SHARE
Facebook X Pinterest WhatsApp

IIC Lays Out IoT Endpoint Security Best Practices

thumbnail
IIC Lays Out IoT Endpoint Security Best Practices

A new white paper has been released for equipment manufacturers working with edge devices, going over endpoint security, safety, and reliability.

Written By
thumbnail
David Curry
David Curry
Mar 15, 2018

The Industrial Internet Consortium has released a new secure and safety white paper for Internet of Things (IoT) endpoint, which is aimed at equipment manufacturers, infrastructure operators and integrators working with edge devices.

The white paper is a useful reference for people working in those fields, as it goves over the safety, security and reliability of edge devices, such as sensors, controllers, embedded medical devices, electronic control units, communications infrastructure and gateways.

See also: Case Study: Rice Farmers Use IoT to Save Water and Carbon Emissions

“The number of attacks on industrial endpoints has grown rapidly in the last few years and has severe effects. Unreliable equipment can cause safety problems, customer dissatisfaction, liability and reduced profits,” said co-author of the white paper and senior principal at Infineon Technologies, Steve Hanna.

“The Endpoint Security Best Practices white paper moves beyond general guidelines, providing specific recommendations by security level. Thus, equipment manufacturers, owners, operators, and integrators are educated on how to apply existing best practices to achieve the needed security levels for their endpoints.”

The white paper runs over industrial guidance and compliance frameworks. From it, people working in these fields can apply a particular security level – basic, enhanced or critical – to IoT endpoint systems.

“By describing best practices for implementing industrial security that is appropriate for agreed-upon security levels, we’re empowering industrial ecosystem participants to define and request the security they need,” said Dean Weber, -author, and Mocana CTO. “Integrators can build systems that meet customer security needs and equipment manufacturers can build products that provide necessary security features efficiently.”

To view the PDF, see here: http://www.iiconsortium.org/pdf/Endpoint_Security_Best_Practices_Final_Mar_2018.pdf

thumbnail
David Curry

David is a technology writer with several years experience covering all aspects of IoT, from technology to networks to security.

Recommended for you...

Real-Time Analytics Enables Emerging Low-Altitude Economy
The Evolution of Real-Time Intelligence at the Edge
Closing the Latency Gap: Real-Time Decision Making at the Point of Data Creation
Why Modern AI Needs NaaS

Featured Resources from Cloud Data Insights

The Difficult Reality of Implementing Zero Trust Networking
Misbah Rehman
Jan 6, 2026
Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.