{"id":12089,"date":"2019-09-17T21:59:03","date_gmt":"2019-09-17T20:59:03","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=12089"},"modified":"2020-01-02T16:42:28","modified_gmt":"2020-01-02T15:42:28","slug":"life-cycle-iot-security","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/life-cycle-iot-security\/","title":{"rendered":"A life cycle approach for IoT security"},"content":{"rendered":"<p>As with employee or customer identity management, the life cycle approach of connected objects within the Internet of Things (IoT) makes it possible to address all security issues. This article presents the key elements of this methodology and the major points to be addressed at each event in the life of a connected object.<\/p>\n<h2>What are the risks in the iot world?<\/h2>\n<p>The IoT advent has enabled millions of new potential technological advantages for consumers and companies. However, with <strong>these new advantages<\/strong>, certain risks are higher in the field of connected devices.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"post-12098 media-12098\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-12098 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/image1.png\" alt=\"\" width=\"1441\" height=\"977\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/image1.png 1441w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/image1-282x191.png 282w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/image1-768x521.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/image1-58x39.png 58w\" sizes=\"auto, (max-width: 1441px) 100vw, 1441px\" \/><\/figure>\n<p style=\"text-align: center;\"><em>Figure 1 \u2013 Most significant risks in the IoT world<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>These business and technological risks which could cause significant potential impacts for consumers and companies, should be identified <strong>from the upstream phases of an IoT project.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>Which project methodology to choose in order to ensure security of connected devices?<\/h2>\n<p>Even though security issues to address in IoT project are common for all project, we think necessary <strong>to structure reflections regarding the life cycle of the connected device<\/strong>.<\/p>\n<p>The diagram below highlights all the stages of their life cycle.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-12096 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/image2.png\" alt=\"\" width=\"1479\" height=\"755\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/image2.png 1479w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/image2-374x191.png 374w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/image2-768x392.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/image2-71x36.png 71w\" sizes=\"auto, (max-width: 1479px) 100vw, 1479px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 2- A life cycle enabling to address all the security issues<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Let us review \u00a0some important issues raised by this approach:<\/p>\n<ol>\n<li><strong>Design, manufacturing, and distribution phases<\/strong><\/li>\n<\/ol>\n<p>This first phase addresses issues related to the design of the object, regarding business stakes, targeted users (B2B, B2C, B2E), deployment environment (controlled or not) and criticality of the use:<\/p>\n<ul>\n<li>What are the regulatory constraints related to the use of the object?<\/li>\n<li>What identity should be labeled and how is this identity created?<\/li>\n<li>How is the security related to object\u2019s hardware and software secrets and data stored in the object?<\/li>\n<li>How is the state of a device on the management platform initialized, ensuring it has no right on the IS before the initialization step?<\/li>\n<\/ul>\n<p>The determined choices during the manufacturing phases are crucial because they determine characteristics and capacities of the device. Some of them will therefore be immutable throughout the life of the device and will impose strong constraints in the following steps.<\/p>\n<p>Furthermore, although the end of the manufacturing phase marks the beginning of the existence of the device on the device management platform, there is still no reason to consider an interaction with the IS.<\/p>\n<p>Any interaction before the device\u2019s association to a user (physical or moral) would mean that it has been diverted in the distribution phase. <strong>Any access to the IS before the initialization phase must be strictly limited<\/strong> to the firmware update (version N installed at the factory and version N+1 available when unpacking) or to the pre-customization of the object (operating settings or injection of secrets not related to the user). Beyond IS security, an object that is unused before any pairing phase will reduce the risk of theft of that object in the factory or during distribution<em>.<\/em><\/p>\n<ol start=\"2\">\n<li><strong>Initialization phase<\/strong><\/li>\n<\/ol>\n<p>Initialization phase materializes the association phase (also named pairing) between a device and its owner. Any data generated by the device (or realized action) is then declared as belonging or attributed to its owner..