<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Insights Archives - IoTAC</title>
	<atom:link href="https://iotac.eu/category/insights/feed/" rel="self" type="application/rss+xml" />
	<link>https://iotac.eu/category/insights/</link>
	<description>Internet of Things Access Control</description>
	<lastBuildDate>Wed, 30 Aug 2023 20:56:32 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.2.9</generator>

<image>
	<url>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon-32x32.jpg</url>
	<title>Insights Archives - IoTAC</title>
	<link>https://iotac.eu/category/insights/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Key aspects of the IoTAC project</title>
		<link>https://iotac.eu/key-aspects-of-the-iotac-project/</link>
					<comments>https://iotac.eu/key-aspects-of-the-iotac-project/#respond</comments>
		
		<dc:creator><![CDATA[Andras Vilmos]]></dc:creator>
		<pubDate>Wed, 30 Aug 2023 19:04:31 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[IoT architecture]]></category>
		<category><![CDATA[IoT security]]></category>
		<category><![CDATA[security by design]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=12802</guid>

					<description><![CDATA[<p>The H2020 IoTAC (Security by Design IoT Development and Certificate Framework with Front-end Access Control) project was launched on the 1st of September 2020 with the objective to design, implement, and validate a complex security architecture for the protection of IoT service environments. The relevance of this objective did not...</p>
<p>The post <a href="https://iotac.eu/key-aspects-of-the-iotac-project/">Key aspects of the IoTAC project</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The H2020 IoTAC (Security by Design IoT Development and Certificate Framework with Front-end Access Control) project was launched on the 1<sup>st</sup> of September 2020 with the objective to design, implement, and validate a complex security architecture for the protection of IoT service environments. The relevance of this objective did not diminish during the past years at all, as cybercrime is constantly increasing, inflicting heavy financial and societal damages for businesses and citizens alike.</p>
<p>The project started with the elaboration of the security baseline, listing, and prioritizing all potential threats and related protection measures that the planned security architecture needs to fend off and implement.</p>
<p>The architecture design work resulted in a service platform comprising a secure IoT router and several loosely coupled configurable components – access management system, attack detector, honeypot, runtime monitoring system, and a common data repository with a dashboard – which provide comprehensive protection against a wide range of the most common attacks. The design principle was to establish a system that is flexible, simple to deploy and operate, and can provide high-level protection without the need for highly skilled security professionals for its management, which is in short supply. The target audience for the platform is SMEs and private operators who have started to realize the need for high-level security but lack the necessary expertise for the operation of complex systems.</p>
<p><img decoding="async" loading="lazy" class="aligncenter wp-image-12811 size-large" src="https://iotac.eu/wp-content/uploads/2023/08/IoTAC-platform-1024x888.png" alt="" width="1024" height="888" srcset="https://iotac.eu/wp-content/uploads/2023/08/IoTAC-platform-1024x888.png 1024w, https://iotac.eu/wp-content/uploads/2023/08/IoTAC-platform-300x260.png 300w, https://iotac.eu/wp-content/uploads/2023/08/IoTAC-platform-768x666.png 768w, https://iotac.eu/wp-content/uploads/2023/08/IoTAC-platform-1536x1332.png 1536w, https://iotac.eu/wp-content/uploads/2023/08/IoTAC-platform-2048x1776.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p style="text-align: center;"><em>The IoTAC platform</em></p>
<p>Implementation of the modules took over a year and was assisted by a sophisticated DevSecOps environment as well as a security-by-design monitoring tool. The purpose of this environment is to ensure high-level code quality, the early detection of potential vulnerabilities, and a seamless continuous development and deployment process.</p>
<p>The completed platform has been validated in four different IoT domains to demonstrate its versatility and adaptability to the various service requirements. The Prosumer cell operation, the Connected car, and Drone operation pilots represented industrial IoT requirements, and the Smart home operation is a consumer environment. At each of these pilots, a different configuration of the platform was deployed and integrated, demonstrating the versatility of the IoTAC platform. Each of the pilot operators was defining performance and security targets, KPIs, that the IoTAC system needed to meet, or exceed. The objective was to increase the security level of the protected environments without interfering with the operation and degrading the quality of service. After a tedious iterative process, by the end of the project, it can be claimed that the deployed architecture at every pilot location not only met but exceeded the initial expectations.</p>
<p>This was the result we aimed for, but it was not something that could be guaranteed, as much of the technology used was truly novel and the integration of the security functions may have carried unanticipated challenges.</p>
<p>Besides improving the security posture of the pilot operations, the technology developers also greatly benefitted from this exercise. These partners not only developed new tools, but also gained first-hand experience from the deployment, integration, and operation of the platform and their individual modules, could remove previously undetected errors, and could also perform improvements both on the operating capabilities of the modules as well as on the service set up, and provisioning procedures.</p>
<p>The IoTAC project has also actively supported standardisation, by working with ISO and ETSI.<br />
The project was using the ISO/IEC 30141 architecture reference model as its underlying guide for the IoTAC architecture and eventually prepared a security extension for the document. The recommendations are related to WG3 IoT Foundational Standards and have been submitted to the working group. If accepted, it would result in a contribution to the newly planned ISO/IEC 30149 document instead of the ISO/IEC 30141 Ed. 2. The publication of the second edition of ISO/IEC 30141 and ISO/IEC 30149 is expected in 2024 at the earliest.<br />
The IoTAC project has actively participated in the work of the ETSI Technical Committee to contribute to the development of ETSI deliverables. Specifically, the project has been involved in the Working Group TST. As part of the project&#8217;s engagement, two work items have been initiated. The first document is a Technical Specification (TS) titled &#8220;IoT security module testing,&#8221;. The second document is a Technical Report (TR) titled &#8220;IoT security architecture conformity,&#8221;. A publication of both documents TS 103 942 and TR 103 946 is expected in a few weeks and will be publicly available.</p>
<p>IoTAC has actively communicated and disseminated project results via various channels. Project partners published 10 scientific journal <a href="https://iotac.eu/publications/">papers</a>, one book, presented 20+ papers at academic conferences, and made presentations at several industry events. We published 55 insight <a href="https://iotac.eu/insights/">posts</a> on the IoTAC homepage. The project exhibited together with sister projects from the same call at the 2023 Barcelona Cybersecurity Congress where the results of our work have been presented to a broader industry audience.</p>
<p><img decoding="async" loading="lazy" class="aligncenter wp-image-12808 size-full" src="https://iotac.eu/wp-content/uploads/2023/08/Day-1-full-stand.jpg" alt="" width="1600" height="823" srcset="https://iotac.eu/wp-content/uploads/2023/08/Day-1-full-stand.jpg 1600w, https://iotac.eu/wp-content/uploads/2023/08/Day-1-full-stand-300x154.jpg 300w, https://iotac.eu/wp-content/uploads/2023/08/Day-1-full-stand-1024x527.jpg 1024w, https://iotac.eu/wp-content/uploads/2023/08/Day-1-full-stand-768x395.jpg 768w, https://iotac.eu/wp-content/uploads/2023/08/Day-1-full-stand-1536x790.jpg 1536w" sizes="(max-width: 1600px) 100vw, 1600px" /></p>
<p style="text-align: center;"><em>Barcelona Cybersecurity Congress</em></p>
<p>The project organized the EuroCyberSec 2021 Workshop, publishing the proceedings in a Springer-published <a href="https://iotac.eu/proceedings-of-the-eurocybersec2021-workshop/">book</a>. The organisation of the annual online IoT Day workshops in April has been the most relevant communication achievement of the IoTAC project. Starting in 2021 with presentations of 3 H2020 IoT projects, by 2023 it grew to a large international <a href="https://iotac.eu/iot-day-roundtable-2023/">event</a> with the participation of multiple standard developing organisations, multinational companies, and also the US NIST, focusing on the impact of the new European Cyber Resilience Act, with over 140 participants.</p>
<p>The project has been completed but the work does not stop here. The IoTAC partners have established the IoTAC Association with the purpose to support and coordinate the forthcoming exploitation activities of the project results. It is expected that in a couple of years, the IoTAC platform will become a sought-after niche technology.</p>
<p>The post <a href="https://iotac.eu/key-aspects-of-the-iotac-project/">Key aspects of the IoTAC project</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/key-aspects-of-the-iotac-project/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The roadmap of FEAM, the Front-end Access Management system</title>
		<link>https://iotac.eu/the-roadmap-of-feam-the-front-end-access-management-system/</link>
					<comments>https://iotac.eu/the-roadmap-of-feam-the-front-end-access-management-system/#respond</comments>
		
		<dc:creator><![CDATA[Andras Vilmos]]></dc:creator>
		<pubDate>Thu, 24 Aug 2023 08:57:29 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[IoT architecture]]></category>
		<category><![CDATA[IoT security]]></category>
		<category><![CDATA[security by design]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=12759</guid>

