Identity and Authentication for the IoT
The Cloud Security Alliance (CSA) released a Summary Guidance back in September 2015 on Identity and Access Management (IAM) for the IoT. In the document, the CSA raises the issue of properly identifying things, in order to enable authentication, encryption, and data integrity in an ecosystem. Also known as the Identity of Things (IDoT), the CSA brings up an important issue in the continued expansion of the IoT; the need to create an identity to newly connected things. Identity is crucial for binding credentials, which in turn can enable the use of the foundational information security concepts that are confidentiality, integrity, availability, authentication, and non-repudiation. An identity can allow operators to manage IoT devices, define access, set policies, and secure communications in order to protect devices and data. The issue that needs to be currently resolved for the IDoT is how to define the credential and the accompanying authentication and encryption services.
To find out more about subscribing:
- Next-Generation Physical Access Control Technologies and Opportunities
- Why Operators Should Reposition as “eSIM Companies”
- TfL Figures Demonstrate the Mobile Potential
- FPC Brings China’s First Biometric Contactless Payment Card: What Does the Future Hold?
- What is The True Cost of Rectifying a Security Flaw/Breach?