruecos que deja fuera de juego a España

El país magrebí sigue reforzando sus fuerzas armadas a golpe de talonario, y no lo hace de...

Últimas noticias

Cómo la inteligencia artificial detecta los robos en las tiendas

La empresa Veesion ha desarrollado un software que identifica los hurtos después de analizar los gestos y...

La ‘guerra mundial’ por conseguir el láser más potente del mundo: EEUU frente a China y Europa

El recién inaugurado ZEUS en EEUU reaviva la carrera por los láseres de alta intensidad, con múltiples aplicaciones en medicina, energía y...

Conoce las especialidades de la Policía Nacional

En España, cada vez con más frecuencia, los ciudadanos optan por estudiar una oposición ya que les asegura un puesto de trabajo fijo...

Los delitos de atentado contra agentes de la autoridad se disparan

De 9.967 casos en 2018 repuntaron a más de 11.000 en 2020, el año del confinamiento. En 2021 se registró un nuevo...

Guía Europea para la protección contra inundaciones

CEPREVEN decidió editar este Documento Técnico, en colaboración con el CONSORCIO DE COMPENSACIÓN DE SEGUROS, como respuesta al impacto de los Riesgos...