					<description><![CDATA[<p>Secure User authentication online has always been a major challenge. Now the problem seems to be solved with Verifiable Credentials. These credentials represent information in digital form which can be found in physical documents. They provide flexibility, and convenience, but above all more protection and privacy for their holders, when...</p>
<p>The post <a href="https://iotac.eu/the-roadmap-of-feam-the-front-end-access-management-system/">The roadmap of FEAM, the Front-end Access Management system</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Secure User authentication online has always been a major challenge. Now the problem seems to be solved with Verifiable Credentials. These credentials represent information in digital form which can be found in physical documents. They provide flexibility, and convenience, but above all more protection and privacy for their holders, when they need to identify themselves online. These credentials are digitally signed which makes them tamper-resistant and instantaneously verifiable, as well as support selective disclosure which lets users share only the minimum amount of data necessary for proving specific claims.</p>
<p>Verifiable credentials are frequently stored decentralized, sometimes in digital wallets of the users. There are numerous projects underway both in the US (e.g. mobile driving licence &#8211; mDL) and globally (e.g. ICAO, EU Digital Identity Wallet) to provide users, citizens with a digital means to securely identify themselves. Related technologies have also been standardized (e.g. ISO, 3WC, OpenID).</p>
<p>Authentication and Authorisation usually go hand-in-hand, authentication is a precondition of authorisation and is still decentralized, digital authorisation is practically non-existent though such a solution could have at least the same, but potentially even more benefits than Verifiable Credentials.</p>
<p>The Front-End Access Management (FEAM) technology of SafePay stores the user credentials, access rights in a secure element at the user side. This secure storage may even be shared with Verifiable Credentials of the User, may be a SIM card or embedded secure element of a smartphone, may be a Trusted Execution Environment (TEE), or even a cloud-based secure storage facility (Card Farm).  FEAM relies on the concept of OAuth and uses the same signed access tokens but provides independence from central authorisation systems. As a result of the decentralized architecture, communication overhead is substantially reduced, single point of access failure is removed and user profiling by external parties is prevented. Additional major benefit of the technology is that it provides identical transaction procedure and the same high-level security for both online and offline transactions.  The fact that FEAM uses the same type of access tokens (JWT) as OAuth supports its introduction to a large, deployed user base. The technology can also be simply integrated into poorly protected legacy environments without any modifications to the business procedures, communication protocols.<br />
The technology is validated in diverse service environments including connected cars, smart home, prosumer cell operation, and drones. The solution has been adapted to various communication protocols and presently supports REST, TCP, UDP, and MQTT channels. FEAM also provides flexibility with respect to its topology as it can be operated both on-premises as well as in the cloud.</p>
<p>FEAM will not stop here, the next step in its evolution will be the introduction of device authorisation. In this concept, a built-in secure enclave (TPM chip, TEE, iSIM) will store those functions which the device may perform. These functions will be defined by the manufacturers – possibly in the form of MUD files – and customized by the operators of the device. The resulting architecture will prevent the overtaking of IoT devices and using them for malicious activities which happened in the past in the case of large-scale DDoS attacks. This internal control of operation will not only become a new security-by-design feature but will also provide a second line of defense against taking over IoT devices. In this scenario it will not be enough any longer to break the usual username and password or similar protection but to misuse the device also its secure element should be compromised otherwise it will not be possible to alter the intended operation.</p>
<p>With its unique architecture, FEAM opens a whole new approach to user and device authorisation, but whenever possible it uses existing industry standards and best practices. In the development process ongoing industry initiatives are actively monitored to ensure that the solution will be future-proof and will be able to satisfy upcoming, novel requirements.</p>
<p>You can watch a short video about the transaction flow <a href="https://www.youtube.com/watch?v=-3LdaPDDpBc">here</a>.</p>
<p><img decoding="async" loading="lazy" class="aligncenter wp-image-12765 size-full" src="https://iotac.eu/wp-content/uploads/2023/08/FEAM-kep-1.png" alt="" width="797" height="456" srcset="https://iotac.eu/wp-content/uploads/2023/08/FEAM-kep-1.png 797w, https://iotac.eu/wp-content/uploads/2023/08/FEAM-kep-1-300x172.png 300w, https://iotac.eu/wp-content/uploads/2023/08/FEAM-kep-1-768x439.png 768w" sizes="(max-width: 797px) 100vw, 797px" /></p>
<p>The post <a href="https://iotac.eu/the-roadmap-of-feam-the-front-end-access-management-system/">The roadmap of FEAM, the Front-end Access Management system</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/the-roadmap-of-feam-the-front-end-access-management-system/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Use of the IoTAC Platform in the Connected Car Pilot</title>
		<link>https://iotac.eu/use-of-the-iotac-platform-in-the-connected-car-pilot/</link>
					<comments>https://iotac.eu/use-of-the-iotac-platform-in-the-connected-car-pilot/#respond</comments>
		
		<dc:creator><![CDATA[Leonardo Gonzalez, Tecnalia Research and Innovation]]></dc:creator>
		<pubDate>Fri, 21 Jul 2023 14:06:55 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[zero trust]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=12611</guid>

					<description><![CDATA[<p>The post <a href="https://iotac.eu/use-of-the-iotac-platform-in-the-connected-car-pilot/">Use of the IoTAC Platform in the Connected Car Pilot</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69e5f4c81f27c"  data-column-margin="default" data-midnight="dark"  class="wpb_row vc_row-fluid vc_row top-level standard_section "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap" data-bg-animation="none" data-bg-overlay="false"><div class="inner-wrap"><div class="row-bg"  style=""></div></div><div class="row-bg-overlay" ></div></div><div class="row_col_wrap_12 col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone "  data-t-w-inherits="default" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0" >
		<div class="vc_column-inner" ><div class="column-bg-overlay-wrap" data-bg-animation="none"><div class="column-bg-overlay"></div></div>
			<div class="wpb_wrapper">
				
<div class="wpb_text_column wpb_content_element " >
	<div class="wpb_wrapper">
		<p>Connected Cars, and especially cooperative connected and automated mobility, are very important for the future of transportation. They can improve traffic efficiency, reduce emissions, enhance road safety, and provide better mobility services for users.</p>
<p>TECNALIA has set up a pilot to enable the platforms’ connectivity so as to provide a cooperative maneuver of platooning, which is dependent on communication systems for its tight control of inter-distance between vehicles. The pilot includes the Twizy vehicle platforms, which have connectivity and automated capabilities, and a control station as infrastructure, which monitors and provides high-level control to the cooperative maneuvers.</p>
<p><img decoding="async" loading="lazy" class="aligncenter wp-image-12623 size-full" src="https://iotac.eu/wp-content/uploads/2023/07/Connected-Car-blog-2-pic.png" alt="" width="1406" height="1128" srcset="https://iotac.eu/wp-content/uploads/2023/07/Connected-Car-blog-2-pic.png 1406w, https://iotac.eu/wp-content/uploads/2023/07/Connected-Car-blog-2-pic-300x241.png 300w, https://iotac.eu/wp-content/uploads/2023/07/Connected-Car-blog-2-pic-1024x822.png 1024w, https://iotac.eu/wp-content/uploads/2023/07/Connected-Car-blog-2-pic-768x616.png 768w" sizes="(max-width: 1406px) 100vw, 1406px" /></p>
<p style="text-align: center;"><em>Figure 1 IoTAC platform in the Connected Car pilot</em></p>
<p>Cybersecurity remains a concern for these connected systems, which could hamper or even impede the correct functioning of the vehicle systems. TECNALIA’s automated vehicles make use of V2V communications for the platooning use cases, as well as internet connectivity via 4G. In the context of the connected car pilot, the IoTAC modules have been placed both (1) in the control station infrastructure, which will handle the platooning, to provide appropriate coverage for threats in the platooning service and (2) in the automated vehicle itself.</p>
<p>To this extent, the development and deployment being done in the IoTAC project referred to as this pilot, can be split into the following:</p>
<ol>
<li><em><strong>Control station security</strong></em>, where one of the main concerns is the security of the information being exchanged with the vehicles’ platforms. A second concern is the availability of the platform itself and its potential exposure to attacks, which could render the service availability.</li>
<li><em><strong>Automated Vehicle Platform security</strong></em>, which tackles the possibility of attacks in the vehicle network itself, either by having a physical entry point or by exposure to internet connectivity. A second concern is the correctness of the data reported by the vehicle, and the appropriate functioning of the platform.</li>
</ol>
<p>To this end, the IoTAC project serves as a testing ground for connected vehicle cybersecurity, by fully integrating the designed platform to tackle these concerns. The modules have been placed in accordance with the aforementioned risks, both in the vehicle and infrastructure for the control station.</p>
<p>The development of a monitoring framework in the IoTAC project – by aggregating different modules thus maximizing coverage &#8211; is critical to the connected car pilot. The <em><strong>Attack Detection</strong></em> module and the <em><strong>Security Gateway</strong></em> have been placed in the vehicle, monitoring all traffic data exchanged between sensors, computational equipment, and communication devices, which allows an assessment of the network state. The <em><strong>Honeypot</strong></em> module has been put adjacent to the control station, protecting it from possible malicious intruders and informing directly to a centralized IoTAC framework via a data bus.</p>
<p>The <em><strong>Front-end Access Management</strong></em> (FEAM) module is deployed to target the control station, specifically the authentication layer and role assignment. This module introduces a secure registration process as well as adds an additional layer of security over IoT connectivity by assigning specific roles to each user. This removes the concern regarding unauthorized access to the control station capabilities as well as manages the specific functionalities given to each role in the administration of the platoon.</p>
<p>A <em><strong>Runtime Monitoring System</strong></em> (RMS) is also deployed and connected via the data bus which inspects messages from the vehicle platform, the FEAM, and the Honeypot modules. From the vehicle data, it checks its correct deployment (i.e. kinematic variables within range, vehicles in the correct area, etc) and provides information via a dashboard solution. In the case of the FEAM and the Honeypot, specific messages are also shared for monitoring purposes to assess in real-time via a dashboard the correct functioning of the system.</p>
<p>The lessons learned from the assessment results of these IoTAC modules deployed in the connected car demonstrator will follow at the end of the project.</p>
	</div>
</div>