<\/p>\n<p>Therefore, the main challenge is to <strong>ensure a reliable level of user \/ object association corresponding to the following business stakes:<\/strong><\/p>\n<ul>\n<li>Low level of association required (low-risk situation): An employee declares the usage of an attendance identification system in the meeting room;<\/li>\n<li>Strong level of association required (high-risk situation): when purchasing a connected lock, a consumer provides a serial number and a one-time secret code to allow his mobile application to unlock the door of his home.<\/li>\n<\/ul>\n<p>It is very important to find a balance between the user experience and security.<\/p>\n<p>The robustness of the expected association will <strong>vary according to the nature of the services to which the customer has subscribed.<\/strong><\/p>\n<ol start=\"3\">\n<li><strong>Use phase<\/strong><\/li>\n<\/ol>\n<p>The definition of the use cases of connected devices is the most anticipated step by companies, however <strong>many aspects of security remain neglected<\/strong>.<\/p>\n<p>Besides business use cases, additional questions must be raised:<\/p>\n<ul>\n<li>How can regular updates of the connected device be implemented?<\/li>\n<li>What are the different actors of the company roles regarding the maintenance of the device operating system layer: the application layer, and the network module?<\/li>\n<li>What is the detection and response requirements for a compromised device?<\/li>\n<li>How to take advantage of the company SIEM (<strong><em>S<\/em><\/strong><em>ecurity <strong>I<\/strong>nformation and <strong>E<\/strong>vent <strong>M<\/strong>anagement<\/em>) and SOC (<strong><em>S<\/em><\/strong><em>ecurity <strong>O<\/strong>peration <strong>C<\/strong>enter<\/em>) for technical security incidents (software compromise of the device) and for business security incidents (misuse or theft of a device)?<\/li>\n<li>How can backward compatibility of protocols and APIs used by different versions of the same type of device be maintained?<\/li>\n<li>What are the models of roles and interactions between different populations acting on the object?<\/li>\n<\/ul>\n<p>Concerning this last question, and as an example, the scheme below illustrates the potential complexity stemming from the interactions and roles model such as a connected vehicle.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-12094 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/image3.png\" alt=\"\" width=\"1464\" height=\"725\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/image3.png 1464w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/image3-386x191.png 386w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/image3-768x380.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/image3-71x35.png 71w\" sizes=\"auto, (max-width: 1464px) 100vw, 1464px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 3- Example of a roles and interactions model with a connected vehicle (research carried out with IMT Atlantique)<\/em><\/p>\n<p>&nbsp;<\/p>\n<ol start=\"4\">\n<li><strong>Resale phase<\/strong><\/li>\n<\/ol>\n<p>Today, the resale is <strong>the most neglected<\/strong> phase during the device design. This event essentially concerns devices for B2C markets and raises very specific issues:<\/p>\n<ul>\n<li>How to detect and handle the resale of a device between individuals?<\/li>\n<li>What privacy-by-design principles should be implemented to protect secrets and data from the former owner while resetting a device?<\/li>\n<li>How can access rights of the former owner of the device be removed?<\/li>\n<li>What are the ways to reset a device in a stable and clean state before re-pairing?<\/li>\n<\/ul>\n<p>The major difficulty involves <strong>the detection of the resale event<\/strong> which triggers the device\/user unpairing processes, reset the state of the object, etc.<\/p>\n<p>Our experience allows us to identify some circumstances that could indicate a change of ownership.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-12092 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/image4.png\" alt=\"\" width=\"1463\" height=\"509\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/image4.png 1463w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/image4-437x152.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/image4-768x267.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/image4-71x25.png 71w\" sizes=\"auto, (max-width: 1463px) 100vw, 1463px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 4 \u2013 Examples of events that could indicate the change of ownership<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Despite such examples, we witness that resale remains a complex event to identify. Thus, some companies choose <strong>not to authorize the device resale<\/strong> via a lease contract. The device must therefore be returned when the service is terminated; otherwise it must be made unusable. This model is comparable to renting an Internet box with an ISP (<strong>I<\/strong>nternet <strong>S<\/strong>ervice <strong>P<\/strong>rovider).<\/p>\n<ol start=\"5\">\n<li><strong>End-of-life and recycling<\/strong><\/li>\n<\/ol>\n<p>Although<strong> essential<\/strong>, we currently have little perspective on this step, however there are multiple stakes:<\/p>\n<ul>\n<li>Revoke access rights on the Information System of an end-of-life device;<\/li>\n<li>Renew the identity of a recycled device;<\/li>\n<li>Ensure the replacement of a defective object by re-associating a new one with the same owner and the same data;<\/li>\n<li>Detect the inactivity of a device to trigger a replacement.