INDEX

Identity and Authentication for the IoT

by Michela Menting | 1Q 2016 | IN-3979

The Cloud Security Alliance (CSA) released a Summary Guidance back in September 2015 on Identity and Access Management (IAM) for the IoT. In the document, the CSA raises the issue of properly identifying things, in order to enable authentication, encryption, and data integrity in an ecosystem. Also known as the Identity of Things (IDoT), the CSA brings up an important issue in the continued expansion of the IoT; the need to create an identity to newly connected things. Identity is crucial for binding credentials, which in turn can enable the use of the foundational information security concepts that are confidentiality, integrity, availability, authentication, and non-repudiation. An identity can allow operators to manage IoT devices, define access, set policies, and secure communications in order to protect devices and data. The issue that needs to be currently resolved for the IDoT is how to define the credential and the accompanying authentication and encryption services.

You must be a subscriber to view this Insight.

To find out more about subscribing:
Contact a representative about purchasing options.