miércoles, 30 noviembre 2022
Visitas totales a la web: 88112244

El portal de los profesionales de seguridad y emergencias

Nº 1 del mundo en español en seguridad global

Soluciones de seguridad global

Good Practices for Security of IoT – Secure Software Development Lifecycle

enisa. EUROPEAN UNION AGENCY FOR CYBERSECURITY  English (en) European Union Agency for Cibersecurity

This ENISA study introduces good practices for IoT security, with a particular focus on software development guidelines for secure IoT products and services throughout their lifetime. Establishing secure development guidelines across the IoT ecosystem, is a fundamental building block for IoT security. By providing good practices on how to secure the IoT software development process, this study tackles one aspect for achieving security by design, a key recommendation that was highlighted in the ENISA Baseline Security Recommendations study which focused on the security of the IoT ecosystem from a horizontal point of view.

EXECUTIVE SUMMARY

This ENISA study introduces good practices for IoT security, with a particular focus on software
development guidelines for secure IoT products and services throughout their lifetime.
Establishing secure development guidelines across the IoT ecosystem, is a fundamental
building block for IoT security. By providing good practices on how to secure the IoT software
development process, this study tackles one aspect for achieving security by design, a key
recommendation that was highlighted in the ENISA Baseline Security Recommendations study
which focused on the security of the IoT ecosystem from a horizontal point of view.


Software lies at the core of every IoT system and service, enabling their functionality and
providing value added features. The firmware of IoT devices, implementations of IoT
communication protocols and stacks, Operating Systems (OSs) for IoT products, Application
Programming Interfaces (APIs) supporting interoperability and connectivity of different IoT
services, IoT device drivers, backend IoT cloud and virtualization software, as well as software
implementing different IoT service functionalities, are some examples of how software provides
essence to IoT. Due consideration to supply chain issues, including integration of software and
hardware, is given.


Making use of secure Software Development Life Cycle (SDLC) principles is an effective and
proactive means to avoid vulnerabilities in IoT and thus assist in developing software
applications and services in a secure manner. Several security challenges of the IoT can be
addressed by establishing a baseline of secure development guidelines, such as checking for
security vulnerabilities, secure deployment, ensuring continuity of secure development in cases
of integrators, continuous delivery etc.


It is therefore important to analyze the relevant IoT cybersecurity threats and accordingly to set
forward security measures and specific secure development guidelines to avoid common
software vulnerabilities deriving from insecure practices that might be followed throughout the
SDLC (requirements analysis, software design, software development, implementation,
deployment, integration, maintenance and disposal).


The main contributions of the study include:
 Analysis of security concerns in all phases of IoT SDLC and key points to consider.
 Detailed asset and threat taxonomies concerning the IoT secure SDLC.
 Concrete and actionable good practices to enhance the cybersecurity of the IoT SDLC.
 Mapping of ENISA good practices to related existing standards, guidelines and
schemes.


The study is mainly targeted at IoT software developers, integrators and platform and system
engineers and aims to serve as a point of reference for secure IoT development. Security
considerations and guidelines for all phases of software development are provided, starting from
requirements, software design and development/implementation, all the way to testing and
acceptance, integration and deployment, as well as maintenance and disposal.

The study underlines the need to consider end-to-end IoT security, not only focusing on smart
devices, network protocols and communications, but also taking a step back and methodically
integrating cybersecurity by design principles throughout the software development lifecycle.

Lea aquí el experto completo

Fecha de publicaciónAño 2019

BELT.ES no se hace responsable de las opiniones de los artículos reproducidos en nuestra Revista de Prensa, ni hace necesariamente suyas las opiniones y criterios expresados. La difusión de la información reproducida se realiza sin fines comerciales. 

Listado de Expertos

Recomendado

Profesión militar: Obediencia debida frente a la obligación de disentir

Con ocasión de la realización de estudios en el Instituto Universitario Gutiérrez Mellado tuve la ocasión de leer y analizar una serie de documentos de opinión que trataban en profundidad las diferentes facetas presentes en el campo de las relaciones cívico-militares; temas que , habitualmente, no han estado presentes en los diferentes cursos y actividades formativas en la enseñanza militar, ni, por supuesto, en la civil.

El amor de Macarena Olona por la Guardia Civil empieza por su pareja, un joven oficial condecorado

El padre de su hijo llegó a la Benemérita como militar de carrera y, los que le...

La artillería ‘made in USA’ comprada por Marruecos que deja fuera de juego a España

El país magrebí sigue reforzando sus fuerzas armadas a golpe de talonario, y no lo hace de...

Últimas noticias

Sistemas de Extinción por Gas: Manual Práctico para el Diseño, Instalación y Mantenimiento

Este Documento Técnico tiene como objetivo dar a conocer las peculiaridades de los Sistemas de Extinción por...

A CSO’s challenge for building a global risk strategy

Without a strategy, security plans are almost impossible to implement, and C-suite engagement can be jeopardized Global security risks...

Este timbre para bicicletas es el lugar perfecto para esconder un AirTag sin que los ladrones lo sepan

Los AirTags de Apple desbancaron con su nacimiento al resto de opciones del mercado entre los usuarios de Apple. Esta solución de rastreo se...

Este timbre para bicicleta es el lugar perfecto para esconder un AirTag sin que los ladrones lo sepan

Bajo un timbre o un portabotellas, esta compañía ha ideado unos escondites para colocar los rastreadores a prueba de robos y pérdidas.

El acuífero detrítico terciario, la gran fuente de agua que abastece todo Madrid

Casi dos tercios de todo el territorio de la Comunidad de Madrid se dispone sobre alguna masa de agua subterránea. La abundancia de este recurso marcó incluso la evolución del lugar, y es que hasta mediados del siglo XIX, la población se abastecía exclusivamente de las aguas subterráneas mediante los denominados 'viajes del agua'.