			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://iotac.eu/use-of-the-iotac-platform-in-the-connected-car-pilot/">Use of the IoTAC Platform in the Connected Car Pilot</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/use-of-the-iotac-platform-in-the-connected-car-pilot/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Use of the IoTAC Platform in the Smart Home pilot</title>
		<link>https://iotac.eu/use-of-the-iotac-platform-in-the-smart-home-pilot/</link>
					<comments>https://iotac.eu/use-of-the-iotac-platform-in-the-smart-home-pilot/#respond</comments>
		
		<dc:creator><![CDATA[Dimitrios Tsoukalas, Centre for Research &#38; Technology - Hellas]]></dc:creator>
		<pubDate>Fri, 23 Jun 2023 20:05:47 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[IoT architecture]]></category>
		<category><![CDATA[IoT security]]></category>
		<category><![CDATA[security by design]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=12542</guid>

					<description><![CDATA[<p>The post <a href="https://iotac.eu/use-of-the-iotac-platform-in-the-smart-home-pilot/">Use of the IoTAC Platform in the Smart Home pilot</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69e5f4c81fa41"  data-column-margin="default" data-midnight="dark"  class="wpb_row vc_row-fluid vc_row standard_section "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap" data-bg-animation="none" data-bg-overlay="false"><div class="inner-wrap"><div class="row-bg"  style=""></div></div><div class="row-bg-overlay" ></div></div><div class="row_col_wrap_12 col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone "  data-t-w-inherits="default" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0" >
		<div class="vc_column-inner" ><div class="column-bg-overlay-wrap" data-bg-animation="none"><div class="column-bg-overlay"></div></div>
			<div class="wpb_wrapper">
				
<div class="wpb_text_column wpb_content_element " >
	<div class="wpb_wrapper">
		<p>The CERTH/ITI Smart Home is Greece&#8217;s first house that combines advanced construction materials with intelligent ICT solutions, resulting in a future-proof, sustainable, and active testing environment. It offers a variety of innovative smart IoT-based technologies, including energy, health, big data, robotics, and artificial intelligence (AI). The Smart Home is equipped with a wide set of heterogeneous sensors and actuators providing information for several operations taking place within its infrastructure (e.g., smart light bulbs, smart appliances like smart washing machine and smart refrigerator, etc.).</p>
<p>Information Security is a major concern for any ICT system, and the ITI Smart Home is not an exception. Energy and Health modules apply and maintain diverse controls across the wide network of heterogeneous interconnected IoT sensors and actuators. Smart Home inhabitants have the possibility to switch on/off appliances using dedicated software services. Besides, sensitive information such as energy consumption or outputs of healthcare sensors is constantly exchanged between built-in services via the Smart Home network. This implies a large attack surface and a significant challenge for appropriate security controls across the whole system.</p>
<p>Considering the aforementioned risks, the security concerns pertaining to the Smart Home can be categorized into two main dimensions. Firstly, there is a need to address the <em>potential risks associated with the execution of malicious commands and the reporting of falsified sensor or device measurements </em>to the Smart Home administrator. To this end, a more secure policy is needed for identifying if the reported measurements are accurate or not, or more specifically, if they have been altered in a malicious way by an intruder. Secondly, we must ensure <em>security measures are in place to prevent unauthorized access to the resources and data </em>within the Smart Home system. Regarding authentication and user access control on the resources of the Smart Home system, a combination of basic authentication and role-based access control is currently used, which defines to which resources the user has access and what actions the user can perform on these resources. We consider that this scheme is adequate for some cases, but it has room for improvement.</p>
<p>To this end, within the H2020 IoTAC project, the Smart Home infrastructure serves as a successful test bed to evaluate the proposed IoTAC security solutions. By deploying the innovative IoTAC security solutions in the Smart Home System, we can effectively address both of the aforementioned security concerns. Figure 1 depicts a high-level overview of the integration of the novel IoTAC security modules into the Smart Home infrastructure.</p>
<p><img decoding="async" loading="lazy" class="aligncenter wp-image-12539 size-full" src="https://iotac.eu/wp-content/uploads/2023/06/Smart-home-integration.png" alt="" width="1213" height="747" srcset="https://iotac.eu/wp-content/uploads/2023/06/Smart-home-integration.png 1213w, https://iotac.eu/wp-content/uploads/2023/06/Smart-home-integration-300x185.png 300w, https://iotac.eu/wp-content/uploads/2023/06/Smart-home-integration-1024x631.png 1024w, https://iotac.eu/wp-content/uploads/2023/06/Smart-home-integration-768x473.png 768w" sizes="(max-width: 1213px) 100vw, 1213px" /></p>
<p style="text-align: center;">Figure 1 &#8211; High-level Overview of IoTAC Integration in Smart Home</p>
<p>To address the security concerns in more detail, the deployment of the novel runtime monitoring features of the IoTAC framework plays a crucial role. Specifically, the IoTAC Attack Detection (AD) and Honeypot modules effectively alleviate the concern of executing malicious commands and reporting altered device and sensor measurements to the Smart Home administrator, ensuring the integrity of the reported data. Supporting these modules is the IoTAC Runtime Monitoring System (RMS), which facilitates data distribution and provides security-related information to the Smart Home administrator, such as the number of identified malicious attacks and affected devices.</p>
<p>Additionally, to mitigate the security concern of unauthorized access to Smart Home resources, the IoTAC FEAM (Front-End Access Management) module is deployed. This module introduces novel authentication and authorization mechanisms that enhance the registration process for users in the Smart Home System and regulate their access to resources. By leveraging FEAM, the protected system is secured against unauthorized access attempts.</p>
<p>Finally, in terms of design time security, all newly developed applications and services undergo evaluation and certification by the Software Security by Design (SSD) platform. This ensures that these components meet rigorous security standards before integration into the Smart Home ecosystem.</p>
<p>As the integration of IoTAC into the Smart Home enters the validation phase, there is a high level of confidence that incorporating the novel IoTAC hardware and software security solutions will significantly enhance the overall security of the Smart Home environment. More details on the results will follow in the upcoming pilot-related public deliverables. Stay tuned!</p>
	</div>
</div>




			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://iotac.eu/use-of-the-iotac-platform-in-the-smart-home-pilot/">Use of the IoTAC Platform in the Smart Home pilot</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/use-of-the-iotac-platform-in-the-smart-home-pilot/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Why security matters in a prosumer operation</title>
		<link>https://iotac.eu/why-security-matters-in-a-prosumer-operation/</link>
					<comments>https://iotac.eu/why-security-matters-in-a-prosumer-operation/#respond</comments>
		
		<dc:creator><![CDATA[László Vajta, Budapest University of Technology and Economics]]></dc:creator>
		<pubDate>Thu, 01 Jun 2023 19:33:05 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[IoT architecture]]></category>
		<category><![CDATA[IoT security]]></category>
		<category><![CDATA[security by design]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=12467</guid>

					<description><![CDATA[<p>The post <a href="https://iotac.eu/why-security-matters-in-a-prosumer-operation/">Why security matters in a prosumer operation</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69e5f4c820118"  data-column-margin="default" data-midnight="dark"  class="wpb_row vc_row-fluid vc_row standard_section "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap" data-bg-animation="none" data-bg-overlay="false"><div class="inner-wrap"><div class="row-bg"  style=""></div></div><div class="row-bg-overlay" ></div></div><div class="row_col_wrap_12 col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone "  data-t-w-inherits="default" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0" >
		<div class="vc_column-inner" ><div class="column-bg-overlay-wrap" data-bg-animation="none"><div class="column-bg-overlay"></div></div>
			<div class="wpb_wrapper">
				
<div class="wpb_text_column wpb_content_element " >
	<div class="wpb_wrapper">
		<p>After much deliberation, the family decided to install solar panels in our holiday home.</p>
<p>When it came to sizing, we set ourselves the goal of avoiding back-feeding, as the rules for this can change all the time and the calculation of the return on investment is fraught with too much uncertainty.</p>
<p>As the summer house is mostly used in summer and therefore our consumption is higher in summer, this fits well with the annual production cycle of solar PV systems. In summer we regularly charge our hybrid car, which means a consumption of 15-20 kWh per day. Circulating and tempering the small swimming pool requires 5kWh of energy per day, and other household consumers (fridge, hobs, air conditioning, etc.) consume on average another 5 kWh. So it can be seen that we are quite heavy consumers in summer, with an average daily consumption of around 30kWh.</p>
<p>Regarding the timing of the consumption, it is possible to match it to the instantaneous production of the generating unit by switching some of the consumers on and off. The swimming pool, the fridge, but also air conditioners are relatively large heat consumers, and car charging can be slid too.</p>
<p>The first step was to monitor the time distribution of actual consumption over a period of one month (this can now be done very cheaply using smart meters connected to the internal wifi network). The required solar panel capacity and the storage to match it were then sized. The system thus consists of a 10kWh battery and 16 solar modules, as this combination yields the best payback figures, assuming that the option of recharging will not come back to us.</p>
<p>In winter, the cottage is converted to a low-temperature control heating &#8211; using the heating mode of the air conditioners. The cost of this is of course highly dependent on the weather, but it is certainly considered to be more economical than the case without the use of renewable energy.</p>
<p>When 14-year-old Peter, who lives in the neighborhood, asked to see our equipment, I was happy to show him all the components. He looked at them with interest and then asked me how they were connected. Then he took out his mobile phone and pressed it thoughtfully. I didn&#8217;t pay much attention to what he was doing, as teenagers are always busy with their mobile phones.</p>
<p>Peter thanked me for showing him the system and went home. An hour and a half later he turned up again and said he had something to show me. He came in again and showed me on his mobile phone how he could switch off the soul of the installation, the inverter, in a few seconds. I watched in disbelief, certain that only I would have access to the password-protected device.</p>
<p>I had heard a lot about the attacks and threats to which IT equipment is exposed. But it&#8217;s one thing to hear something and another to experience it! After all, my house is not the only one with solar panels, and it&#8217;s bad to think that Peter&#8217;s game is to turn them all off! On a hot summer day, it would be like Peter turning off a large nuclear power plant!</p>
<p>I started looking for a suitable technical solution for protection. Consulting experts, I was surprised to find out how much it would cost. I was told that solutions are being developed to protect the IoT systems I use, which are cheap but provide high security, because the owners of many small systems cannot be expected to purchase expensive solutions.</p>
<p>But there is a need for such solutions. In our country, for example, a system that is shut down by external intervention can lead to frost damage in winter and disruption of comfort in summer. Strangely, the hybrid inverter at the heart of the system is easily accessible by anyone, no high-level hacking required. We have decided to provide this delicate IoT system with anti-piracy protection.</p>
<p>After much enquiry, we met with the IoTAC project specialists. The modular protection system they are developing will be able to protect our household. We will be installing them soon and I will report on the results in an upcoming blog.</p>
	</div>
</div>




