SLIDE 6 ‹#›
- The objective of the Guidelines is to show required basic security protections for
IoT based on “Security by Design Principle” and to lead IoT stakeholders to take proactive actions in industries with consideration of specific natures of IoT. It also aims to create an environment where users can utilize IoT devices, systems, and services securely.
- The objective of the Guidelines is not to clarify all the legal responsibility of the
stakeholders when they are involved in a cyber security incident but to promote their awareness of necessity of IoT security protections and to lead them to share necessary information among the stakeholders.
- The objective of the Guidelines is to expect the stakeholders to consider
appropriate security protections based on what they must protect and risks they face, rather than to require the stakeholders to take a single standardized security protection.
IoT Acceleration Consortium, Ministry of Internal Affairs and Communications, and Ministry of Economy, Trade and Industry published the IoT Security Guidelines on 5th July in 2016. The guidelines has the following objective.
IoT Security Guidelines in Japan and the Objective
‹#›
Phases Guidelines Main points
Policies Establish basic policies based on the nature of IoT
- Commit to IoT security by management teams
- Prepare for internal fraud or human error
Analysis Recognize security risks
- f IoT
- Identify what should be protected
- Assume risks resulting from connections
Design Consider a design to protect what should be protected
- Consider a design that does not cause any trouble to connected
counterparts
- Evaluate and verify a design to ensure safety and security
Implement ation and connection Consider Protections on Network Side
- Connect IoT devices to the network properly based on the function and
purpose
- Keep initial settings in mind
Operation and maintenan ce Maintain a safe and secure state and transmit and share information
- Maintain a safe and secure state after shipping and releasing
- Grasp all IoT risks after shipping and releasing, and advise all
stakeholders of what to be observed
- Recognize each stakeholder's roles in IoT systems and services
- Evaluate vulnerable devices and give appropriate cautions
Recommendations for General Public
- Refrain from purchasing and using devices or services for which those
call centers or support services are not available
- Pay attention to initial settings
- Turn off the power of devices if they are no longer in use
- Delete all data when disposing of devices
- This guidelines specifies rules for providers of IoT devices, systems and services on each
step of their required operations (policies, analysis, design, implementation, connection,
- peration and maintenance)
Overview of IoT Security Guidelines
‹#›
- Make initial settings with consideration of security at the time of constructing or using IoT systems or
services so that the systems or services will not become vulnerable and easy targets of external
- attacks. Alert users to initial settings.
- Design IoT systems and services with consideration of the network configurations and security
functions based on the functions, the applications and the computing performance. Consider security protections on the higher level such as network connections through IoT secure gateways when security protections are not achievable on individual IoT devices due to the limited computing performance.
- Keep initial settings in mind
Example of Secure Network Connection for IoT Devices
Secure device
IoT Secure gateway
User
Virtualizati
devices
Manufacturers and venders
The Internet
Devices that protect their own security Devices that cannot maintain sufficient security
Firmware Update
- Connect IoT devices to the network properly based on the function and purpose
[Implementation & Connection] Guideline 4: Consider Protections on Network Side
‹#›
- Turn off the power if devices are no longer in use. Otherwise, these devices could be unlawfully used if they remain
connected to the Internet.
- Turn off the power if devices are no longer in use
- Dispose devices carefully to avoid information leakage to others. Delete all information before disposing of or selling
the devises.
- Delete all data when disposing of devices
- When using a device for the first time, make ID and password settings properly for the device. Do not leave the factory
default setting password as it is, do not share a password with other people, and do not reuse the same password for any other device.
- Follow the procedure in the instruction manual and try updating.
- Pay attention to the initial settings
- Refrain from purchasing and using devices or services for which no inquiry or support service is available
- It will be difficult to respond properly to problems of devices connected to the Internet if there are no service
inquiry or support desks for the devices. Refrain from purchasing and using devices or services for which have no inquiry or support service available.
Attention! Maintenance service will be expired within 3 years.
Recommendations for the General Public