D2.4 presents the current set of the baseline security requirements of the planned architecture.
The document identifies the assets that need protection based on the high-level processes commonly found in IoT systems, as well as formulates and prioritizes threats to the identified assets. Threats are expressed as potential misuse cases, which must be prevented. These misuse cases are used to derive the necessary countermeasures, which are defined by the elaborated security requirements. The document prepared with the lead of security experts of the Budapest University of Technology and Economics is based on interviews with key stakeholders, the pilot operators of the project, industry best practices, as well as standards of NIST, ETSI and ISO.
The contents of the deliverable reflect only the project Consortium’s view and the Commission is not responsible for any use that may be made of the information it contains.