			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://iotac.eu/why-security-matters-in-a-prosumer-operation/">Why security matters in a prosumer operation</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/why-security-matters-in-a-prosumer-operation/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Novel protection, not only for large-scale IoT systems</title>
		<link>https://iotac.eu/novel-protection-not-only-for-large-scale-iot-systems/</link>
					<comments>https://iotac.eu/novel-protection-not-only-for-large-scale-iot-systems/#respond</comments>
		
		<dc:creator><![CDATA[Judit Mallász, Computerworld]]></dc:creator>
		<pubDate>Fri, 12 May 2023 12:03:18 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[IoT architecture]]></category>
		<category><![CDATA[IoT security]]></category>
		<category><![CDATA[security by design]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=12396</guid>

					<description><![CDATA[<p>The post <a href="https://iotac.eu/novel-protection-not-only-for-large-scale-iot-systems/">Novel protection, not only for large-scale IoT systems</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69e5f4c8208f1"  data-column-margin="default" data-midnight="dark"  class="wpb_row vc_row-fluid vc_row standard_section "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap" data-bg-animation="none" data-bg-overlay="false"><div class="inner-wrap"><div class="row-bg"  style=""></div></div><div class="row-bg-overlay" ></div></div><div class="row_col_wrap_12 col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone "  data-t-w-inherits="default" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0" >
		<div class="vc_column-inner" ><div class="column-bg-overlay-wrap" data-bg-animation="none"><div class="column-bg-overlay"></div></div>
			<div class="wpb_wrapper">
				
<div class="wpb_text_column wpb_content_element " >
	<div class="wpb_wrapper">
		<p><em><strong>This article was originally published in Hungarian in </strong><a href="https://computerworld.hu/cwprint/ujszeru-vedelem-kicsiknek-is-324337.html"><strong>Computerworld</strong></a>.</em></p>
<p><strong>If a smart home is hacked and the residents wake up to blaring music at night, it is extremely annoying. However, hacking and attacking IoT systems can cause a lot more damage. It is worth a thought where this can lead, for example, if unauthorized persons gain access to self-driving cars, or if the network of household power plants is attacked.</strong></p>
<p>How secure are systems in which a large number of simple devices, such as sensors, are connected to a network? There are IoT systems where basic level protection such as username/password is sufficient, but there are also those ones where personal and other sensitive data must be protected at the highest level. An international consortium led by Atos Hungary intends to create an IoT architecture for these latter ones that enables the development and operation of flexible and resilient IoT service environments. In the IOTAC project, funded by the European Union, 13 industrial players, research centers, and universities from seven European countries collaborate. The project is running for 36 months, and completion is expected in August 2023.</p>
<p>Did the development start from scratch or were there already basic solutions that could be built on? &#8211; we asked project manager András Vilmos and László Vajta, professor of BME, Budapest University of Technology and Economics.</p>
<p>András Vilmos: When submitting the project proposal, we had the concepts and basic solutions. During the project, we develop the modules that implement these ideas.</p>
<p>László Vajta: It is a clear trend in the IoT systems that the number of protected components is drastically increasing which in some cases are very simple with low capacity and are not suitable for receiving expensive, sophisticated protection. In such circumstances, it became necessary to have a new approach for the protection of IoT systems with large number of endpoints.</p>
<p><em>Computerworld: How novel is the approach?</em></p>
<p>András Vilmos: It is a flexible system in which protection modules are connected to a central gateway. These modules are the front-end access management, as well as various runtime security functions: artificial intelligence-based attack detection models, honeypots, rollback points, and the real-time monitoring system. These technologies provide adequate protection at both hardware and software levels. Since the system can be flexibly configured, it can be used both in large industrial environments, as well as in small and medium-sized companies or even in household environments where the appropriate expertise and cyber-security background are missing for the protection. The basis of the system is the security-by-design paradigm. The recommended policies and procedures cover the entire lifecycle of secure software development, from design through development and testing, to evaluation and certification. It is very important that not only certain technological components are implemented during the project, but that they are also validated in pilot operations.</p>
<p><em>CW: In which IoT service environments will the results of the development work be validated?</em></p>
<p>László Vajta: With the cooperation of the consortium members, pilots will be running in industrial (prosumer system), residential (intelligent home), automotive (autonomous vehicle), and aerial (drone operation) IoT service environments. BME will set up a household-sized, independent energy management unit that produces and consumes energy from the combination of renewable energy and energy storage. In this so-called prosumer unit, we test the applicability of the technologies, as well as analyse security issues. It must be noted that the proliferation of household power plants entails serious security risks. If, for example, many household power plants are attacked simultaneously, the energy supply of even larger areas can be seriously threatened. The IoTAC project therefore also has the mission to draw attention to the special challenges of IoT systems, to reveal potential dangers, and to draw attention to the possibilities of reducing risks. Fortunately, more and more decision-makers recognize the problem and are looking for a solution.</p>
<p>Vilmos András: IoTAC also participates in other pilots: with Airbus in drone operation, with Tecnalia using autonomous vehicles, and with CERTH, in smart home management. Atos is creating a new solution for chip card-based access control that provides the highest level of protection. The point is that the physical chip cards are stored in the cloud, so that every cardholder can access them anywhere, anytime, without the need for a separate device.</p>
<p><em>CW: Are the tests conducted in real or simulated environments?</em></p>
<p>András Vilmos: There are real, simulated, and mixed pilots. The prosumer and smart home pilots, for example, take place in real environments, in Balatonfüred in Hungary and in Thessaloniki, Greece. We have created a half-real, half-emulated environment for self-driving cars. This means that real, and computer-simulated cars drive on a real, closed test track in Spain. The drone pilot is completely simulated.</p>
<p><em>CW: There is roughly half a year left from the project. How far have you come?</em></p>
<p>András Vilmos: The development works are more or less completed. We are currently deploying and testing the pilots. The results of the tests are fed back to the developers, who finetune the systems based on the feedback and satisfy any new needs that may arise along the way. We are progressing fully according to the plans and schedule.</p>
<p><em>CW: Does BME involve students in the research and development work?</em></p>
<p>László Vajta: Yes, masters students and doctoral students. Their activities are always managed by tutors. Typically, we entrust them with smaller tasks. Since the tasks are of a rather high level and complicated, we were able to involve only a few students in the work.</p>
<p><em>CW: The IoTAC consortium recently participated as an exhibitor at the Cyber ​​Security Congress in Barcelona, ​​which was organized together with the IoT Solutions World Congress (IOTSWC). What experiences did you gain there?</em></p>
<p>András Vilmos: More and more people are becoming aware that something needs to be done, as the number of devices connected to networks is rapidly increasing, and consequently risks are increasing. IoT security is in focus, and demand for security solutions is on the rise. By the way, we did not only participate in the IOTWSC with the IOTAC project but together with 6 EU sister projects, also related to IoT technologies.</p>
<p><em>CW: Do you promote the importance of protecting IoT systems at other forums as well?</em></p>
<p>András Vilmos: This April, we are organizing the IoT Day Roundtable for the third year, where we choose a special topic each time. Last year it was about standardization, this year the EU Cyber ​​Resilience Act is the main topic. The Act regulates how to implement consumer IoT devices with security being integrated by default. The event obviously will also introduce the IoTAC project. We invited representatives of the European Commission, and various industry organizations, with speakers from several European countries, as well as an expert from NIST (National Institute of Standards and Technology) from the United States. The virtual event can be followed online from anywhere in the world and the recording is available on the IoTAC website.</p>
<p><em>CW: After completion of the IoTAC project, how will the project results be used?</em></p>
<p>András Vilmos: During the project, we created the IoTAC Association, whose task is to coordinate the utilization of the results. The association does not carry out business activities but supports presence in industry organizations, communication with partners, and commercial activities of project members. The goal of the partners is to commercially exploit the project results. The business model was developed and the IoTAC framework is built in such a way that it can be marketed as one platform. We strived for flexibility, the individual modules can be activated separately, and most of them can also be used as standalone products. The IoTAC Association also has its tasks in standardization. In collaboration with ETSI, we are working on creating standards that describe how IoT environments should be protected, what requirements should be met, and how the tools to accomplish these should be developed. Disseminating this knowledge and requirements also belongs to our tasks.</p>
<p><em>CW: Who and what kind of organizations are expected to be the customers, the main users?</em></p>
<p>László Vajta: Let&#8217;s take an example! Nowadays, every household or small power plant sends the data generated during its operation &#8211; partly for security reasons &#8211; to the cloud of the inverter manufacturer. Thereafter, all data access (which we perceive as communication with our own power plant) takes place with the knowledge and permission of the foreign manufacturer. One of the results of the IOTAC project is that it enables the separation of small power plants from the manufacturer&#8217;s cloud while ensuring the necessary data protection and data access. This is a good example of how a research and development project can bring usable, tangible results.</p>
<p>András Vilmos: We see great potential in smart homes. We will have to contact the manufacturers, service providers, and integrators that install smart homes. We need to ensure that our solution is treated as an option or a default option. In general, our direct partners are not the end users, but the system integrators who install the IoT system. The results created in the IoTAC project are therefore not directly B2C, but rather B2B2C solutions.</p>
	</div>
</div>




