Identity and Authentication for the IoT
The Cloud Security Alliance (CSA) released a Summary Guidance back in September 2015 on Identity and Access Management (IAM) for the IoT. In the document, the CSA raises the issue of properly identifying things, in order to enable authentication, encryption, and data integrity in an ecosystem. Also known as the Identity of Things (IDoT), the CSA brings up an important issue in the continued expansion of the IoT; the need to create an identity to newly connected things. Identity is crucial for binding credentials, which in turn can enable the use of the foundational information security concepts that are confidentiality, integrity, availability, authentication, and non-repudiation. An identity can allow operators to manage IoT devices, define access, set policies, and secure communications in order to protect devices and data. The issue that needs to be currently resolved for the IDoT is how to define the credential and the accompanying authentication and encryption services.
To find out more about subscribing:
- Expectations and Considerations for the Identity of Things
- Biometric Payments
- Mobile Ticketing: The Diversification Opportunity
- Why Mobile Ticketing Needs to be More than A Virtualization Tool
- Did Apple Miss the Bus - The Display-Integrated Fingerprint Sensor Gives the Industry a Much-Needed Push