GSMA IoT Security Assessment Checklist

Sunday 30 Sep 2018 | Build | Concept | Decommissioning | Delivery | Deployment | Design and Development | Operational | Procurement |

Without security, the Internet of Things will cease to exist. To enable a secure market, companies have to take responsibility to embed security from the beginning and at every stage of the IoT value chain.

The GSMA, together with the mobile industry, has devised a range of valuable resources providing guidance and expertise to help companies with the challenge of securing the connected future. The set of IoT security guideline documents includes 85 detailed recommendations for the secure design, development and deployment of IoT services

Audience: Risk practitioner, Technical security practitioner

Resource technology specifics: Internet of Things (IoT)

Resource type: Guideline

Resource enforcement: Voluntary

Resource certification type: Self-assessment

Advantage Disadvantage
  • The guidelines cover networks as well as IoT service and endpoint ecosystems
  • Address security challenges, attack models and risk assessments
  • Provide several worked examples
  • Provide a flexible framework that addresses the diversity of the IoT market
  • Not widely embedded in the IoT Supply Chain
  • Self-assessment
Read more about GSMA IoT Security