CSA Guide To The IoT Security Controls Framework Version 2
CSA Guide To The IoT Security Controls Framework Version 2
Security Controls
Framework Version 2
The permanent and official location for Cloud Security Alliance Internet of Things research is
https://cloudsecurityalliance.org/working-groups/internet-of-things/
© 2021 Cloud Security Alliance – All Rights Reserved. You may download, store, display on your
computer, view, print, and link to the Cloud Security Alliance at https://cloudsecurityalliance.org
subject to the following: (a) the draft may be used solely for your personal, informational, non-
commercial use; (b) the draft may not be modified or altered in any way; (c) the draft may not be
redistributed; and (d) the trademark, copyright or other notices may not be removed. You may quote
portions of the draft as permitted by the Fair Use provisions of the United States Copyright Act,
provided that you attribute the portions to the Cloud Security Alliance.
Contributors:
Renu Bedi
Ramon Codina
Umesh Jaiswal
Raj Sachdev
Ashish Vashishtha
CSA:
Hillary Baron
AnnMarie Ulskey (Graphic Design)
• Devices
• Networks
• Gateways
• Cloud Services
Controls allocated to each layer in the architecture represent best-case security postures. In
some cases, architectural components cannot implement certain recommended controls in this
framework. In these cases, the system security architect should identify those shortcomings and
develop plans to mitigate residual risk using alternative measures.
Goal
The IoT Security Controls Framework provides a tool to evaluate implementations› security as they
progress through the development lifecycle to ensure they meet industry-specified best practices.
Target Audience
The IoT Security Controls Framework is a resource for system architects, developers, and security
engineers tasked with designing secure IoT ecosystems. IoT system evaluators such as auditors and
penetration testers may leverage the framework to validate controls and their deployed implementations.
Version 2 of the IoT Security Controls Framework evolves the Version 1 framework to better
categorize controls into a new set of domains and minimize control allocation to components
within an IoT architecture. The significant changes include developing a new domain structure and
infrastructure, explained in the pages below.
• Updated controls: All controls have been reviewed and updated for technical clarity.
• New domain structure: Control domains have been reviewed and updated to better
categorize each control.
• New legal domain: Introduces relevant legal controls.
• New security testing domain: Introduces security testing of architectural allocations.
• Simplified infrastructure allocations: Device types have been consolidated to a single
category to simplify the distribution of controls to architectural components.
Review each of the resulting controls in Column F and review any additional guidance in Column J.
Columns O, P, Q, and R include a tool for allocating controls to different architectural components.
These columns allow users to filter controls based on whether they apply to the device, the network
that hosts the device, a gateway, or cloud services.
Users can also understand how to implement each control using columns L, M, and N. These
columns offer control-type recommendations, whether controls should be manual, automated, or a
combination of both, and how often controls should be exercised.
Following this initial process, the framework provides insight into an idealized version of a secure
baseline tailored to an IoT system architecture. Some components within an IoT architecture may
not be capable of meeting a subset of the controls. In these cases, the security architect must
understand the residual risk and identify compensating controls to mitigate that risk.
Control Domain (Column A): Organized by logical groupings of the individual security control
measures (see table below) and detailed in column F (Control), the name of each corresponding
control specification is italicized below the category of “Control Domain.”
Control Domain (Column B): Domains are categorized for filtering purposes.
Control Sub-Domain (Column C): Sub-domains provide granularity for filtering purposes.
8 IoT Device Security IOT Certified Devices, Secure Platform, Secure Configuration
Control ID (Column D): The control identification (ID) is the official identifier of a specific security
control. The ID (e.g., “RSM-01”) allows controls to be referenced elsewhere by their position in the
framework.
CCM ID (Column E): Security controls in the framework are associated, or mapped, in this column to
the identifiers from the CSA Cloud Controls Matrix (CCM). When the IoT security control is derived or
linked to a CCM control, one or more entries are identified. The associated controls involve partial to
full coverage of the control specifications in each framework.
Control Specification (Column F): Specifications are written as mitigations or countermeasures
addressing specific risk areas for an IoT system. For usability, each control is separated into a
simplified action to address unique IoT environments.
Note that when an impact level is high, all available security controls should be applied—including
those for low, moderate and high-risk levels. When an impact level is moderate, apply all controls for
moderate and low-risk levels.
