2020
DOI: 10.6028/nist.ir.8259c-draft
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Foundational Cybersecurity Activities for IoT Device Manufacturers C

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…For more information on IoT device security and privacy considerations, see NISTIR 8228, Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks [3]. For a more comprehensive catalog of non-technical supporting capabilities, see the IoT Device Cybersecurity Requirements Catalogs [4]. Device cybersecurity capabilities and non-technical supporting capabilities can be derived or collected from many sources.…”
Section: Call For Patent Claimsmentioning
confidence: 99%
“…For more information on IoT device security and privacy considerations, see NISTIR 8228, Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks [3]. For a more comprehensive catalog of non-technical supporting capabilities, see the IoT Device Cybersecurity Requirements Catalogs [4]. Device cybersecurity capabilities and non-technical supporting capabilities can be derived or collected from many sources.…”
Section: Call For Patent Claimsmentioning
confidence: 99%
“…This publication uses concepts from the NIST Risk Management Framework, specifically publications such as NIST SPs 800-18 [2], 800-30 [3], 800-37 [4], 800-39 [5], 800-53 [6], 800-60 [7], 800-82 [8], and 800-160 v1 [9] and v2 [10] as well as the NIST Cybersecurity Framework [11]. It also follows from the foundational cybersecurity for IoT work from NIST documented in NISTIR 8228 [12]and the NISTIR 8259 series [13,14,15,16,17]. Details on the relationship to these other publications is in Section 2.…”
Section: Relationship To Other Publicationsmentioning
confidence: 99%
“…The process of profiling tailors and/or extends the IoT core baselines and can be performed at any level of specificity, even to an individual customer (e.g., federal agency). NISTIR 8259C, Creating a Profile Using the IoT Core Baseline and Nontechnical Baseline [16], discusses this process of profiling the IoT core baselines to identify IoT device requirements that best meet the customer's cybersecurity needs and goals.…”
mentioning
confidence: 99%