			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://iotac.eu/novel-protection-not-only-for-large-scale-iot-systems/">Novel protection, not only for large-scale IoT systems</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/novel-protection-not-only-for-large-scale-iot-systems/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>IoT Device Security: Regulatory and Standards Activity Drive 2023 Device Design</title>
		<link>https://iotac.eu/iot-device-security-regulatory-and-standards-activity-drive-2023-device-design/</link>
					<comments>https://iotac.eu/iot-device-security-regulatory-and-standards-activity-drive-2023-device-design/#respond</comments>
		
		<dc:creator><![CDATA[Gary Gill, BG Networks]]></dc:creator>
		<pubDate>Thu, 27 Apr 2023 12:53:05 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[IoT architecture]]></category>
		<category><![CDATA[IoT security]]></category>
		<category><![CDATA[security by design]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=12288</guid>

					<description><![CDATA[<p>The post <a href="https://iotac.eu/iot-device-security-regulatory-and-standards-activity-drive-2023-device-design/">IoT Device Security: Regulatory and Standards Activity Drive 2023 Device Design</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69e5f4c82129d"  data-column-margin="default" data-midnight="dark"  class="wpb_row vc_row-fluid vc_row standard_section "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap" data-bg-animation="none" data-bg-overlay="false"><div class="inner-wrap"><div class="row-bg"  style=""></div></div><div class="row-bg-overlay" ></div></div><div class="row_col_wrap_12 col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone "  data-t-w-inherits="default" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0" >
		<div class="vc_column-inner" ><div class="column-bg-overlay-wrap" data-bg-animation="none"><div class="column-bg-overlay"></div></div>
			<div class="wpb_wrapper">
				
<div class="wpb_text_column wpb_content_element " >
	<div class="wpb_wrapper">
		<p><em>This article appeared in <a href="https://www.electronicdesign.com/technologies/embedded/article/21260278/bg-networks-iot-device-security-regulatory-and-standards-activity-drive-2023-device-design">Electronic Design</a> and has been published here with permission.</em></p>
<h5>IoT device security a feature no more? Recently enacted and upcoming cybersecurity regulations and standards will significantly impact how these devices are designed.</h5>
<p>&nbsp;</p>
<p>Deployment of robust embedded device security has been slow as many IoT devices ship with incomplete or improperly implemented security. In the absence of regulations, manufacturers have largely been left to their own determination on when, what, and how to implement device-level security.</p>
<p>However, increases in the frequency and severity of hacking attacks are motivating governments to propose regulations to improve the security posture of IoT devices. 2022 accelerated the enactment of new standards and laws that will impact the design and deployment of IoT devices in 2023 and beyond.</p>
<h3>Automotive Leads the Way</h3>
<p>Automotive has been one of the earlier adopters of embedded cybersecurity with the advent of electric vehicles, autonomous driving, and software-defined vehicles. Even traditional internal combustion vehicles are increasingly connected and are prime targets for hackers.</p>
<p>Last year saw the UNECE R155 automotive cybersecurity regulation come into effect for new vehicle type approval. Aligned with the ISO/SAE 21434 standard, R155 requires the automotive supply chain to establish and certify cybersecurity management systems (CSMS), which are designed to assess risks, manage those risks through security by design, and secure each vehicle throughout its lifetime.</p>
<p>Compliance with this regulation is a key focus for all auto manufacturers selling into the European market and their suppliers. 2023 is considered as a critical year to broadly drive adoption across the automotive supply chain.</p>
<h3>Intensifying IoT Cybersecurity</h3>
<p>The U.S. government is bringing greater attention to IoT cybersecurity. For federal and supplier networks, Cybersecurity Maturity Model Certification (CMMC) requirements and implementation of NIST SP 800-171 and 800-53 have primarily focused on IT security. However, that’s now expanding to include IoT devices handling government controlled unclassified information (CUI) data.</p>
<p>Network-connected equipment that was previously exempted from meeting cybersecurity requirements is now being required to implement access and management controls in addition to FIPS-validated encryption. While timetables for the enforcement of these mandates are still fluid, IoT device suppliers to U.S. federal organizations should be assessing their products and solutions for compliance with these mandates.</p>
<h3>Medical Device Security</h3>
<p>The FDA also took steps in 2022 to increase focus on security for medical devices by issuing a Cybersecurity in Medical Devices draft guidance update for premarket submissions. This guidance emphasizes that cybersecurity is a part of medical device safety and quality system regulations. It recommends manufacturers implement a secure product-development framework that includes threat modeling, software bill of materials (SBOMs), security by design, and lifecycle management.</p>
<p>The FDA also recommends best-practice security controls such as authentication, authorization, cryptography, code/data/execution integrity, confidentiality, event detection/logging, resiliency, and updatability.</p>
<p>Then, in December 2022, the Consolidated Appropriations Act passed and included authorization for the FDA to regulate medical device cybersecurity. This law requires medical device manufacturers to submit security monitoring and maintenance plans, support device security lifecycles through software updates, and provide SBOMs for new devices. The FDA is currently studying these requirements and will be issuing updated guidance in 2023.</p>
<h3>IoT Security Measures in the EU</h3>
<p>2022 also saw the enactment of the U.K. Product Security and Telecommunications Infrastructure Bill, which will require IoT device manufacturers to no longer use default passwords, confirm how long security updates will be provided after the device is launched, and disclose known vulnerabilities.</p>
<p>Similarly, the EU proposed the European Cyber Resilience Act to improve security for all IoT devices sold in Europe where security isn’t currently mandated. This proposal requires that IoT devices have an “appropriate level of cybersecurity enabled in devices” default configuration, prohibits the sale of products with known vulnerabilities, and that the impact of security incidents be minimized.</p>
<p>While both mandates leave the implementation of the needed security to be determined, these are critical first steps toward driving the adoption of broadly deployed security controls for IoT devices in Europe.</p>
<h3>What About the Consumer?</h3>
<p>Even the consumer markets are showing signs of increased attention to device cybersecurity. The U.S. government is currently in the definition phase for a Consumer IoT Product Labeling program that will provide security capabilities, recommended configuration, and long-term security maintenance for consumer IoT products.</p>
<p>In the industry side of the market, 2022 saw the approval of the <a href="https://www.electronicdesign.com/magazine/51388">Matter</a> interoperability and security standard for smart-home devices. Matter-compliant devices have already begun to enter the market with wide support from consumer semiconductor and smart-home device manufacturers.</p>
<h3>Conclusion</h3>
<p>The proliferation of the broadly defined Internet of Things has brought a revolution in convenience, efficiency, information, and automation across nearly all aspects of our daily lives. However, these benefits bring greater risks to privacy, safety, and national security that are under daily attack.</p>
<p>Governments, device manufacturers, and even consumers are more focused on these risks than ever before as we all come to realize that basic security is no longer optional. We expect IoT device cybersecurity to accelerate in 2023 and throughout the upcoming years, with increasingly active government security regulations driving adoption broadly across the IoT device supply chain.</p>
	</div>
</div>




			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://iotac.eu/iot-device-security-regulatory-and-standards-activity-drive-2023-device-design/">IoT Device Security: Regulatory and Standards Activity Drive 2023 Device Design</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/iot-device-security-regulatory-and-standards-activity-drive-2023-device-design/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The EU Cyber Resilience Act: Brace for impact!</title>
		<link>https://iotac.eu/the-eu-cyber-resilience-act-brace-for-impact/</link>
					<comments>https://iotac.eu/the-eu-cyber-resilience-act-brace-for-impact/#respond</comments>
		
		<dc:creator><![CDATA[Florent Chabaud, Atos]]></dc:creator>
		<pubDate>Wed, 05 Apr 2023 10:30:41 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[IoT architecture]]></category>
		<category><![CDATA[IoT security]]></category>
		<category><![CDATA[security by design]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=12087</guid>

					<description><![CDATA[<p>The post <a href="https://iotac.eu/the-eu-cyber-resilience-act-brace-for-impact/">The EU Cyber Resilience Act: Brace for impact!</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69e5f4c821ea6"  data-column-margin="default" data-midnight="dark"  class="wpb_row vc_row-fluid vc_row standard_section "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap" data-bg-animation="none" data-bg-overlay="false"><div class="inner-wrap"><div class="row-bg"  style=""></div></div><div class="row-bg-overlay" ></div></div><div class="row_col_wrap_12 col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone "  data-t-w-inherits="default" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0" >
		<div class="vc_column-inner" ><div class="column-bg-overlay-wrap" data-bg-animation="none"><div class="column-bg-overlay"></div></div>
			<div class="wpb_wrapper">
				
