IIC Lays Out IoT Endpoint Security Best Practices

thumbnail
IIC Lays Out IoT Endpoint Security Best Practices

A new white paper has been released for equipment manufacturers working with edge devices, going over endpoint security, safety, and reliability.

Written By
thumbnail
David Curry
David Curry
Mar 15, 2018

The Industrial Internet Consortium has released a new secure and safety white paper for Internet of Things (IoT) endpoint, which is aimed at equipment manufacturers, infrastructure operators and integrators working with edge devices.

The white paper is a useful reference for people working in those fields, as it goves over the safety, security and reliability of edge devices, such as sensors, controllers, embedded medical devices, electronic control units, communications infrastructure and gateways.

See also: Case Study: Rice Farmers Use IoT to Save Water and Carbon Emissions

“The number of attacks on industrial endpoints has grown rapidly in the last few years and has severe effects. Unreliable equipment can cause safety problems, customer dissatisfaction, liability and reduced profits,” said co-author of the white paper and senior principal at Infineon Technologies, Steve Hanna.

“The Endpoint Security Best Practices white paper moves beyond general guidelines, providing specific recommendations by security level. Thus, equipment manufacturers, owners, operators, and integrators are educated on how to apply existing best practices to achieve the needed security levels for their endpoints.”

The white paper runs over industrial guidance and compliance frameworks. From it, people working in these fields can apply a particular security level – basic, enhanced or critical – to IoT endpoint systems.

“By describing best practices for implementing industrial security that is appropriate for agreed-upon security levels, we’re empowering industrial ecosystem participants to define and request the security they need,” said Dean Weber, -author, and Mocana CTO. “Integrators can build systems that meet customer security needs and equipment manufacturers can build products that provide necessary security features efficiently.”

To view the PDF, see here: http://www.iiconsortium.org/pdf/Endpoint_Security_Best_Practices_Final_Mar_2018.pdf

thumbnail
David Curry

David is a technology writer with several years experience covering all aspects of IoT, from technology to networks to security.

Recommended for you...

Why Visibility Is Trust at the Intelligent Industrial Edge
David Montoya
Mar 4, 2026
Real-Time Analytics Enables Emerging Low-Altitude Economy
The Evolution of Real-Time Intelligence at the Edge
Closing the Latency Gap: Real-Time Decision Making at the Point of Data Creation

Featured Resources from Cloud Data Insights

Real-time Analytics News for the Week Ending March 14
Why AI Governance Breaks Without Exposure Management
Mark Lambert
Mar 14, 2026
Agentic AI and the Death of SaaS
The Business Case for a Unified Semantic Layer
Alex Merced
Mar 12, 2026
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.