By the end of this chapter, you should be able to:
Compare common IoT security frameworks (NIST, OWASP, ETSI) and their scopes
Classify OWASP IoT Top 10 vulnerabilities and map them to real-world attacks
Select appropriate standards for specific IoT use cases based on industry and region
Evaluate industry security certification requirements against product needs
Navigate compliance landscapes (GDPR, CCPA, PSTI) and determine applicable regulations
In 60 Seconds
IoT security frameworks — NIST CSF, IEC 62443, OWASP IoT Top 10, and ETSI EN 303 645 — provide structured, systematic approaches to identifying, implementing, and evaluating security controls that go beyond ad-hoc measures. Each framework addresses a different aspect of IoT security, and understanding when to apply which framework is as important as knowing the frameworks themselves.
For Beginners: IoT Security Frameworks and Standards
Security frameworks and standards provide structured approaches to protecting IoT systems. Think of them as building codes for digital security – just as building codes ensure houses are structurally safe, security frameworks ensure IoT systems follow proven practices for protecting data and devices against threats.
Sensor Squad: The Rule Books for Safety!
“Building codes make sure houses do not fall down,” Max the Microcontroller explained. “Security frameworks do the same thing for IoT! They are like official rule books that tell you exactly how to build safe systems. The big ones are NIST, OWASP, and ETSI.”
Sammy the Sensor nodded. “OWASP has the IoT Top 10 – a list of the ten most dangerous mistakes. Number one? Weak or default passwords! Number two? Insecure network services. It is like a ‘most wanted’ list for security bugs, and it helps you focus on fixing the worst problems first.”
“NIST is from the US government,” Lila the LED added. “Their framework has five steps: Identify your assets, Protect them, Detect when something goes wrong, Respond to incidents, and Recover afterward. It is easy to remember because it flows in order – you cannot protect what you have not identified, and you cannot respond to what you have not detected!”
“ETSI EN 303 645 is specifically for consumer IoT devices,” Bella the Battery explained. “It has thirteen rules, and the very first one is ‘no universal default passwords.’ That one rule alone would have prevented the Mirai botnet attack! Different industries have different frameworks – medical devices follow FDA rules, industrial systems follow IEC 62443, and consumer gadgets follow ETSI. Picking the right framework for your situation is the first step toward compliance.”
6.2 Standards and Certification Reference
Industry Standards Quick Reference
Understanding relevant standards helps you build compliant, secure IoT systems and accelerates certification processes.
6.2.1 Security Standards for IoT
Standard
Organization
Scope
Key Requirements
Certification Body
Year
IEC 62443
IEC
Industrial IoT & Control Systems
Defense in depth, zones, security levels 1-4
IEC, ISA
2007-2018
NIST 8259
NIST
Consumer IoT Devices
Baseline security capabilities, secure updates
NIST
2020
ETSI EN 303 645
ETSI
Consumer IoT
No default passwords, secure boot, data protection
NIST Cybersecurity Framework (CSF): A risk-based framework organising security activities into five functions: Identify, Protect, Detect, Respond, and Recover — applicable to IoT deployments of all sizes and sectors.
IEC 62443: An international standard for industrial automation and control system (IACS) security, defining security levels, zones, and conduits — the primary framework for industrial IoT and OT security.
OWASP IoT Top 10: A list of the ten most critical security risks in IoT systems, updated periodically by the Open Web Application Security Project, providing a prioritised starting point for IoT security assessment.
ETSI EN 303 645: A European standard for consumer IoT security establishing thirteen baseline requirements including no default passwords, a vulnerability disclosure policy, and secure communications.
Security maturity model: A framework assessing the sophistication of an organisation’s security practices on a scale from initial (ad-hoc) to optimised (continuous improvement), guiding security programme evolution.
Compliance vs security: The distinction between meeting regulatory or framework requirements (compliance) and actually being secure (security) — compliance provides a minimum baseline but should not be confused with comprehensive security.