<div class="wpb_text_column wpb_content_element " >
	<div class="wpb_wrapper">
		<p>In September 2022, the European Commission presented a <a href="https://digital-strategy.ec.europa.eu/en/news/new-eu-cybersecurity-rules-ensure-more-secure-hardware-and-software-products">proposal for a new Cyber Resilience Act</a> (CRA) to protect consumers and businesses from vulnerable IT products. It is the latest in a set of cybersecurity regulations including the <a href="https://digital-strategy.ec.europa.eu/en/policies/cybersecurity-act">EU Cybersecurity Act</a> and the <a href="https://www.consilium.europa.eu/en/press/press-releases/2022/11/28/eu-decides-to-strengthen-cybersecurity-and-resilience-across-the-union-council-adopts-new-legislation/">NIS2 Directive</a>. Its goals are commendable, but a careful reading is required to understand its consequences and identify potential drawbacks. As usual, the devil is in the details.</p>
<p style="text-align: center;"><em><strong>For the first time, a regulation seems to address all security aspects </strong></em><em><strong>in a consistent way</strong></em></p>
<p><strong>The Cyber Resilience Act in a nutshell</strong></p>
<p>Understanding a huge regulation is always a challenge and requires knowledge of the regulator’s intent. For those who haven’t followed the preliminary discussions, the <a href="https://digital-strategy.ec.europa.eu/en/library/cyber-resilience-act-factsheet">fact sheet</a> published along with the proposal gives a fair summary of the European Commission’s objectives.</p>
<p>It proposes practical measures to improve security, such as requiring security in all phases of a product lifecycle, making configuration instructions clear and understandable, providing security patches, and reporting exploited vulnerabilities. Another positive aspect is the intent to leverage the EU Cybersecurity Act’s existing certification schemes to immediate enable third-party security assessments.</p>
<p>From an enforcement perspective, EU regulations don’t wait for Member States to enact them. They are immediately applicable and enforceable, as GDPR has proved. Like GDPR, the CRA can impose huge penalties, meaning it’s not a regulation that CEOs can afford to ignore!</p>
<p>It is also a good thing to have such regulation at European level, with an authority (ENISA) already in-place whose role is strengthened by the regulation. For the industry, it is reassuring to have a single authority for such a large market.</p>
<p>The obligations for manufacturers are detailed in Article 10. They can be summarized as:</p>
<ol>
<li>Meet <em>the essential requirements set out in Section 1 of Annex I</em></li>
<li>Assess the cybersecurity risks associated with their product</li>
<li>Ensure their supply chain does not compromise the security of their product</li>
<li>Document the security aspects of their product</li>
<li>Maintain the security of their product during its lifetime.</li>
</ol>
<p>These are all very sane principles, and no one could call these objectives into question. What’s revolutionary about the CRA is its very wide scope. In it, the legal definition of a “<em>product with digital elements”</em> includes not only the product itself, but also the back-end software and hardware with which the product is intended to work. From a legal and security perspective, this makes sense, but in practice it may have unforeseen consequences.</p>
<p>The section which may have more impact on manufacturers is <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:52022PC0454">Article 24</a>. It states that<em> “the manufacturer shall perform a conformity assessment of the product… and (of) the processes put in place by the manufacturer to determine whether the essential requirements set out in Annex I are met.”</em></p>
<p>This is a very positive approach, in that it tries to improve not only the security of a product, but also the processes which will ensure security during the product’s lifetime. Taking these processes into account is key, given the rapid evolution of today’s technologies. Yet, limiting security only to processes is insufficient to ensure complete protection. For the first time, a regulation seems to address both sides of the coin in a consistent manner.</p>
<p>Also interesting is the notion of defining a level-based approach for critical and highly-critical products. Indeed, some products’ security may have a direct impact on other systems, making it important that they meet higher security assurance standards.</p>
<p style="text-align: center;"><em><strong>The CRA denies authority to the market surveillance authority it creates</strong></em></p>
<p><strong>Diving into some key details</strong></p>
<p>Any company wishing to sell products in the European Market must read Annex I carefully, because it encompasses all the new requirements that any operator (manufacturer, distributor or importer) will have to comply with. Annex I is pretty straightforward, divided in two parts: one for the products, one for the vulnerability handling process.</p>
<p>The one sentence which will undoubtedly raise concern requires a product to be “<em>delivered without any </em><strong><em>known exploitable vulnerabilities</em></strong><strong>”</strong> when put on the market. This immediately raises the question of exactly what a “known exploitable vulnerability” is — and unfortunately, no legal definition appears in the CRA.</p>
<p>In fact, this term only appears in <a href="https://ec.europa.eu/newsroom/dae/redirection/document/89544">Annex I</a>, and the introductory memorandum of the legal text, but not in the text itself. The only related definition refers to an “<em>actively exploited vulnerability</em>,” which is <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:52022PC0454">defined in Article 3 (39)</a> as<em> “a vulnerability for which there is reliable evidence that execution of malicious code was performed by an actor on a system without permission of the system owner</em>.”</p>
<p>Is a known exploitable vulnerability a vulnerability that is known to have been actively exploited? Given the legal impact of an exploitable vulnerability (which forbids a product from being put on the market), it is therefore key to have a clear definition of it.</p>
<p>Why? Because virtually every product has some known exploitable vulnerabilities under certain definitions.</p>
<p>Let’s take the example of CPUs. “<em>General purpose microprocessors</em>” are listed among the most critical products under the CRA (see <a href="https://ec.europa.eu/newsroom/dae/redirection/document/89544">Annex III, Class II</a>). This makes sense, given the wide usage of CPUs in our IT systems. But it is also true that, by design, any CPU is prone to so-called “side channel” attacks, which can be exploited if certain conditions are met.</p>
<p>In simple terms, modern CPUs try to optimize their efficiency. To do so, they calibrate their performance (cache access, power consumption, etc.) based on program data submitted as input. Thus, modern CPUs — by their very nature — leak information about the programs being run on them. If a malevolent program is running in parallel on the same CPU, this information leak can be amplified to compromise sensitive information from a program.</p>
<p>In terms of risk assessment, everything can be documented, and <a href="https://atos.net/en/lp/securitydive/side-channel-attacks-on-cpu">most CPU vendors have already analyzed and described these threats</a>. However, laboratory testing has shown that it is possible for these small leaks to be exploited to extract cryptographic keys, but this is usually demonstrated on specially crafted programs.</p>
<p>So, are all CPUs condemned to be banned from the EU market due to the CRA? This question may be not as silly as it sounds, since Article 43 of the project raises another concern.</p>
<p>At first reading, this article seems to make sense. But from a legal perspective, it doesn’t leave a lot of freedom for the market surveillance authority. According to Article 43.1:</p>
<p><em>Where the market surveillance authority of a Member State has sufficient reasons to consider that a product… presents a significant cybersecurity risk, it shall carry out an evaluation of the product. Where… the market surveillance authority finds that the product with digital elements does not comply with the requirements laid down in this Regulation, it </em><strong><em>shall without delay require the relevant operator to take all appropriate corrective actions to bring the product into compliance</em></strong><em> with those requirements, to </em><strong><em>withdraw it from the market</em></strong><em>, or to </em><strong><em>recall it</em></strong><em>…</em></p>
<p>How will the “significant cybersecurity risk” be assessed? Does the existence of an exploitable vulnerability qualify? What about the CPU case we just outlined? Will a market surveillance authority risk ignoring a vulnerability presented as exploitable?</p>
<p>Let’s consider another recent incident, in which the open-source component Log4j put thousands of products at risk. How will the market surveillance authority perform an evaluation of all the impacted products? If this evaluation reveals any non-compliance, it is required to issue corrective actions to the relevant operator? The current wording doesn’t leave room for interpretation. In a sense, it denies the market surveillance authority its authority.</p>
<p>Another problematic aspect of the CRA is an unclear definition of the period during which security patches are to be delivered. Item 12 of Article 10 in the CRA obligates manufacturers to maintain full conformity with Annex I for five years or the expected lifetime of the product, whichever is shorter.</p>
<p>This obligation may lead to a domino effect. Let’s take the example of CPUs again. A CPU vendor that puts its product on the market must maintain security monitoring for five years, despite the CPU’s longer expected lifetime. Now assume that a server maker like Atos decides to embed this CPU in its server, but due to integration constraints, the server is put on the market one year later. Thus, the CPU in that server now only has four years of guaranteed security support remaining. Perhaps you also need some embedded GPUs in your server. It’s possible that these might have three years left in terms of maintenance.</p>
<p>Multiply that complexity with every embedded component and it becomes likely that after a year or two, one component or another will become obsolete. As a product vendor, you can find a functional replacement for the obsolete component, but if you no longer have support from the component vendor, is your vulnerability process still compliant?</p>
<p>Will you have to swap out every obsolete component in the servers you have already sold? This would change completely the economics of the manufacturing industry.</p>
<p style="text-align: center;"><em><strong>We have reached dangerous ground, where the regulator gives value to the bug, and denies value to the patch.</strong></em></p>
<p><strong>Where the CRA could backfire</strong></p>
<p>Despite these shortcomings, in my opinion the worst impacts are elsewhere in this regulation. It’s not from the legal part of the text (the Articles) but from Annex I. The last point of this annex refers to an operator’s obligation to “<em>ensure that, where security patches or updates are available to address identified security issues, they are disseminated without delay </em><strong><em>and free of charge</em></strong><em>, accompanied by advisory messages providing users with the relevant information, including on potential action to be taken.”</em></p>
<p>The other part of the vicious circle comes from item 36 in the preamble to the CRA, which promotes bug bounties. I have already <a href="https://www.linkedin.com/pulse/can-bounty-hunter-ethical-florent-chabaud/">expressed concern about this</a>, but I think we have now reached dangerous ground. Here, the regulator not only gives value to the bug and the vulnerability, but also denies value to the security patch.</p>
<p>This approach could be detrimental to the security of many products, because open-source developments are often financed by their support, and especially their security support. For example, the widely-used OpenSSL library is supported by an organization whose <a href="https://www.openssl.org/support/contracts.html">revenues come partly from providing extended support</a> on previous versions of its library.</p>
<p>Companies pay for this support because they want to have security fixes guaranteed for a long period, and because the stability of their products is not compatible with the never-ending development of new features. On the other end, making new versions available free-of-charge allows companies to rapidly implement new features, test them, and propose them in their new products.</p>
<p>Enforcing an obligation to work for free seems counterintuitive to me. Why incentivize bug finding but not security patching? If you pay for security patches, it’s more likely that you will apply them!</p>
<p>Given the legal risk and the amount of the penalties, some hackers could also be tempted to ransom companies by threatening to disclose their vulnerabilities. If you risk €150 million in penalties, you may opt to pay €1 million to prevent a public disclosure. Unless I’m wrong, the CRA puts the obligation on operators to disclose the vulnerability of their products to ENISA. The hackers are under no obligation to disclose vulnerabilities to the operators, to the market surveillance authorities, or to ENISA.</p>
<p>In my opinion, this obligation should be enforced free-of-charge — not the security patches, which require a lot of cost and effort to properly develop and validate, and which can be embedded in larger upgrade packages. Again, the purpose is to mitigate cybersecurity risks, not to obtain security for free, because this won’t happen.</p>
<p>&nbsp;</p>
<p><strong>Conclusion</strong></p>
<p>The new Cyber Resilience Act is a step in the right direction to improve the security of the digital products we all rely on. However, I feel strongly that a few of the requirements must be reconsidered before it comes into force, in order to avoid some of the negative consequences outlined above.</p>
<p>This guest blog is published with the kind permission of Atos and originally appeared <a href="https://atos.net/en/lp/securitydive/the-eu-cyber-resilience-act-brace-for-impact">here</a>.</p>
<p>If you want to learn more about the CRA and its impact, join our Roundtable on 17. April, where you can hear not only Florent Chabaud speak, but also listen to the position of the European Commission, the US NIST, standardization organizations, and industry. For agenda and registration, please go to <a href="https://iotac.eu/iot-day-roundtable-2023/">https://iotac.eu/iot-day-roundtable-2023/</a>!</p>
	</div>
</div>




			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://iotac.eu/the-eu-cyber-resilience-act-brace-for-impact/">The EU Cyber Resilience Act: Brace for impact!</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/the-eu-cyber-resilience-act-brace-for-impact/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Does the Cyber Resilience Act protect consumer devices enough?</title>
		<link>https://iotac.eu/does-the-cyber-resilience-act-protect-consumer-devices-enough/</link>
					<comments>https://iotac.eu/does-the-cyber-resilience-act-protect-consumer-devices-enough/#respond</comments>
		
		<dc:creator><![CDATA[Claudio Teixeira, BEUC - The European Consumer Organisation]]></dc:creator>
		<pubDate>Tue, 21 Mar 2023 11:16:52 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[IoT architecture]]></category>
		<category><![CDATA[IoT security]]></category>
		<category><![CDATA[security by design]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=11966</guid>

					<description><![CDATA[<p>The post <a href="https://iotac.eu/does-the-cyber-resilience-act-protect-consumer-devices-enough/">Does the Cyber Resilience Act protect consumer devices enough?</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69e5f4c822c75"  data-column-margin="default" data-midnight="dark"  class="wpb_row vc_row-fluid vc_row standard_section "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap" data-bg-animation="none" data-bg-overlay="false"><div class="inner-wrap"><div class="row-bg"  style=""></div></div><div class="row-bg-overlay" ></div></div><div class="row_col_wrap_12 col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone "  data-t-w-inherits="default" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0" >
		<div class="vc_column-inner" ><div class="column-bg-overlay-wrap" data-bg-animation="none"><div class="column-bg-overlay"></div></div>
			<div class="wpb_wrapper">
				
<div class="wpb_text_column wpb_content_element " >
	<div class="wpb_wrapper">
		<p>We live at a time when much of what we buy – watches, phones, fridges – is connected to the internet. Although technology has made our daily lives more comfortable, it has also made us more vulnerable.</p>
<p>Manufacturers have been keen to sell connected products, but often paid little attention to making them cybersecure. In other words, the market has not delivered. And the EU has been slow in setting effective rules to address this major problem.</p>
<p>Over the past years, Consumer organisations have <a href="https://www.test-achats.be/hightech/internet/news/maison-connectee">repeatedly flagged</a> that too many products on the market carry cybersecurity risks and lack the most basic security features. This must stop.</p>
<p>In proposing the Cyber Resilience Act, the European Commission took a major step forward. The law would establish EU-wide cybersecurity requirements by design and by default for all connected devices. However, there are still  key improvements to be made to ensure it can adequately protect consumers.</p>
<h3>Products should be secure before and after being placed on the market</h3>
<p>Consumers are right to expect that products on the market are not only safe and secure when they are sold, but during their expected lifetime. But the sad truth today is that products like PCs or smartphones only receive security updates for so long, after which they become vulnerable to hacking.</p>
<p>When manufacturers fail to protect their products with necessary software updates, these devices not only expose consumers to cybersecurity vulnerabilities, they also become slower, less performative, and sometimes unworkable way before their end date. Apart from causing consumer frustration and putting them at risk, this premature obsolescence fuels waste and is fundamentally at odds with efforts to align our society with planetary boundaries.</p>
<p>The new rules must ensure that consumer-facing connected products are protected before and for sufficiently long after they are bought: you can’t talk about real cybersecurity if a product you buy is only secure for a year when it can last for up to ten!</p>
<p>That is why BEUC is pushing for manufacturers to provide essential software updates during a product’s expected lifetime. The proposal only requires a maximum protection period of five years, which would leave all kinds of products unprotected beyond that timeframe. Think of dishwashers, fridges or TVs!</p>
<h3>Making sure a product is secure</h3>
<p>How can consumers be sure that a product is ultimately secure? The Commission proposal relies on self-assessment by the manufacturer for over 90% of products. That is a clear conflict of interest which has echoes of dieselgate: the manufacturer is also the certifier. Which company is going to contradict itself and say that a product it made is not in conformity with the law?</p>
<p>Consumers need more to go on than just the word of the manufacturer when their cybersecurity and personal safety are on the line.</p>
<p>Independent third parties should be tasked with verifying if a product is secure. This is especially important for certain products which, given their sensitive nature and potential risks of misuse by a cyber-attack, carry enormous risks for consumers, from violations of their fundamental rights (privacy, data protection) to even compromising their physical safety.</p>
<h3>What about us? Consumer devices are high risk too</h3>
<p>The new rules do recognise that certain products are too risky to leave to self-certification by the manufacturer. Although this is a step in the right direction, the option to put forward a short closed list of critical devices risks barely scratching the surface of high-risk products: without a risk methodology with clear criteria that can be applied to all products  this legislation risks overlooking many sectors. In particular, this closed list clearly risks overlooking one key stakeholder: consumers.  The proposal leaves out consumer devices from this list. The law should be aligned with what consumers expect: it should recognise the real risks posed by devices in our homes which, if hacked, have the potential to cause significant harm and substantial damage to us.</p>
<p>For example, it is astonishing that home internet routers are not considered important enough to go through third-party certification. And there are other consumer devices which should require mandatory certification, given the sensitivity of their use and private location (children’s devices, smart home systems, security devices) for which the manufacturers’ word is not good enough.</p>
<h3>When everything else fails</h3>
<p>New EU rules must provide a clear answer to the following question: what can consumers do once the harm has occurred? At the very least, consumers should be able to hold manufacturers to account. There should be a clear mechanism for reporting problems directly to manufacturers from the beginning. Consumers should also have accessible means to engage with public authorities, who have every reason to welcome the (much needed) help of civil society in the market screening and enforcement process.</p>
<p>And just as importantly, consumers must be able to demand compensation for damages caused by the lack of conformity with these rules. That means they need effective redress including the possibility to launch collective actions when many consumers have been affected by the same harm. It is therefore crucial the Cyber-Resilience Act is added to the annex of the Representative Actions Directive.</p>
<p>In conclusion, the Commission proposal for a Cyber Resilience Act is a much-welcomed first step to addressing some of the key issues currently facing consumers. However, this proposal can still go further: <a href="https://www.beuc.eu/sites/default/files/publications/BEUC-X-2023-006_The_Cyber_Resilience_Act_Proposal.pdf">BEUC has issued key recommendations</a> on key improvements to ensure that the CRA proposal is truly fit for purpose. It is now up to EU legislators to deliver.</p>
<p>&nbsp;</p>
<p>This guest blog is published with the kind permission of BEUC &#8211; The European Consumer Organization and originally appeared <a href="https://www.beuc.eu/blog/does-the-cyber-resilience-act-protect-consumer-devices-enough/">here</a>.</p>
<p>If you want to learn more about the CRA and its impacts, join our Roundtable on 17. April, where you can hear not only Claudio Teixeira speak, but also listen to the position of the European Commission, the US NIST, standardization organizations, and industry. For agenda and registration, please see <a href="https://iotac.eu/iot-day-roundtable-2023/">https://iotac.eu/iot-day-roundtable-2023/</a>!</p>
	</div>
</div>




			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://iotac.eu/does-the-cyber-resilience-act-protect-consumer-devices-enough/">Does the Cyber Resilience Act protect consumer devices enough?</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/does-the-cyber-resilience-act-protect-consumer-devices-enough/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Top 8 Things You Should Know About the EU Cyber Resilience Act (CRA)</title>
		<link>https://iotac.eu/top-8-things-you-should-know-about-the-eu-cyber-resilience-act-cra/</link>
					<comments>https://iotac.eu/top-8-things-you-should-know-about-the-eu-cyber-resilience-act-cra/#respond</comments>
		
		<dc:creator><![CDATA[Red Alert Labs]]></dc:creator>
		<pubDate>Thu, 09 Mar 2023 08:47:38 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[IoT architecture]]></category>
		<category><![CDATA[IoT security]]></category>
		<category><![CDATA[security by design]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=11769</guid>

					<description><![CDATA[<p>The post <a href="https://iotac.eu/top-8-things-you-should-know-about-the-eu-cyber-resilience-act-cra/">Top 8 Things You Should Know About the EU Cyber Resilience Act (CRA)</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69e5f4c823642"  data-column-margin="default" data-midnight="dark"  class="wpb_row vc_row-fluid vc_row standard_section "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap" data-bg-animation="none" data-bg-overlay="false"><div class="inner-wrap"><div class="row-bg"  style=""></div></div><div class="row-bg-overlay" ></div></div><div class="row_col_wrap_12 col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone "  data-t-w-inherits="default" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0" >
		<div class="vc_column-inner" ><div class="column-bg-overlay-wrap" data-bg-animation="none"><div class="column-bg-overlay"></div></div>
			<div class="wpb_wrapper">
				
<div class="wpb_text_column wpb_content_element " >
	<div class="wpb_wrapper">
		<p>More and more successful cyberattacks are targeting hardware and software products, leading to an estimated global annual cost of cybercrime of EUR 5.5 trillion by 2021 according to the EU commission. This is due mainly, on one side, to the lack of appropriate security in such products who often go to market including inherent vulnerabilities and on the other side, to the lack of awareness of the consumers or enterprises adopting those products due to an insufficient transparency of the manufacturers when it comes expressing their level of security.</p>
<p>This is why, on September 15, 2022, the <a style="font-weight: inherit;" href="https://digital-strategy.ec.europa.eu/en/library/cyber-resilience-act" data-type="web">European Commission</a> published the EU Cyber Resilience Act (CRA) regulation proposal necessary to increase the level of trust among users and the attractiveness of EU products with digital elements while providing legal certainty.</p>
<p>The regulation is very exhaustive, and we would recommend you to go through it in details. In the meantime, here are the top 8 things you should know about the EU Cyber Resilience Act that we just picked for you&#8230;</p>
<p>&nbsp;</p>
<p><strong>1- Am I concerned?</strong></p>
<p>Yes, if you are a manufacturer, importer or distributor of connected products (Hardware/Software) with digital elements (e.g. smart sensors, smart cameras, mobile devices, network devices, etc.). All market sectors are concerned in a horizontal way except sectors where some other EU regulations already applies such as in the medical, civil aviation, motor vehicles domains. Note that this can consist also of non-embedded software (software that can be made available without hardware). For instance services such as SaaS applications are not<br />
within the scope of this regulation unless these are used to remote processing the product at a distance which is under the responsibility of the product manufacturer and the absence of which would prevent such product from performing one of its functions. Finally, Free and<br />
open-source software supplied outside of a commercial activity should not be covered by this regulation.</p>
<p>&nbsp;</p>
<p><strong>2- What are my obligations?</strong></p>
<p>One of the main goals of the CRA is to cover the entire lifecycle of digital products. So your first obligation would be to insure that a list of essential cybersecurity requirements and harmonized rules have been considered at all stages including the design phase, delivery,<br />
actual product use, maintenance decommission, and disposal. Security by design, security by default, the security of the supply chain and vulnerability handling will be the main domains to be addressed. Secondly you need to conduct and document a security risk assessment and<br />
provide user guidance. You must report actively exploited vulnerabilities and provide security updates for at least five years. If you know or have reason to believe that the product or the processes put in place by the manufacturer are not in conformity with the CRA essential requirements, you shall immediately take the corrective measures necessary, to withdraw or to recall the product as appropriate and notify ENISA within 24 hours.</p>
<p>&nbsp;</p>
<p><strong>3- How should I demonstrate conformity?</strong></p>
<p>Most common families of digital products belong to non-critical risk category requiring a conformity self-assessment that should be carried out under your responsibility. Some other products considered belonging to higher risk categories will be qualified critical (Class I) and might require additional assurance requirements to be satisfied by applying harmonised standards or the EU cybersecurity certification schemes such as the EUCC or the EUCS and that could be under your responsibility or through a third-party CAB. Some other highly critical (Class II) products should always involve a third-party CAB. Finally, certified products according to the EU cybersecurity certification schemes such as the EUCC developed under the CSA are supposed to satisfy by default the EU Cyber Resilience Act requirements and can provide a presumption of conformity.</p>
<p>&nbsp;</p>
<p><strong>4- How does it relate to other EU policies?</strong></p>
<p>The CRA complements the existing Directive on the security of Network and Information Systems (NIS2) and the existing EU Cybersecurity Act (EU CSA). It is also based on the New Legislative Framework (NLF) for industrial products, which aims to improve market surveillance and the quality of conformity assessments. It is expected to satisfy the Radio Equipment Directive (RED) cybersecurity-related requirements. This means that RED-related harmonised cybersecurity standards (under development) will most probably serve as basis for the EU CRA essential requirements.</p>
<p>&nbsp;</p>
<p><strong>5- What are the potential Costs vs Benefits?</strong></p>
<p>It is estimated that any compliance costs for businesses would be outweighed by the benefits brought by a higher level of security of products, by preventing divergent security requirements and an increase of trust of users and market adoption. It also increases positive competitiveness and quality standards by levelling the playing field. It would reduce the number of incidents, incident handling costs and reputational damage. For the EU this means roughly 180 to 290 billion Euros of consequence costs could be avoided. Finally, non-compliance with the CRA essential cybersecurity requirements and all relevant obligations shall be subject to fines of up to 15 000 000 EUR or, if the offender is an undertaking, up to 2.5 % of its total annual turnover for the preceding financial year, whichever is higher.</p>
<p>&nbsp;</p>
<p><strong>6- By when it will be applicable?</strong></p>
<p>The proposal will now pass to the European Parliament and Council that will form their own positions before coming together for the trialogue negotiations in Q3/Q4 2023. So in order for all stakeholders (manufacturers, distributors, importers, CABs, Member States, ENISA, etc.) to adapt to the new requirements, the proposed CRA regulation will become applicable 24 months (at the latest by Q1 2026) after its entry into force, except for the reporting obligation on the manufacturer, which would apply from 12 months (most probably by Q1 2025) after the date of entry into force.</p>
<p>&nbsp;</p>
<p><strong>7- How could I recognize a conformant product?</strong></p>
<p>I&#8217;m sure you&#8217;re all familiar with CE marking which you could find on all products circulating in the EU. This same mark will indicate the conformity of all products with digital elements with this regulation. Only beta releases for testing purposes could be issued without that mark as long as these are time limited to testing purposes. Most importantly, importers of products with digital elements must ensure in addition to checking on the CE marking that the appropriate assessment procedures have been carried out by the manufacturer depending on the risk assessment and that the manufacturer has created all required technical documentation.</p>
<p>&nbsp;</p>
<p><strong>8- Yes, you could appoint an authorized representative</strong></p>
<p>Indeed, as a manufacturer you could mandate an external authorised representative who could discharge you from the EU declaration of conformity management and for market surveillance purposes.</p>
<p>Finally, it&#8217;s not too early to start planning accordingly, adapt your digital product strategy and chose the right specialized partners to avoid missing the EU single market access opportunity.</p>
<p>&nbsp;</p>
<p>This guest blog is published with the kind permission of <a href="https://www.redalertlabs.com/">Red Alerts Lab</a> and originally appeared <a href="https://www.redalertlabs.com/blog/top-8-things-you-should-know-about-the-eu-cyber-resilience-act-cra">here</a>.</p>
<p>If you want to learn more about the CRA and its impact, join our Roundtable  on 17. April, where you can listen to the position of the European Commission, the US NIST, standardization organizations, and industry. For agenda and registration, please go to <a href="https://iotac.eu/iot-day-roundtable-2023/">https://iotac.eu/iot-day-roundtable-2023/</a>!</p>
	</div>
</div>




			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://iotac.eu/top-8-things-you-should-know-about-the-eu-cyber-resilience-act-cra/">Top 8 Things You Should Know About the EU Cyber Resilience Act (CRA)</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/top-8-things-you-should-know-about-the-eu-cyber-resilience-act-cra/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