<\/li>\n<\/ul>\n<p>The main risks are <strong>the loss of access control over the company IS<\/strong> via identifiers associated with recycled devices, <strong>the disclosure of personal data<\/strong> of the former owner or <strong>the additional cost of license<\/strong> for data generated by devices considered out of the scope.<\/p>\n<p>&nbsp;<\/p>\n<h2>A variable capacity of action in response to the risks according to the nature of the project<\/h2>\n<p>At this stage of your reading, you probably think that this article is not your concern because you purchase pre-conceived connected modules or devices.<\/p>\n<p>Unfortunately this mindset is wrong \u2013\u00a0 you are still exposed to the same risks! Even though you only purchase or welcome connected devices in your IS, by addressing all the issues above you will be able to feed the contents of requirement specifications to suppliers.<\/p>\n<p>To conclude, <strong>whatever the nature of your IoT project<\/strong>, it is essential to design your object by structuring the reflections around its life cycle: from its manufacturing to its disposal. It is therefore necessary, at each stage, to address all the relevant security themes: Network \/ application \/ hardware security, standards, detection and reaction, governance, maintenance in security condition&#8230;<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-12090 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/image5.png\" alt=\"\" width=\"807\" height=\"589\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/image5.png 807w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/image5-262x191.png 262w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/image5-768x561.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/image5-53x39.png 53w\" sizes=\"auto, (max-width: 807px) 100vw, 807px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 5 \u2013 Main security themes for an IoT project<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As with employee or customer identity management, the life cycle approach of connected objects within the Internet of Things (IoT) makes it possible to address all security issues. This article presents the key elements of this methodology and the major&#8230;<\/p>\n","protected":false},"author":1326,"featured_media":11327,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2777,3275],"tags":[2772,2827,3181,3182,3010],"coauthors":[3051],"class_list":["post-12089","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-iot-consumer-goods-en","tag-cybersecurity","tag-identity","tag-iot-en","tag-life-cycle-en","tag-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A life cycle approach for IoT security - RiskInsight<\/title>\n<meta name=\"description\" content=\"As with employee or customer identity management, life cycle approach within the Internet of Things (IoT) makes it possible to address security issues.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/life-cycle-iot-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A life cycle approach for IoT security - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"As with employee or customer identity management, life cycle approach within the Internet of Things (IoT) makes it possible to address security issues.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/life-cycle-iot-security\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-17T20:59:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-02T15:42:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/Fotolia_81590429_Subscription_Monthly_XXL.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"6000\" \/>\n\t<meta property=\"og:image:height\" content=\"3000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"K\u00e9vin Gu\u00e9rin\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"K\u00e9vin Gu\u00e9rin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/life-cycle-iot-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/life-cycle-iot-security\/\"},\"author\":{\"name\":\"K\u00e9vin Gu\u00e9rin\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/424dd5b706cf16b69aa72cb8f41c9175\"},\"headline\":\"A life cycle approach for IoT security\",\"datePublished\":\"2019-09-17T20:59:03+00:00\",\"dateModified\":\"2020-01-02T15:42:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/life-cycle-iot-security\/\"},\"wordCount\":1300,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/life-cycle-iot-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/Fotolia_81590429_Subscription_Monthly_XXL.jpg\",\"keywords\":[\"cybersecurity\",\"identity\",\"IoT\",\"Life cycle\",\"security\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"IoT &amp; Consumer goods\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/life-cycle-iot-security\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/life-cycle-iot-security\/\",\"name\":\"A life cycle approach for IoT security - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/life-cycle-iot-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/life-cycle-iot-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/Fotolia_81590429_Subscription_Monthly_XXL.jpg\",\"datePublished\":\"2019-09-17T20:59:03+00:00\",\"dateModified\":\"2020-01-02T15:42:28+00:00\",\"description\":\"As with employee or customer identity management, life cycle approach within the Internet of Things (IoT) makes it possible to address security issues.