6.3.1 OWASP IoT Top 10 (2018)
Rank
Vulnerability
Example
I1
Weak, Guessable Passwords
Default admin/admin
I2
Insecure Network Services
Open Telnet port 23
I3
Insecure Ecosystem Interfaces
Unprotected REST API
I4
Lack of Secure Update Mechanism
No firmware signature verification
I5
Use of Insecure Components
OpenSSL Heartbleed
I6
Insufficient Privacy Protection
Excessive data collection
I7
Insecure Data Transfer/Storage
Unencrypted Wi-Fi, plaintext DB
I8
Lack of Device Management
Can’t remotely disable compromised device
I9
Insecure Default Settings
All features enabled by default
I10
Lack of Physical Hardening
Exposed JTAG debug port
Addressing OWASP IoT Top 10
Quick fixes:
I1: Enforce strong password policy, no defaults
I2: Disable unnecessary services, use firewalls
I3: Implement API authentication (OAuth 2.0, JWT)
I4: Sign firmware with digital signatures
I5: Keep libraries updated, use dependency scanners
I6: Minimize data collection, anonymize PII
I7: Use TLS/DTLS, encrypt storage
I8: Implement remote management, kill switches
I9: Secure by default, require opt-in for features
I10: Disable debug ports, tamper-evident seals
6.3.2 NIST Cybersecurity Framework
Figure 6.1: NIST Cybersecurity Framework: Five Functions with Continuous Improvement Loop
6.3.3 IoT Security Standards
Standard
Organization
Focus
ETSI EN 303 645
ETSI (Europe)
Consumer IoT security baseline
IEC 62443
IEC
Industrial automation security
ISO/IEC 27001
ISO
Information security management
UL 2900
Underwriters Labs
Software cybersecurity testing
ioXt Alliance
Industry consortium
IoT security certification
Matter
CSA
Smart home security & interoperability
6.3.4 Regulatory Requirements
Region
Regulation
Scope
EU
GDPR
Data privacy, right to erasure
USA
IoT Cybersecurity Improvement Act
Federal device procurement
California
SB-327
Reasonable security features
UK
PSTI Bill
Default password ban
China
MLPS 2.0
Multi-level protection scheme
Quiz 3: Addressing OWASP IoT Top 10
Knowledge Check: Framework Selection
6.4 Security-by-Design Principles
⏱️ ~12 min | ⭐⭐⭐ Advanced | 📋 P11.C01.U07
Common Misconception: “We’ll Add Security After the Prototype Works”
The Misconception: Many IoT developers believe security can be “bolted on” after functionality is proven, treating it as a final polish step like UI refinement.
The Reality with Real Numbers:
Mirai Botnet (2016): Compromised 300,000+ devices that shipped with default passwords “admin/admin” - a trivial 5-minute fix during development that manufacturers skipped
Jeep Cherokee Recall (2015): $1.4 billion recall cost plus reputational damage because security wasn’t architected into the entertainment system from day one - the cellular modem had direct CAN bus access with no authentication
Verkada Cameras (2021): 150,000 cameras (hospitals, prisons, schools) breached because super admin credentials were stored in plaintext support systems - would cost $0 to hash passwords during initial database design
By the Numbers:
Retrofit cost multiplier: Adding security after deployment costs 10-100× more than building it in from start (IBM System Sciences Institute)
Average IoT breach cost: $4.24 million per incident (Ponemon 2021), with 206 days average time to identify breach
Mirai attack window: Devices compromised in <5 minutes after connecting to internet with default credentials
Patch deployment rate: Only 28% of IoT devices receive security patches within 90 days of vulnerability disclosure (Forescout 2022)
Why It Fails:
Architectural constraints: Retrofitting encryption requires CPU/memory headroom that wasn’t planned - example: cheap sensors with 32KB RAM can’t add TLS later
Backward compatibility: Deployed devices can’t change authentication schemes without breaking existing systems
Update mechanisms: You can’t add OTA updates if devices weren’t designed with secure boot and code signing
Cost explosion: Field technician visits for 8.5 million smart meters = $85-170 million (vs. $25.5 million to build security in)
The Right Approach: Treat security like power requirements or network connectivity - a non-negotiable architectural decision from requirements phase, not an optional feature.
6.4.1 Principle of Least Privilege
Concept: Grant only minimum necessary permissions
// BAD: Device has admin access to entire system// GOOD: Device can only write to its own data endpoint// Example: Scope-limited API token// Token allows: POST /devices/device123/data// Token denies: POST /devices/device456/data (different device)
6.4.2 Defense in Depth
Concept: Multiple layers of security controls
Figure 6.2: Defense-in-Depth: Six Security Layers from Physical to Monitoring
6.4.3 Secure by Default
Concept: Devices ship with secure settings
Examples:
✅ No default passwords (force change on first use)
✅ HTTPS/TLS enabled by default
✅ Unnecessary services disabled
✅ Automatic security updates enabled
// Example: Force password change on first bootvoid setup(){if(isFirstBoot()){ Serial.println("SETUP REQUIRED"); Serial.println("Create new admin password (min 12 chars):"); String newPassword = waitForUserInput();if(newPassword.length()<12){ Serial.println("ERROR: Password too short"); ESP.restart();// Force retry} saveEncryptedPassword(newPassword);}}
Minimum Viable Understanding: Secure Defaults
Core Concept: Secure defaults means devices ship in their most secure configuration out of the box, requiring users to explicitly enable risky features rather than disable insecure ones. Why It Matters: The Mirai botnet infected 300,000+ devices because manufacturers shipped them with default passwords like “admin/admin”; users rarely change defaults, so insecure defaults become permanent vulnerabilities at scale. Key Takeaway: Design IoT devices to require password creation on first boot, disable unused network services by default, enable encryption by default, and require explicit user action to enable debugging interfaces or remote access features.
6.4.4 Fail Securely
Concept: Failures should not compromise security
// BAD: Door unlocks if errorif(checkAuthorization()== ERROR){ unlockDoor();// INSECURE!}// GOOD: Door stays locked if errorif(checkAuthorization()== AUTHORIZED){ unlockDoor();}else{ logFailure(); alarmTrigger();}
6.4.5 Privacy by Design
Concept: Build privacy into system from the start
Principles:
Minimize data collection (only collect what’s necessary)
Worked Example: OWASP IoT Top 10 Compliance Audit for Smart Lock
Scenario: A smart lock manufacturer is preparing for ioXt Alliance certification. Audit the device against OWASP IoT Top 10 and calculate remediation costs.
Device: BLE-enabled smart deadbolt, $150 retail, 50,000 units deployed
OWASP Audit Results:
OWASP
Vulnerability
Current State
Risk
Remediation
Cost
I1
Weak Passwords
Default PIN: 0000
CRITICAL
Force PIN change on setup
$800 (1 day dev)
I2
Insecure Services
BLE debug mode enabled
HIGH
Disable in production builds
$400 (config change)
I3
Insecure API
Mobile app: no rate limiting
MEDIUM
Add API throttling
$2,400 (2 days)
I4
No Secure Updates
Firmware unsigned
CRITICAL
Implement code signing
$9,600 (8 days)
I5
Insecure Components
OpenSSL 1.0.1 (Heartbleed)
HIGH
Update to OpenSSL 3.0
$3,600 (3 days)
I7
Insecure Storage
PINs in plaintext
CRITICAL
Hash PINs with bcrypt
$1,200 (1 day)
Total Remediation Cost: $18,000 (15 days development)
Result: 80.8% compliance (below 100% required for CE marking - must fix the gap)
In practice: NIST Tier scoring identifies weaknesses across the security lifecycle. A Tier 1 “Respond” score means incident response is ad-hoc - if a breach occurs, response will be chaotic and expensive. Prioritize investment to bring all functions to at least Tier 2. Compliance coverage below 100% means product cannot legally ship in regulated markets (EU, medical, government).
Common Mistake: Pursuing Certifications Without Fixing Underlying Issues
Mistake: Companies seek ioXt or ISO 27001 certification but don’t fix fundamental vulnerabilities, viewing certification as a marketing checkbox.
Reality Check:
ioXt Alliance: Requires passing OWASP IoT Top 10 audit + penetration testing. No “participation trophy.”
ISO 27001: Requires implemented ISMS, not just documented policies.
Failed Example: Company paid $40K for ISO 27001 “certification” from uncredited consultant. Passed audit on paper (documented policies) but: - Devices still had default passwords - No encryption implemented - Pentest revealed 23 critical vulnerabilities
Real audit (ioXt): Failed immediately, $40K wasted
Correct Approach: Fix vulnerabilities FIRST (costs $15K-50K), THEN pursue certification ($10K-30K). Total: $25K-80K for REAL security + credible certification.
Key Lesson: Certification proves security, it doesn’t create security. Fix issues before spending on audits.
Concept Relationships
Understanding how security frameworks interconnect:
Framework
Scope
Overlaps With
Unique Strength
When to Use
OWASP IoT Top 10
Common vulnerabilities
ETSI EN 303 645 (Provisions 1, 3, 4, 5)
Real-world attack prioritization
Development checklists, code reviews
NIST Cybersecurity Framework
Five functions (Identify, Protect, Detect, Respond, Recover)
ISO 27001 (ISMS), IEC 62443 (industrial)
Continuous improvement cycle, risk-based
Enterprise IoT programs, compliance baselines
ETSI EN 303 645
13 consumer IoT provisions
OWASP (vulnerability focus), NIST (framework)
EU regulatory requirement, market access
Consumer IoT products (smart home, wearables)
IEC 62443
Industrial security levels (SL 1-4)
NIST SP 800-53 (government), ISA/IEC standards
Zone-and-conduit architecture, OT focus
Industrial IoT, critical infrastructure, SCADA
ISO 27001
Information security management system
All frameworks (process layer)
Third-party audit, certification
Enterprise procurement, contractual requirements
Key Insight: Frameworks are complementary, not competitive. OWASP identifies what to fix, NIST defines how to organize security, ETSI mandates compliance, IEC 62443 specifies industrial requirements. Use multiple frameworks together.
1. Selecting a framework based on familiarity rather than applicability
Applying NIST CSF (designed for enterprise IT) to an industrial control system when IEC 62443 exists specifically for that context produces a compliance programme that misses ICS-specific threats. Choose the framework most appropriate for the deployment context.
2. Treating framework compliance as the security goal
Frameworks define minimum baselines. A system that complies with ETSI EN 303 645’s thirteen requirements may still have significant vulnerabilities not covered by the standard. Use frameworks as a floor, not a ceiling.
3. Not mapping between frameworks when multiple apply
Deployments subject to multiple frameworks (NIST CSF + IEC 62443 + GDPR) may have overlapping or conflicting requirements. Create a control mapping that satisfies all applicable frameworks with a single set of controls rather than implementing each framework in isolation.
4. Implementing frameworks without operational ownership
A framework implementation without defined owners for each control domain (who maintains access control lists, who reviews logs, who manages certificates) will decay to non-compliance within months of the initial implementation.