Even as the number of events and coverage of the Internet of Things, or IOT, continues to accelerate, security has become hot. Last week, EE Times noted a number of efforts around how to secure an increasingly large and complex piece of our infrastructure and daily lives.
TCG has been a part of this security effort and recently collected comments on its IoT guidance document, seen here. This guide outlines a number of steps developers and designers can use to secure their IoT devices and applications – including industry standards-based approaches and existing tools and solutions. More on that here. Thanks to the many who provided comments; we are revising the document based on the excellent feedback and will publish a new version soon.
TCG members as always also continue to be active in other industry groups including the Industrial Internet Consortium and IETF, among others. TCG’s standards have been developed with input from many industry stakeholders, and we anticipate working with various groups to ensure that the core concepts of trust are applied and supported.
For example, almost all boards shipped today for embedded and industrial systems include a TPM that can be used for securing keys, certificates and passwords and used for better authentication and remove provisioning. And TCG has worked with NIST and other groups to create a standards-based secure overlay network for legacy (existing) SCADA and other industrial control systems networks that are open to attacks.
Watch for TCG’s new IoT architect’s guide and for upcoming presentations at the Embedded TechCon event in June, San Francisco; ESC Silicon Valley, July 2015 and the IoT Developer’s Conference. TCG also will speak on a panel at the September IoT conference hosted by SecurityLedger.com. For info and dates, please see our events calendar, https://trustedcomputinggroup.org/media_room/events.
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.