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/life-cycle-iot-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/life-cycle-iot-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/life-cycle-iot-security\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/Fotolia_81590429_Subscription_Monthly_XXL.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/Fotolia_81590429_Subscription_Monthly_XXL.jpg\",\"width\":6000,\"height\":3000,\"caption\":\"Internet of Things flat iconic illustration thing object\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/life-cycle-iot-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A life cycle approach for IoT security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/424dd5b706cf16b69aa72cb8f41c9175\",\"name\":\"K\u00e9vin Gu\u00e9rin\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/kevin-guerin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A life cycle approach for IoT security - RiskInsight","description":"As with employee or customer identity management, life cycle approach within the Internet of Things (IoT) makes it possible to address security issues.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/life-cycle-iot-security\/","og_locale":"en_US","og_type":"article","og_title":"A life cycle approach for IoT security - RiskInsight","og_description":"As with employee or customer identity management, life cycle approach within the Internet of Things (IoT) makes it possible to address security issues.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/life-cycle-iot-security\/","og_site_name":"RiskInsight","article_published_time":"2019-09-17T20:59:03+00:00","article_modified_time":"2020-01-02T15:42:28+00:00","og_image":[{"width":6000,"height":3000,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/Fotolia_81590429_Subscription_Monthly_XXL.jpg","type":"image\/jpeg"}],"author":"K\u00e9vin Gu\u00e9rin","twitter_misc":{"Written by":"K\u00e9vin Gu\u00e9rin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/life-cycle-iot-security\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/life-cycle-iot-security\/"},"author":{"name":"K\u00e9vin Gu\u00e9rin","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/424dd5b706cf16b69aa72cb8f41c9175"},"headline":"A life cycle approach for IoT security","datePublished":"2019-09-17T20:59:03+00:00","dateModified":"2020-01-02T15:42:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/life-cycle-iot-security\/"},"wordCount":1300,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/life-cycle-iot-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/Fotolia_81590429_Subscription_Monthly_XXL.jpg","keywords":["cybersecurity","identity","IoT","Life cycle","security"],"articleSection":["Cybersecurity &amp; Digital Trust","IoT &amp; Consumer goods"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/life-cycle-iot-security\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/life-cycle-iot-security\/","name":"A life cycle approach for IoT security - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/life-cycle-iot-security\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/life-cycle-iot-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/Fotolia_81590429_Subscription_Monthly_XXL.jpg","datePublished":"2019-09-17T20:59:03+00:00","dateModified":"2020-01-02T15:42:28+00:00","description":"As with employee or customer identity management, life cycle approach within the Internet of Things (IoT) makes it possible to address security issues.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/life-cycle-iot-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/life-cycle-iot-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/life-cycle-iot-security\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/Fotolia_81590429_Subscription_Monthly_XXL.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/Fotolia_81590429_Subscription_Monthly_XXL.jpg","width":6000,"height":3000,"caption":"Internet of Things flat iconic illustration thing object"},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/life-cycle-iot-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"A life cycle approach for IoT security"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/424dd5b706cf16b69aa72cb8f41c9175","name":"K\u00e9vin Gu\u00e9rin","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/kevin-guerin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/12089","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1326"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=12089"}],"version-history":[{"count":2,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/12089\/revisions"}],"predecessor-version":[{"id":12101,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/12089\/revisions\/12101"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/11327"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=12089"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=12089"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=12089"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=12089"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}