• About
  • Subscribe
  • Contact
Saturday, May 10, 2025
    Login
FutureIOT
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
No Result
View All Result
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
No Result
View All Result
FutureIOT
No Result
View All Result
Home Technology Governance, Standards and Regulations

Guide for assessing security maturity of industrial IoT systems launched

Eden Estopace by Eden Estopace
March 4, 2019
PHOTO by Isaque Pereira from Pexels

PHOTO by Isaque Pereira from Pexels

Fresh from joining forces with the OpenFog Consortium, the Industrial Internet Consortium (IIC) has launched the Security Maturity Model (SMM) Practitioner’s Guide, which provides a detailed guidance for assessing and managing the security maturity of Internet of Things  (IoT) systems.

IIC said that as organizations connect their systems to the internet, they become vulnerable to new threats, and they are rightly concerned with security.

Building on concepts identified in the IIC Industrial Internet Security Framework published in 2016, the SMM Practitoner’s Guide defines levels of security maturity for a company to achieve based on its security goals and objectives as well as its appetite for risk.

“This is the first model of its kind to assess the maturity of organizations’ IoT systems in a way that includes governance, technology and system management,” said Stephen Mellor, CTO of IIC.

The guide includes descriptions of scenarios and what must be done to reach a given security comprehensiveness for each security domain, subdomain and practice.

An example given is an automotive manufacturer considering the possible threats interfering with the operations of a vehicle key fob.

The manufacturer sets its target maturity comprehensiveness level to “1” as it considers some IT threats, such as a Denial of Service attack that may prevent a driver from opening the car door using the key fob.

Over time, as new threats emerge, the manufacturer realizes it needs additional threat modeling and enhanced practices so raises its target maturity comprehensiveness level to a higher level “2.”

Along with the publication of the SMM Practitioner’s Guide is an update to the IoT SMM: Description and Intended Use White Paper, which provides an introduction to the concepts and approach of the SMM.

The white paper has been updated for consistency with the SMM Practitioner’s Guide, including revised diagrams and updated terminology, according to the IIC.

The IIC said it is collaborating with various industry groups to develop industry profiles that extend the model. 

In a news release, Moscow-based cybersecurity and anti-virus provider Kaspersky Lab said it had joined forces with industry leaders in developing the SMM Practitioner’s Guide.

“The prioritization of security measures, goal setting, and the development of a strategy for making a system “secure enough” is an objective that affects organizations’ long-term economic planning, along with investment, the choice of insurance program, or any other task with conflicting stimuli,” said Ekaterina Rudina, senior system analyst at Kaspersky Lab ICS CERT.

Related:  Securing the software-defined vehicle
Tags: IICIndustrial IoTInternet of ThingsIoTOpenFogPractioners GuideSecurity Maturity Model Practitioner's GuideTechnology
Eden Estopace

Eden Estopace

No Result
View All Result

Recent Posts

  • Standardisation and tech are keys to unlocking growth in Asia's supply chains
  • AI to fuel the rise of zero touch networks
  • Surge in ambient IoT to pave the way for sustainable tech
  • Imbibing AI skills into Singapore’s future workforce today
  • Asia Pacific's AI ambitions hinge on next-generation networks

Categories

  • Agriculture
  • AI and Machine Learning
  • Application
  • Application and Middleware
  • Automotive
  • Banking and Financial Services
  • Big Data and Analytics
  • Blockchain
  • Case Studies
  • Change Healthcare
  • CHRO
  • Cloud and Platforms
  • Commercial
  • Construction
  • Consumer
  • Customer Engagement
  • Devices
  • ESG
  • Future Workplace
  • FutureCOO
  • Governance, Standards and Regulations
  • Government, Healthcare and Education
  • Hospitality and Tourism
  • Industrial
  • Industry
  • IT-OT integration
  • Manufacturing
  • Networking
  • Operations
  • Research and Development
  • Retail and E-commerce
  • Security
  • Sensors and Instrumentation
  • Smart Cities
  • smart contracts
  • Smart Home
  • Start-ups
  • Supply chain
  • Technology
  • Telecommunications
  • TIBCO
  • Transportation and Logistics
  • Videos
  • Whitepapers

About FutureIoT

Asia’s ONLY dedicated IoT publication

The race to harness the power of Internet of Things (IoT) is here. FutureIoT is dedicated to individuals, as well as public and private organizations looking to tap the potential of IoT to transform the way we live, work and do business. FutureIoT is the dedicated media that provides the single source of truth about IoT, the technology, its application and regulation, originating from Asia. << Read more >>

Quick Links

  • Subscribe
  • Contact
  • Privacy Policy
  • Cookie Policy
  • Terms of Use

Categories

Recent News

Standardisation and tech are keys to unlocking growth in Asia's supply chains

Standardisation and tech are keys to unlocking growth in Asia's supply chains

May 9, 2025
Photo by Polina Tankilevitch: https://www.pexels.com/photo/hand-of-a-woman-showing-palm-with-a-word-no-4830656/

AI to fuel the rise of zero touch networks

May 8, 2025
  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe