Committed to connecting the world

  •  
ITU GSR 2024

ITU-T work programme

[2022-2024] : [SG17] : [Q6/17]

[Declared patent(s)]

Work item: X.1355 (ex X.ra-iot)
Subject/title: Security risk analysis framework for Internet of things devices
Status: Determined on 2024-09-06 [Issued from previous study period]
Approval process: TAP
Type of work item: Recommendation
Version: New
Equivalent number: -
Timing: 2024-09 (Medium priority)
Liaison: ISO/IEC JTC 1/SC 27/WG 1, ISO/IEC JTC 1/SC 27/WG 4
Supporting members: Hitachi, Ltd., KDDI Corporation
Summary: The Internet of things (IoT) encompasses diverse applications in sectors, e.g., healthcare, transportation, industrial control systems, smart cities, and smart homes. It is pivotal in enabling advanced services by connecting physical and virtual entities. However, IoT devices are susceptible to cyberattacks due to their function in collecting, processing, and transmitting sensitive data within the IoT environment. Security breaches in IoT devices can yield severe repercussions, including unauthorized information access, disruption of vital services, financial ramifications, and even physical harm. Hence, the imperative lies in protecting data and safeguarding IoT systems by ensuring their security. Adopting a risk management approach is imperative in securing IoT devices, similar to practices in IT security. A robust risk management strategy entails identifying potential threats, assessing their likelihood and impact, and systematically mitigating them. This method not only facilitates prioritizing risks and compliance with regulations but also fosters stakeholder confidence and enhances resilience to emergent threats. Risk analysis is the cornerstone of this vital process, serving as the initial step toward fortifying the IoT environment. This Recommendation establishes a comprehensive security risk analysis framework tailored to IoT devices. The framework encompasses defining the analysis target, identifying potential threats, and evaluating these threats to develop effective mitigation strategies. It provides a systematic approach for stakeholders to assess and address security risks associated with IoT devices, whether they possess communication, actuation, sensing, data processing, or data storage capabilities. It is adaptable across diverse industries and various types of IoT devices, thereby endorsing the implementation of secure IoT solutions through rigorous risk analysis and the mitigation of potential threats.
Comment: -
Reference(s):
  Historic references:
Contact(s):
Gunhee Lee, Editor
Shinya Sasa, Editor
ITU-T A.5 justification(s):
Generate A.5 drat TD
-
[Submit new A.5 justification ]
See guidelines for creating & submitting ITU-T A.5 justifications
First registration in the WP: 2021-09-06 16:16:20
Last update: 2024-09-18 09:34:40