Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

SP 1800-15(Draft)

Securing Small Business and Home Internet of Things (IoT) Devices: Mitigating Network-Based Attacks Using Manufacturer Usage Description (MUD)

Date Published: April 2019
Comments Due: June 24, 2019 (public comment period is CLOSED)
Email Questions to: mitigating-iot-ddos-nccoe@nist.gov

Planning Note (4/24/2019): This preliminary draft is stable but has some gaps in its content that will be addressed in the next draft.

Author(s)

Donna Dodson (NIST), W. Polk (NIST), Murugiah Souppaya (NIST), William Barker (Dakota Consulting), Eliot Lear (Cisco), Brian Weis (Cisco), Yemi Fashina (MITRE), Parisa Grayeli (MITRE), Joshua Klosterman (MITRE), Blaine Mulugeta (MITRE), Mary Raguso (MITRE), Susan Symington (MITRE), Dean Coclin (DigiCert), Clint Wilson (DigiCert), Tim Jones (ForeScout), Jaideep Singh (Molex), Darshak Thakore (CableLabs), Mark Walker (CableLabs), Drew Cohen (MasterPeace)

Announcement

The National Cybersecurity Center of Excellence (NCCoE) has published a preliminary draft practice guide, SP 1800-15, “Securing Small- Business and Home Internet of Things (IoT) Devices: Mitigating Network-Based Attacks Using Manufacturer Usage Description (MUD),” and is seeking the public's comments on the contents. The popularity of IoT devices is growing rapidly, as are concerns over their security. IoT devices are often vulnerable to malicious actors who can exploit them directly and use them to conduct network-based attacks. SP 1800-15 describes for IoT product developers and implementers an approach that uses MUD to automatically limit IoT devices to sending and receiving only the traffic that they require to perform their intended functions.

We will use this feedback to help shape the next version of this document.

NOTE:  A call for patent claims is included on page v of 1800-15B. For additional information, see the Information Technology Laboratory (ITL) Patent Policy--Inclusion of Patents in ITL Publications.

Abstract

Keywords

botnets; internet of things; IoT; manufacturer usage description; MUD; router; server; software update server; threat signaling
Control Families

Access Control; Configuration Management; Risk Assessment; System and Communications Protection; System and Information Integrity;