{"id":9794,"date":"2018-11-20T02:00:57","date_gmt":"2018-11-20T02:00:57","guid":{"rendered":"https:\/\/www.engineernewsnetwork.com\/blog\/?p=9794"},"modified":"2018-11-19T11:59:49","modified_gmt":"2018-11-19T11:59:49","slug":"iotsf-publishes-enterprise-iot-security-architecture-and-policy-whitepaper","status":"publish","type":"post","link":"https:\/\/www.engineernewsnetwork.com\/blog\/iotsf-publishes-enterprise-iot-security-architecture-and-policy-whitepaper\/","title":{"rendered":"IoTSF publishes Enterprise IoT Security Architecture and Policy Whitepaper"},"content":{"rendered":"<p>The IoT Security Foundation (IoTSF) announces today a new whitepaper that outlines the benefits that accrue by taking a hub-based approach to connecting IoT devices and systems in the enterprise.<\/p>\n<figure id=\"attachment_9795\" aria-describedby=\"caption-attachment-9795\" style=\"width: 211px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/11\/11816-Enterprise-Hub-IoT-Security-Architecture.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-9795\" src=\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/11\/11816-Enterprise-Hub-IoT-Security-Architecture-211x300.jpg\" alt=\"IoTSF publishes Enterprise IoT Security Architecture and Policy Whitepaper\" width=\"211\" height=\"300\" \/><\/a><figcaption id=\"caption-attachment-9795\" class=\"wp-caption-text\">Hub-based approach provides a user-friendly centralised management solution<\/figcaption><\/figure>\n<p>Entitled IoT Security Architecture and Policy for the Enterprise &#8211; a Hub Based Approach the whitepaper proposes a hub-centric architecture approach that will accommodate contemporary and future possibilities.<\/p>\n<p>\u201cThe hub is central to the reference architecture, aggregating information and communicating directly with other devices and network elements in the IoT environment,\u201d says Richard Marshall, Plenary Chair IoTSF. \u201cIt can be visualised at the Edge of the network, providing a secure gateway for communication between networks.\u201d<\/p>\n<p>The hub architecture provides an extra layer of defence for the wider enterprise network and for those devices that may have minimal or no built-in security features.<br \/>\n<script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<ins class=\"adsbygoogle\" style=\"display: block; text-align: center;\" data-ad-layout=\"in-article\" data-ad-format=\"fluid\" data-ad-client=\"ca-pub-7565662001938327\" data-ad-slot=\"7585079586\"><\/ins><br \/>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><br \/>\nBy aggregating information at a single point, all devices or groups of devices and other hubs, such as gateways deployed within the local IoT network, are managed centrally. This approach provides a robust and secure architecture beyond other options such a \u2018tree\u2019 or \u2018hub-and-spoke\u2019.<\/p>\n<p>\u201cIt is important that enterprises are proactive in the way they build and manage their networks as IoT deployments increase. Good design anticipates the evolution of systems over time and extend beyond immediate requirements. Enterprises should therefore identify the primary IoT and security management needs for their organisation in advance of standard solutions becoming available,\u201d continues Marshall.<\/p>\n<p>By taking a layered approach to the security challenge and life cycle management tools in the enterprise IoT deployment, the hub architecture supports key principles of security assurance and good practice.<\/p>\n<p>These include network management, connecting devices securely, software maintenance and provision for end-of-life.<\/p>\n<p>As a result, it may also support a number of specific compliance requirements.<\/p>\n<p>For example, it may help mitigate risk associated with cyber security and data protection regulations, such as the recent European General Data Protection Regulation (GDPR) or support adoptions of the US Cybersecurity Information Sharing Act (CISA).<\/p>\n<p>John Moor, Managing Director IoTSF adds: \u201cThis approach to enterprise IoT security is part of a series of hub-based architectures we are publishing that have been applied to a number of IoT contexts. Each illustrates the benefits that may accrue in the specific environment and all are considered to be a good approach to achieving common security goals of confidentiality, integrity and availability.\u201d<\/p>\n<p>To download the whitepaper, click <span class=\"highlight highlight-blue\"><a href=\"https:\/\/www.iotsecurityfoundation.org\/best-practice-guidelines\" target=\"_blank\" rel=\"noopener\">HERE<\/a><\/span>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The IoT Security Foundation (IoTSF) announces today a new whitepaper that outlines the benefits that accrue by taking a hub-based approach to connecting IoT devices and systems in the enterprise. Entitled IoT Security Architecture and Policy for the Enterprise &#8211; a Hub Based Approach the whitepaper proposes a hub-centric architecture approach that will accommodate contemporary &hellip;<\/p>\n","protected":false},"author":1,"featured_media":9795,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[199],"tags":[5260,5259,5261],"class_list":["post-9794","post","type-post","status-publish","format-standard","has-post-thumbnail","","category-news-views-and-opinion","tag-internet-of-things-security-foundation","tag-iot-security-architecture-and-policy-whitepaper","tag-iotsf"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IoTSF publishes Enterprise IoT Security Architecture and Policy Whitepaper - Engineer News Network<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.engineernewsnetwork.com\/blog\/iotsf-publishes-enterprise-iot-security-architecture-and-policy-whitepaper\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IoTSF publishes Enterprise IoT Security Architecture and Policy Whitepaper - Engineer News Network\" \/>\n<meta property=\"og:description\" content=\"The IoT Security Foundation (IoTSF) announces today a new whitepaper that outlines the benefits that accrue by taking a hub-based approach to connecting IoT devices and systems in the enterprise. Entitled IoT Security Architecture and Policy for the Enterprise &#8211; a Hub Based Approach the whitepaper proposes a hub-centric architecture approach that will accommodate contemporary &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.engineernewsnetwork.com\/blog\/iotsf-publishes-enterprise-iot-security-architecture-and-policy-whitepaper\/\" \/>\n<meta property=\"og:site_name\" content=\"Engineer News Network\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-20T02:00:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/11\/11816-Enterprise-Hub-IoT-Security-Architecture-e1542628766146.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1169\" \/>\n\t<meta property=\"og:image:height\" content=\"719\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/iotsf-publishes-enterprise-iot-security-architecture-and-policy-whitepaper\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/iotsf-publishes-enterprise-iot-security-architecture-and-policy-whitepaper\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\"},\"headline\":\"IoTSF publishes Enterprise IoT Security Architecture and Policy Whitepaper\",\"datePublished\":\"2018-11-20T02:00:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/iotsf-publishes-enterprise-iot-security-architecture-and-policy-whitepaper\\\/\"},\"wordCount\":423,\"image\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/iotsf-publishes-enterprise-iot-security-architecture-and-policy-whitepaper\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/11816-Enterprise-Hub-IoT-Security-Architecture-e1542628766146.jpg\",\"keywords\":[\"Internet of Things Security Foundation\",\"IoT Security Architecture and Policy Whitepaper\",\"IoTSF\"],\"articleSection\":[\"News, Views and Opinion\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/iotsf-publishes-enterprise-iot-security-architecture-and-policy-whitepaper\\\/\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/iotsf-publishes-enterprise-iot-security-architecture-and-policy-whitepaper\\\/\",\"name\":\"IoTSF publishes Enterprise IoT Security Architecture and Policy Whitepaper - Engineer News Network\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/iotsf-publishes-enterprise-iot-security-architecture-and-policy-whitepaper\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/iotsf-publishes-enterprise-iot-security-architecture-and-policy-whitepaper\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/11816-Enterprise-Hub-IoT-Security-Architecture-e1542628766146.jpg\",\"datePublished\":\"2018-11-20T02:00:57+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/iotsf-publishes-enterprise-iot-security-architecture-and-policy-whitepaper\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/iotsf-publishes-enterprise-iot-security-architecture-and-policy-whitepaper\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/iotsf-publishes-enterprise-iot-security-architecture-and-policy-whitepaper\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/11816-Enterprise-Hub-IoT-Security-Architecture-e1542628766146.jpg\",\"contentUrl\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/11816-Enterprise-Hub-IoT-Security-Architecture-e1542628766146.jpg\",\"width\":1169,\"height\":719,\"caption\":\"Hub-based approach provides a user-friendly centralised management solution\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/iotsf-publishes-enterprise-iot-security-architecture-and-policy-whitepaper\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IoTSF publishes Enterprise IoT Security Architecture and Policy Whitepaper\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/\",\"name\":\"Engineer News Network\",\"description\":\"The ultimate online news and information resource for today's engineer\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\",\"name\":\"admin\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IoTSF publishes Enterprise IoT Security Architecture and Policy Whitepaper - Engineer News Network","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.engineernewsnetwork.com\/blog\/iotsf-publishes-enterprise-iot-security-architecture-and-policy-whitepaper\/","og_locale":"en_GB","og_type":"article","og_title":"IoTSF publishes Enterprise IoT Security Architecture