- ICO Warns of Festive Mobile Phone Privacy Snafu
- La colaboración entre Seguridad y FinOps puede generar beneficios ocultos en la nube
- El papel del CIO en 2024: una retrospectiva del año en clave TI
- How control rooms help organizations and security management
- ITDM 2025 전망 | “효율경영 시대의 핵심 동력 ‘데이터 조직’··· 내년도 활약 무대 더 커진다” 쏘카 김상우 본부장
Standards Body Publishes Guidelines for IoT Security Testing
A leading industry standards community has published its first guidelines for the testing of IoT security products, in a bid to drive independent benchmarking and certification efforts.
The Anti-Malware Testing Standards Organization (AMTSO) said its Guidelines for Testing of IoT Security Products document was produced with input from testers and vendors.
AMTSO board member, Vlad Iliushin, argued that this is a currently under-served space, meaning users still don’t have good enough visibility into the pros and cons of products on the market.
“The testing of IoT security solutions is quite different from anti-malware testing as they need to protect a huge variety of different smart devices in businesses and homes, so the setup of the test environment can be challenging,” he added.
“Also, as smart devices mostly are primarily run on Linux, testers have to use specific threat samples that these devices are vulnerable to in order to make their evaluations relevant. With our guidelines, we addressed these particularities, hoping that they provide valuable guidance that can set the direction in fair IoT security testing.”
The guidelines cover six key areas:
- General principles that all tests and benchmarks focus on validating end results and performance rather than back-end functionality
- Sample selection, involving guidance for challenges with choosing the right samples for IoT security solution benchmarking
- Determination of “detection”, as IoT security solutions work differently from traditional cybersecurity products when it comes to detections and actions taken
- Test environment, including advice for testers who choose not to execute in a controllable environment using real devices
- Testing of specific security functionality in different attack stages such as reconnaissance, initial access and execution
- Performance benchmarking
Mike Parkin, senior technical engineer at Vulcan Cyber, argued that IoT devices are difficult to patch, meaning they rely on external security tools to help protect the attack surface.
“With AMTSO’s guidelines, organizations can get a better understanding of what tools are most effective and best suited to their environment,” he added.
“This follows various other testing standards for anti-malware, anti-virus and firewalls. How effective the new standard will be in practice remains to be seen, but it is a good starting point.”