viernes, 14 agosto 2020
Visitas totales a la web: 85946304

El portal de los profesionales de seguridad y emergencias

Nº 1 del mundo en español en seguridad global

Soluciones de seguridad global

Good Practices for Security of IoT – Secure Software Development Lifecycle

enisa. EUROPEAN UNION AGENCY FOR CYBERSECURITY  English (en) European Union Agency for Cibersecurity

This ENISA study introduces good practices for IoT security, with a particular focus on software development guidelines for secure IoT products and services throughout their lifetime. Establishing secure development guidelines across the IoT ecosystem, is a fundamental building block for IoT security. By providing good practices on how to secure the IoT software development process, this study tackles one aspect for achieving security by design, a key recommendation that was highlighted in the ENISA Baseline Security Recommendations study which focused on the security of the IoT ecosystem from a horizontal point of view.

EXECUTIVE SUMMARY

This ENISA study introduces good practices for IoT security, with a particular focus on software
development guidelines for secure IoT products and services throughout their lifetime.
Establishing secure development guidelines across the IoT ecosystem, is a fundamental
building block for IoT security. By providing good practices on how to secure the IoT software
development process, this study tackles one aspect for achieving security by design, a key
recommendation that was highlighted in the ENISA Baseline Security Recommendations study
which focused on the security of the IoT ecosystem from a horizontal point of view.


Software lies at the core of every IoT system and service, enabling their functionality and
providing value added features. The firmware of IoT devices, implementations of IoT
communication protocols and stacks, Operating Systems (OSs) for IoT products, Application
Programming Interfaces (APIs) supporting interoperability and connectivity of different IoT
services, IoT device drivers, backend IoT cloud and virtualization software, as well as software
implementing different IoT service functionalities, are some examples of how software provides
essence to IoT. Due consideration to supply chain issues, including integration of software and
hardware, is given.


Making use of secure Software Development Life Cycle (SDLC) principles is an effective and
proactive means to avoid vulnerabilities in IoT and thus assist in developing software
applications and services in a secure manner. Several security challenges of the IoT can be
addressed by establishing a baseline of secure development guidelines, such as checking for
security vulnerabilities, secure deployment, ensuring continuity of secure development in cases
of integrators, continuous delivery etc.


It is therefore important to analyze the relevant IoT cybersecurity threats and accordingly to set
forward security measures and specific secure development guidelines to avoid common
software vulnerabilities deriving from insecure practices that might be followed throughout the
SDLC (requirements analysis, software design, software development, implementation,
deployment, integration, maintenance and disposal).


The main contributions of the study include:
 Analysis of security concerns in all phases of IoT SDLC and key points to consider.
 Detailed asset and threat taxonomies concerning the IoT secure SDLC.
 Concrete and actionable good practices to enhance the cybersecurity of the IoT SDLC.
 Mapping of ENISA good practices to related existing standards, guidelines and
schemes.


The study is mainly targeted at IoT software developers, integrators and platform and system
engineers and aims to serve as a point of reference for secure IoT development. Security
considerations and guidelines for all phases of software development are provided, starting from
requirements, software design and development/implementation, all the way to testing and
acceptance, integration and deployment, as well as maintenance and disposal.

The study underlines the need to consider end-to-end IoT security, not only focusing on smart
devices, network protocols and communications, but also taking a step back and methodically
integrating cybersecurity by design principles throughout the software development lifecycle.

Lea aquí el experto completo

Fecha de publicaciónAño 2019

BELT.ES no se hace responsable de las opiniones de los artículos reproducidos en nuestra Revista de Prensa, ni hace necesariamente suyas las opiniones y criterios expresados. La difusión de la información reproducida se realiza sin fines comerciales. 

Listado de Expertos

Recomendado

Profesión militar: Obediencia debida frente a la obligación de disentir

Con ocasión de la realización de estudios en el Instituto Universitario Gutiérrez Mellado tuve la ocasión de leer y analizar una serie de documentos de opinión que trataban en profundidad las diferentes facetas presentes en el campo de las relaciones cívico-militares; temas que , habitualmente, no han estado presentes en los diferentes cursos y actividades formativas en la enseñanza militar, ni, por supuesto, en la civil.

UME, para servir

Uno se pregunta, al ver las estadísticas de bajas, por qué no funcionarán los gobernantes con la misma prontitud y eficacia que los militares. Circula un video en el que un general, a pesar de la mascarilla, explica claramente el funcionamiento de las Unidades militares; una perfecta organización en la que un estado mayor planea y dirige las operaciones en curso, mientras otro va programando las operaciones futuras. Todo un engranaje funcionando con eficacia, en silencio y sin alardes, donde cada elemento sabe lo que tiene que hacer y cómo hacerlo, sacando el máximo rendimiento de sus escasos medios, y a pesar de lo imprevisto y desconocido de un enemigo que dio la cara cuando ya estaba dentro.

¿Qué tipos de mascarillas hay? ¿Puedo reutilizarlas? ¿Hay para niños?

Hay tres tipos diferentes: higiénicas, quirúrgicas y de alta eficacia. El BOE acaba de publicar una orden...

Últimas noticias

Over Half of Universities Suffered Data Breach in Past Year

Over half (54%) of UK universities reported a data breach to the regulator in the past 12...

Renace el interés por la energía del mar

La energía de los mares podría empezar a aprovecharse mucho más. En Estados Unidos se preparan ya dos proyectos de tecnología innovadora...

Isabel de Castilla

Para algunos, Isabel de Trastámara es el tótem absoluto de las virtudes patrias; para otros, una mera usurpadora que se sentó en...

Crean y fabrican el primer material que no se corta

Ingenieros alemanes e ingleses han desarrollado y producido el primer material que no se corta. Se compone de aluminio poroso y cerámica,...

Manual de derrumbes: Una guía para entender todo sobre los derrumbes

IntroducciónEste manual pretende ser un recurso para que las personas afectadas por deslizamientos de tierra adquieran nuevos conocimientos, especialmente sobre las condiciones...