| Table of Contents - X.1355 (04/2025) - Security risk analysis framework for Internet of things devices1	Scope2	References
 3	Definitions
 3.1	Terms defined elsewhere
 3.2	Terms defined in this Recommendation
 4	Abbreviations and acronyms
 5	Conventions
 6	Reference model for IoT device
 7	Security risk analysis framework for IoT devices
 7.1	Phase 1: Determination of a TOA
 7.2	Phase 2: Identification of security problems
 7.3	Phase 3: Prioritization of threats
 8	Utilization of risk analysis results – establishment of security objectives
 8.1	Decision on risk mitigation strategy
 8.2	Establishment of security objectives
 Appendix I – An example of risk analysis based on the security risk analysis framework for Internet of things (IoT) devices
 I.1	Overview
 I.2	Phase 1: Determination of a TOA
 I.3	Phase 2: Identification of security problems
 I.4	Phase 3: Prioritization of threats
 I.5	Establishment of security objectives based on the result of security risk analysis
 Appendix II – An example of risk level assessment method
 II.1	Overview
 II.2	Risk-scoring system
 Bibliography
 
 |