and Policy Whitepaper - Engineer News Network","og_description":"The IoT Security Foundation (IoTSF) announces today a new whitepaper that outlines the benefits that accrue by taking a hub-based approach to connecting IoT devices and systems in the enterprise. Entitled IoT Security Architecture and Policy for the Enterprise &#8211; a Hub Based Approach the whitepaper proposes a hub-centric architecture approach that will accommodate contemporary &hellip;","og_url":"https:\/\/www.engineernewsnetwork.com\/blog\/iotsf-publishes-enterprise-iot-security-architecture-and-policy-whitepaper\/","og_site_name":"Engineer News Network","article_published_time":"2018-11-20T02:00:57+00:00","og_image":[{"width":1169,"height":719,"url":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/11\/11816-Enterprise-Hub-IoT-Security-Architecture-e1542628766146.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/iotsf-publishes-enterprise-iot-security-architecture-and-policy-whitepaper\/#article","isPartOf":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/iotsf-publishes-enterprise-iot-security-architecture-and-policy-whitepaper\/"},"author":{"name":"admin","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1"},"headline":"IoTSF publishes Enterprise IoT Security Architecture and Policy Whitepaper","datePublished":"2018-11-20T02:00:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/iotsf-publishes-enterprise-iot-security-architecture-and-policy-whitepaper\/"},"wordCount":423,"image":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/iotsf-publishes-enterprise-iot-security-architecture-and-policy-whitepaper\/#primaryimage"},"thumbnailUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/11\/11816-Enterprise-Hub-IoT-Security-Architecture-e1542628766146.jpg","keywords":["Internet of Things Security Foundation","IoT Security Architecture and Policy Whitepaper","IoTSF"],"articleSection":["News, Views and Opinion"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/iotsf-publishes-enterprise-iot-security-architecture-and-policy-whitepaper\/","url":"https:\/\/www.engineernewsnetwork.com\/blog\/iotsf-publishes-enterprise-iot-security-architecture-and-policy-whitepaper\/","name":"IoTSF publishes Enterprise IoT Security Architecture and Policy Whitepaper - Engineer News Network","isPartOf":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/iotsf-publishes-enterprise-iot-security-architecture-and-policy-whitepaper\/#primaryimage"},"image":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/iotsf-publishes-enterprise-iot-security-architecture-and-policy-whitepaper\/#primaryimage"},"thumbnailUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/11\/11816-Enterprise-Hub-IoT-Security-Architecture-e1542628766146.jpg","datePublished":"2018-11-20T02:00:57+00:00","author":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1"},"breadcrumb":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/iotsf-publishes-enterprise-iot-security-architecture-and-policy-whitepaper\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.engineernewsnetwork.com\/blog\/iotsf-publishes-enterprise-iot-security-architecture-and-policy-whitepaper\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/iotsf-publishes-enterprise-iot-security-architecture-and-policy-whitepaper\/#primaryimage","url":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/11\/11816-Enterprise-Hub-IoT-Security-Architecture-e1542628766146.jpg","contentUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/11\/11816-Enterprise-Hub-IoT-Security-Architecture-e1542628766146.jpg","width":1169,"height":719,"caption":"Hub-based approach provides a user-friendly centralised management solution"},{"@type":"BreadcrumbList","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/iotsf-publishes-enterprise-iot-security-architecture-and-policy-whitepaper\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.engineernewsnetwork.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IoTSF publishes Enterprise IoT Security Architecture and Policy Whitepaper"}]},{"@type":"WebSite","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#website","url":"https:\/\/www.engineernewsnetwork.com\/blog\/","name":"Engineer News Network","description":"The ultimate online news and information resource for today's engineer","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.engineernewsnetwork.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1","name":"admin","url":"https:\/\/www.engineernewsnetwork.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/9794","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/comments?post=9794"}],"version-history":[{"count":1,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/9794\/revisions"}],"predecessor-version":[{"id":9796,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/9794\/revisions\/9796"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/media\/9795"}],"wp:attachment":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/media?parent=9794"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/categories?post=9794"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/tags?post=9794"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}