The European Telecommunications Standards Institute (ETSI) has released guidelines aimed at bolstering the cybersecurity and data protection of consumer IoT devices.
With an increasing number of household devices being connected to the internet, these guidelines serve as a timely reminder of the vulnerabilities that come with convenience and connectivity.
“Consumers are increasingly dependent on connected devices for secure transactions, making it crucial for manufacturers to earn that trust—prioritising security by design,” said Jan Ellsberger, Director General at ETSI.
“These guidelines aim to address the most significant vulnerabilities and I am confident that they help create a safer IoT ecosystem, so long as we remain vigilant—knowing full well that this work is never ‘done’.”
Addressing basic consumer IoT security flaws
The document stresses that it does not intend to provide exhaustive solutions to every security, data protection, and privacy concern related to consumer IoT. Instead, it targets the most pressing and widespread vulnerabilities by offering a “baseline level of security and data protection”.
According to the report, this baseline is designed to protect against “elementary attacks on fundamental design weaknesses, such as the use of easily guessable passwords”.
The scope of the document covers a myriad of consumer IoT devices, ranging from smart home assistants and connected appliances to wearable health trackers and smart cameras.
In particular, the guidelines take into account the constraints of device resources, which can affect security capabilities, as noted in the report: “Typical device resources that might constrain the security capabilities are energy supply, communication bandwidth, processing power or (non-)volatile memory capacity”.
Proactive measures for vulnerability management
A significant section of the guidelines centres on vulnerability management. ETSI asserts the necessity for manufacturers to maintain a “duty of care to consumers and third parties” by implementing a Coordinated Vulnerability Disclosure (CVD) programme.
This CVD initiative is aimed at ensuring manufacturers are prepared to handle security vulnerabilities responsibly, thus safeguarding their products against malicious exploitation.
The guidelines recommend manufacturers publish a “vulnerability disclosure policy,” stipulating – at a minimum – contact information for reporting issues, timelines for acknowledging receipt of vulnerability reports, and status updates. This transparency is considered vital to maintaining trust and efficacy in vulnerability management.
Keeping consumer IoT software updated
ETSI highlights the importance of keeping software updated with the latest security patches. The document underscores the manufacturer’s role in ensuring that “all software components in consumer IoT devices that are not immutable due to security reasons should be securely updateable”. Manufacturers are urged to separate security updates from feature updates to avoid complications and ensure timely delivery.
As consumer devices become more embedded in critical aspects of life, the provision for updates is deemed crucial for maintaining security. “Security updates shall be timely,” the document mandates, acknowledging the inherent complexities involved in timely update deployments.
Ensuring data protection
In addition to cybersecurity, data protection remains a focal point of the ETSI guidelines. With many IoT devices processing personal data, the importance of securing this information cannot be overstated.
ETSI’s guidelines assert the need for manufacturers to provide “clear and transparent information about what personal data is processed and for what purposes”.
IoT product developers are encouraged to put mechanisms in place for users to withdraw consent for data processing, ensuring adherence to regulatory requirements and the protection of personal data.
The document also stipulates that data collection should be limited to what is necessary for the intended functionality, championing the use of anonymisation techniques to safeguard user privacy.
Securing communication and storage
One of the key provisions is the secure communication and storage of critical security parameters. The ETSI guidelines insist that “sensitive security parameters in persistent storage shall be stored securely by the consumer IoT device”.
Using mechanisms such as encrypted storage and secure elements, manufacturers are expected to mitigate risks associated with security parameter compromise.
Furthermore, ETSI places importance on the secure communication of consumer IoT devices, stating that these devices “shall use best practice cryptography to communicate securely”.
By prioritising the use of evaluated cryptographic implementations, the guidelines aim to ensure secure data handling across networked interfaces.
Building resilience against outages
The resilience of consumer IoT devices against outages, be it in data networks or power, is another critical aspect addressed by the guidelines.
Products are expected to “remain operating and locally functional in the case of a loss of network access and should recover cleanly in the case of restoration of a loss of power”. This provision is particularly significant in maintaining consumer trust and avoiding safety implications associated with device outages.
As IoT becomes further entrenched in essential personal and societal functions, resilience against disruptions remains paramount.
The guidelines emphasise orderliness during network reconnections and promoting systems that minimise simultaneous requests from IoT devices, thereby reducing the risk of service denials.
Call to action for consumer IoT manufacturers
With a focus on strengthening foundational security principles, ETSI’s guidelines aim to assist manufacturers in fostering safer and more reliable IoT ecosystems.
The report concludes with a note of caution and anticipation, hinting that as security measures improve, future revisions of the guidelines may mandate currently recommended provisions.
By setting these standards, ETSI is paving the way for a more secure IoT future, where the benefits of connectivity do not come at the expense of safety and privacy.
(Image by Pete Linforth)
See also: Jailbreaking AI robots: Researchers sound alarm over security flaws
Want to learn about the IoT from industry leaders? Check out IoT Tech Expo taking place in Amsterdam, California, and London. The comprehensive event is co-located with other leading events including Cyber Security & Cloud Expo, AI & Big Data Expo, Intelligent Automation Conference, Edge Computing Expo, and Digital Transformation Week.
Explore other upcoming enterprise technology events and webinars powered by TechForge here.