Date Published: May 3, 2023
Comments Due: June 20, 2023 (public comment period is CLOSED)
Email Questions to:
iot-onboarding@nist.gov
The National Cybersecurity Center of Excellence (NCCoE) has published a preliminary public draft of NIST SP 1800-36B-E: Trusted Internet of Things (IoT) Device Network-Layer Onboarding and Lifecycle Management. The comment period is open until June 20, 2023.
About the Project
Provisioning network credentials to IoT devices in an untrusted manner leaves networks vulnerable to having unauthorized IoT devices connect to them. It also leaves IoT devices vulnerable to being taken over by unauthorized networks. Instead, trusted, scalable, and automatic mechanisms are needed to safely manage IoT devices throughout their lifecycles, beginning with secure ways to provision devices with their network credentials—a process known as trusted network-layer onboarding. Trusted network-layer onboarding, in combination with additional device security capabilities such as device attestation, application-layer onboarding, secure lifecycle management, and device intent enforcement could improve the security of networks and IoT devices.
This practice guide aims to demonstrate how organizations can protect both their IoT devices and their networks. The NCCoE is collaborating with product and service providers to produce example implementations of trusted network-layer onboarding and capabilities that improve device and network security throughout the IoT-device lifecycle to achieve this.
Join the IoT Community of Interest
If you have expertise in IoT and/or network security and would like to help shape this project, consider joining the IoT Onboarding Community of Interest. Contact the project team at iot-onboarding@nist.gov declaring your interest.
None selected
Publication:
Preliminary Drafts and Project homepage
Supplemental Material:
None available
Document History:
12/05/22: SP 1800-36 (Draft)
05/03/23: SP 1800-36 (Draft)
10/31/23: SP 1800-36 (Draft)
05/31/24: SP 1800-36 (Draft)
access authorization, access control, asset management, roots of trust
Technologies Applications Laws and Regulations