Shopping Cart

No products in the cart.

BS ISO/IEC 27403:2024

$189.07

Cybersecurity. IoT security and privacy. Guidelines for IoT-domotics

Published By Publication Date Number of Pages
BSI 2024 48
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
2 undefined
7 Foreword
8 Introduction
9 1 Scope
2 Normative references
3 Terms and definitions
10 4 Abbreviated terms
5 Overview
5.1 General
5.2 Features
12 5.3 Stakeholders
5.4 Life cycles
13 5.5 Reference model
16 5.6 Security and privacy dimensions
6 Guidelines for risk assessment
6.1 General
17 6.2 Sources of security risks
6.2.1 Security risks for service sub-systems
18 6.2.2 Security risks for IoT-domotics gateway
20 6.2.3 Security risks for IoT-domotics devices and physical entities
21 6.2.4 Security risks for networks
6.3 Sources of privacy risks
6.3.1 Privacy risks for service sub-systems
22 6.3.2 Privacy risks for IoT-domotics gateway
24 6.3.3 Privacy risks for IoT-domotics devices and physical entitles
6.3.4 Privacy risks for networks
25 7 Security and privacy controls
7.1 Principles
7.1.1 General
7.1.2 Different levels of security for different services
7.1.3 Easy security settings for users
7.1.4 Failsafe domotics devices
7.1.5 Restricted access to content services
7.1.6 Consideration for children
7.1.7 Scenario-specific privacy preferences
26 7.2 Security controls
7.2.1 ​Policy for IoT-domotics security
7.2.2 Organization of IoT-domotics security
7.2.3 Asset management
7.2.4 Equipment and assets located outside physical secured areas
7.2.5 Secure disposal or re-use of equipment
27 7.2.6 Learning from security incidents
7.2.7 Secure IoT-domotics system engineering principles
7.2.8 Secure development environment and procedures
28 7.2.9 Security of IoT-domotics systems in support of safety
7.2.10 Security in connecting varied IoT-domotics devices
7.2.11 ​Verification of IoT-domotics devices and systems design
7.2.12 ​Monitoring and logging
7.2.13 Protection of logs
7.2.14 Use of suitable networks for the IoT-domotics systems
7.2.15 Secure settings and configurations in delivery of IoT-domotics devices and services
29 7.2.16 User and device authentication
7.2.17 Provision of software and firmware updates
7.2.18 Sharing vulnerability information
7.2.19 Security measures adapted to the life cycle of IoT-domotics system and services
7.2.20 Guidance for IoT-domotics users on the proper use of IoT-domotics devices and services
30 7.2.21 Determination of security roles for stakeholders
7.2.22 Management of vulnerable devices
7.2.23 Management of supplier relationships in IoT-domotics security
7.2.24 Secure disclosure of Information regarding security of IoT-domotics devices
7.3 Privacy controls
7.3.1 Prevention of privacy invasive events
7.3.2 IoT-domotics privacy by default
31 7.3.3 Provision of privacy notice
7.3.4 ​Verification of IoT-domotics functionality
7.3.5 Consideration of IoT-domotics users
7.3.6 Management of IoT-domotics privacy controls
32 7.3.7 Unique device identity
7.3.8 Fail-safe authentication
7.3.9 Minimization of indirect data collection
7.3.10 Communication of privacy preferences
7.3.11 ​Verification of automated decision
7.3.12 Accountability for stakeholders
7.3.13 Unlinkability of PII
33 7.3.14 Sharing information on PII protection measures of IoT-domotics devices
34 Annex A (informative) Use cases of IoT-domotics
39 Annex B (informative) Security and privacy concerns from stakeholders
43 Annex C (informative) Security and privacy responsibilities of stakeholders
45 Annex D (informative) Security measures for different types of IoT-domotics devices
47 Bibliography
BS ISO/IEC 27403:2024
$189.07