Data Protection
The capability to protect IoT device data to meet organizational requirements.
Cryptography Capabilities and Support
Ability for the IoT device to use cryptography for data protection. Elements that may be necessary:
- Ability to execute cryptographic mechanisms of appropriate strength and performance.
- Ability to obtain and validate certificates.
- Ability to verify digital signatures.
- Ability to run hashing algorithms.
- Ability to perform authenticated encryption algorithms.
- Ability to compute and compare hashes.
Cryptographic Key Management
Ability to manage cryptographic keys securely:
- Ability to generate key pairs.
- Ability to store encryption keys securely.
- Ability to change keys securely.
Secure Storage
Ability for the IoT device, or tools used through the IoT device interface, to enable secure device storage. Elements that may be necessary:
- Ability to support encryption of data at rest.
- Ability to cryptographically store passwords at rest, as well as device identity and other authentication data.
- Ability to support data encryption and signing to prevent data from being altered in device storage.
- Ability to secure data in device storage.
- Ability to secure data stored locally on the device.
- Ability to secure data stored in remote storage areas (e.g., cloud, server, etc.).
- Ability to utilize separate storage partitions for system and user data.
- Ability to “sanitize” or “purge” specific or all data in the device.
Secure Transmission
Ability to secure data transmissions sent to and from the IoT device. Elements that may be necessary:
- Ability to configure the cryptographic algorithm to protect data in transit.
- Ability to support trusted data exchange with a specified minimum strength cryptography algorithm.
- Ability to support data encryption and signing to prevent data from being altered in transit.
- Ability to utilize one or more capabilities to protect the data it transmits from unauthorized access and modification.
- Ability to use cryptographic means to validate the integrity of data transmitted.