1
FIPS 199: “Standards for Security Categorization of Federal Information and Information Systems,”
Federal Information Processing Standards Publication, Computer Security Division, U.S. Department
of Commerce; February 2004. https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.199.pdf
2
FIPS 200: “Minimum Security Requirements for Federal Information and Information Systems,”
Federal Information Processing Standards Publication, Computer Security Division, U.S. Department
of Commerce; March 2006. https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.200.pdf
Necessary
Type of Security Risk Impact Level Security
Risk Controls
Figure 2
Additional Direction (Column J): When assessing or implementing any of the individual security
protocols in the IoT Security Controls Framework, be sure to view this supplementary information
detailing special requirements, explanations of terms, helpful operating tips, and more.
References (Column K): Consult this section for professional source information, such as
government publications, regulatory information, and other references necessary to understand and
implement a control specification fully.
• Annually
• Quarterly
• Monthly
• Weekly
• Daily
• Event: Control performed irregularly (e.g., a software update)
• Continuously: Control performed many times per day (e.g., user access)
Implementers should consult these document sections to determine if controls are applicable at
each layer. Each column describes opportunities to create trust boundaries within IoT architecture.
Discrete controls should be applied at each layer.
Device (Column O)
Controls applied directly at the device layer that focus on the data processed, stored, and/or
generated by the device. A generic IoT device will incorporate sensors, actuators, and potentially a
minimal user interface. The device may also be capable of collecting and storing events or security
logs, using configuration files that must be integrity-protected.
Network (Column P)
At the network layer, components such as wireless access points (WAPs) support device WiFi
connectivity. Other network components may include key management servers that support
protocols such as ZigBee. Additionally, network security controls may consist of zero trust designs,
virtual local area network (VLAN) segmentation, firewalling, and intrusion detection. Consider data
encryption and integrity protection as data traverses an IoT network.
Gateway (Column Q)
The gateway represents a high potential IoT network entry point for threat actors. The gateway may
have additional security controls applied that exceed what devices typically implement.
Most IoT devices require cloud environments to operate. Devices may send data directly to the cloud
or managed through a cloud service. Data transmitted to the cloud must be protected during transit
and persistently within cloud provider storage volumes. In some cases, anonymity protections must
be applied within the cloud to ensure identities cannot be linked to IoT data.
Comms Process/Resource
User Interface Process/Resource
Comms Management User Interface
Management
Configuration File
Trust Store
Pairing Process Pairing
Authentication
Sensing Configuration File Firmware
Trust Store
Integrated
System
Figure 3
Fagan, Michael. Megas, Katerina N. Scarfone, Karen. Smith, Matthew. “IoT Device Cybersecurity
Capability Core Baseline.” https://nvlpubs.nist.gov/nistpubs/ir/2020/NIST.IR.8259A.pdf May 2020.
NISTIR 8259A, National Institute of Standards and Technology.
Boeckl, Katie. Fagan, Michael. Fisher, William. Lefkovitz, Naomi. Megas, Katerina N. Nadeau, Ellen.
Piccarreta, Ben. Gabel O’Rourke, Danna. Scarfone, Karen. “Considerations for Managing Internet
of Things (IoT) Cybersecurity and Privacy Risks.” https://nvlpubs.nist.gov/nistpubs/ir/2019/NIST.
IR.8228.pdf June 2019. NISTIR 8228, National Institute of Standards and Technology.
Iorga, Michaela. Feldman, Larry. Barton, Robert. Martin, Michael J. Goren, Nedim. Mahmoudi, Charif.
“Fog Computing Conceptual Model: Recommendations of the National Institute of Standards and
Technology.” https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.500-325.pdf March
2018. NIST SP 500-325, National Institute of Standards and Technology.
Voas, Jeffrey. Kuhn, Richard. Laplante, Phillip. Applebaum, Sophia. “Internet of Things (IoT) Trust
Concerns.” https://csrc.nist.gov/publications/detail/nistir/8222/draft September 2018. NISTIR 8222,
National Institute of Standards and Technology.
European Union Agency for Cybersecurity (ENISA). “Good Practices for Security of IoT: Secure
Software Development Lifecycle.” https://www.enisa.europa.eu/publications/good-practices-for-
security-of-iot-1 November 2019.
European Union Agency for Cybersecurity (ENISA). “Baseline Security Recommendations for IoT
in the context of Critical Information Infrastructures.” https://www.enisa.europa.eu/publications/
baseline-security-recommendations-for-iot November 2017.
ISO/IEC JTC 1/SC 41. “Internet of Things—Reference Architecture.”
https://www.iso.org/standard/65695.html August 2018.
Microsoft Azure. “Security best practices for Internet of Things (IoT).” https://docs.microsoft.com/en-
us/azure/iot-fundamentals/iot-security-best-practices October 2018.