*Due to the significant interest from our members, the DSG working group will undertake a maintenance update to the IOT guideline documents. The purpose of this update is to ensure that they are up to date with our rapidly-evolving 5G world, and we anticipate work on the new versions will be complete Q3/Q4 of 2023*
Promoting best practice for the secure design, development and deployment of IoT services, and providing a mechanism to evaluate security measures, the GSMA IoT Security Guidelines and IoT Security Assessment help create a secure IoT market with trusted, reliable services that can scale as the market grows.
The GSMA IoT Security Guidelines:
Include 85 detailed recommendations for the secure design, development and deployment of IoT services
Cover networks as well as service and endpoint ecosystems
Address security challenges, attack models and risk assessments
Provide several worked examples
The GSMA IoT Security Assessment:
Is based on a structured approach and concise security controls
Covers the whole ecosystem
Can fit into a supply chain model
Provides a flexible framework that addresses the diversity of the IoT market
IoT Security Guidelines: Overview Document
This document provides a detailed overview and serves as an overarching model for interpreting what aspects of a technology or service are relevant to the imple…
The Service Ecosystem includes all components that make up the core of the IoT infrastructure. Components in this ecosystem are, for example, services, servers,…
An Endpoint, from an IoT perspective, is a physical computing device that performs a function or task as a part of an Internet connected product or service. An …
This document provides top-level security guidelines for Network Operators who intend to provide services to IoT service providers to ensure system security and…
The GSMA IoT Security Assessment provides a flexible framework that addresses the diversity of the IoT market, enabling companies to build secure IoT devices an…