SHARE
Facebook X Pinterest WhatsApp

IIC New Guide Designed to Assess the Maturity of IoT System Security

thumbnail
IIC New Guide Designed to Assess the Maturity of IoT System Security

Antivirus interface over modern tech devices in dark background 3D rendering

The Security Maturity Model (SMM) Practitioner’s Guide provides detailed actionable guidance to assess and manage the security maturity of IoT systems.

Written By
thumbnail
Sue Walsh
Sue Walsh
Mar 1, 2019

The Industrial Internet Consortium (IIC) announced publication of the new Security Maturity Model (SMM) Practitioner’s Guide. This guide provides detailed guidance to assist IoT stakeholders assess and manage IoT systems’ security maturity.

IIC also released an update to the IoT SMML Description and Intended Use White Paper, which introduces readers to SMM concepts and approaches. The company updated the white paper — which includes updated terminology and diagrams — to ensure consistency with the SMM Practitioner’s Guide.

See also: IIC reveals broad-ranging resource hub for IoT

Goal of the SMM

The SMM uses a structured, top-down approach to goal setting and security assessment. This approach helps organizations assess security concerns and threat risks and evaluate investment against risk.

The SMM builds on concepts from the 2016 IIC Industrial Internet Security Framework. The model defines specific security maturity levels companies should achieve. Companies that continually assess security and make improvements over time can improve their risk.

The practitioner’s guide highlights three case studies that illustrate how IoT stakeholders successfully applied the maturity assessment process and applied SMM in practice. These case studies include:

  • A data-driven bottling line
  • An automotive gateway
  • Residential security cameras

“This is the first model of its kind to assess the maturity of organizations’ IoT systems in a way that includes governance, technology and system management,” says Stephen Mellor, CTO, IIC. “Other models address part of what is addressed by the SMM: they may address a particular industry, IoT but not security, or security but not IoT. The SMM covers all these aspects and points to parts of existing models, where appropriate, to recognize existing work and avoid duplication.”

The IIC designed the SMM for industry and system-specific requirements. The IIC is collaborating with various industry groups to develop industry profiles that extend the model.

thumbnail
Sue Walsh

Sue Walsh is News Writer for RTInsights, and a freelance writer and social media manager living in New York City. Her specialties include tech, security and e-commerce. You can follow her on Twitter at @girlfridaygeek.

Recommended for you...

Top 5 Smart Manufacturing Articles of 2025
Building Resilient and Sustainable Industries With AI, IoT, Software-Defined Systems, and Digital Twins
Peter Weckesser
Nov 26, 2025
Adaptive Edge Intelligence: Real-Time Insights Where Data Is Born
Skype May Be Gone, but P2P Is Here To Stay

Featured Resources from Cloud Data Insights

The Difficult Reality of Implementing Zero Trust Networking
Misbah Rehman
Jan 6, 2026
Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.