Logical Access to Interfaces

See also the technical counterpart to this section

The management and operational controls to support secure IoT device interface capabilities according to the requirements established by the organization.

Policies and procedures for access control capabilities.

Policies and procedures provide the details necessary to implement management and operational controls to support the organizational access control requirements on IoT devices. Actions that may be necessary:

Manufacturer:

Agency:

Policies and procedures for situations where identification and authentication are not needed.

Policies and procedures provide the details necessary to implement management and operational controls to support the organizational requirements for determining circumstances when identification and authentication are not needed to be used with IoT devices for specified organizationally-defined user actions. Actions that may be necessary:

Manufacturer:

Agency:

Policies and procedures for managing role-based access controls.

Policies and procedures provide the details necessary to implement management and operational controls in situations where access controls are not necessary on an individual basis, but are based on the role of the IoT device user. Some examples:

Actions that may be necessary:

Manufacturer:

Agency:

Policies and procedures for including security and privacy requirements in third party contractual agreements.

Policies and procedures provide the details necessary to implement management and operational controls for including security and privacy requirements within third party contractual agreements that involve access to, and/or use of, the IoT device by third parties. Actions that may be necessary:

Manufacturer

Agency:

Policies and procedures for device interface controls.

Policies and procedures provide the details necessary to implement management and operational controls for the necessary logical and remote access IoT device controls through device interfaces for information transmission between devices and subjects, objects, systems and components within the system. Actions that may be necessary:

Manufacturer:

Agency:

Policies and procedures for required authentication techniques.

Policies and procedures establish the capabilities necessary to support required IoT control techniques, such as PIV authentication. Actions that may be necessary:

Manufacturer:

Agency:

Policies and procedures for implementing only products in the NIST-approved products list.

Policies and procedures provide the details necessary to implement management and operational controls to allow the use of only IoT devices within the organizational system that are on the Federal Information Processing Standards (FIPS) 201 approved products list for Personal Identity Verification (PIV) capability, as applicable to the use and purpose for each IoT device, unless allowed by the organizational security policy or appropriate management approval. Actions that may be necessary:

Manufacturer:

Agency: