{"id":16970,"date":"2019-11-22T09:10:10","date_gmt":"2019-11-22T17:10:10","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/11\/22\/news-10707\/"},"modified":"2019-11-22T09:10:10","modified_gmt":"2019-11-22T17:10:10","slug":"news-10707","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/11\/22\/news-10707\/","title":{"rendered":"IoT bills and guidelines: a global response"},"content":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Fri, 22 Nov 2019 16:27:47 +0000<\/strong><\/p>\n<p>You may not have noticed, but <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/12\/internet-things-iot-security-never\/\" target=\"_blank\" rel=\"noopener noreferrer\">Internet of Things (IoT)<\/a> rules and regulations are coming whether manufacturers want them or not. From experience, drafting up laws which are (hopefully) sensible and have some relevance to problems raised by current technology is a time-consuming, frustrating process.<\/p>\n<p>However, it\u2019s not that long since we saw IoT devices go mainstream\u2014right into people\u2019s homes, controlling real-world aspects of their day-to-day lives, and also causing mishaps and<a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/07\/iot-domestic-abuse-can-stop\/\" target=\"_blank\" rel=\"noopener noreferrer\"> serious issues<\/a> for people dealing with them.<\/p>\n<p>The theoretical IoT wild west may be drawing to a close,<span class=\"Apple-converted-space\"> so<\/span>\u00a0we&#8217;re taking a look at some IoT related bills and guidelines currently in the news.<\/p>\n<h3>Where did this all begin?<\/h3>\n<p>You\u2019ve probably seen articles in the last few days talking about multiple upcoming changes and suggestions for IoT vendors, but in actual fact the first steps were taken last year when California decided the time was ripe for a little bit of IoT regulation.<\/p>\n<p>If you sell or offer IoT devices, which count as any Internet-connected device in California, the device must be equipped with &#8220;reasonable security features.&#8221;<\/p>\n<h3>Bills, bills, bills<\/h3>\n<p>Here\u2019s the <a href=\"https:\/\/leginfo.legislature.ca.gov\/faces\/billNavClient.xhtml?bill_id=201720180SB327\" target=\"_blank\" rel=\"noopener noreferrer\">text of the California bill<\/a>.<\/p>\n<p>The key parts are these:<\/p>\n<blockquote>\n<p><em>\u201cConnected device\u201d means any device, or other physical object that is capable of connecting to the Internet, directly or indirectly, and that is assigned an Internet Protocol address or Bluetooth address.<\/em><\/p>\n<\/blockquote>\n<p>A connected device is as wide ranging as you\u2019d expect, so that\u2019s a good thing considering anything from your printer to your refrigerator could be communicating with the big wide world outside.<\/p>\n<p>That\u2019s great\u2014but what, exactly, is a reasonable security feature?<\/p>\n<p>Next up:<\/p>\n<blockquote>\n<p><em>(b) Subject to all of the requirements of subdivision (a), if a connected device is equipped with a means for authentication outside a local area network, it shall be deemed a reasonable security feature under subdivision (a) if either of the following requirements are met:<\/em><\/p>\n<p><em>(1) The preprogrammed password is unique to each device manufactured.<\/em><\/p>\n<p><em>(2) The device contains a security feature that requires a user to generate a new means of authentication before access is granted to the device for the first time.<\/em><\/p>\n<\/blockquote>\n<p>We\u2019re essentially in password town. If the shipped password is unique and not something you can plug a serial number into Google to discover, or the device owner is forced to create a unique password the first time they fire it up, that would count as \u201creasonable security.\u201d<\/p>\n<h3>One small step for IoT<\/h3>\n<p>Is that enough, though? Some US-based legal eagles <a href=\"https:\/\/www.darkreading.com\/iot\/californias-iot-security-law-causing-confusion\/d\/d-id\/1335863\" target=\"_blank\" rel=\"noopener noreferrer\">suggest it isn\u2019t<\/a>, and they may well have a point. If IoT legislation doesn\u2019t end up considering things like secure communication, tampering, updates, or even what happens when a device is no longer supported, then this could become messy\u00a0 quickly.<\/p>\n<p>Even so, cheap devices with zero password functionality built in are commonplace and an absolute curse where trying to secure networks and keep users safe are concerned.<\/p>\n<p>The California bill won\u2019t just apply to devices being sold in California; it doesn\u2019t matter where they\u2019re made. If your password name isn\u2019t down, you\u2019re not getting in\u2014for want of a better and considerably less mangled expression.<\/p>\n<p>This is due to roll into action on the first of January 2020, not only in California but <a href=\"https:\/\/news.bloomberglaw.com\/privacy-and-data-security\/connected-device-makers-face-california-oregon-security-laws\" target=\"_blank\" rel=\"noopener noreferrer\">also Oregon<\/a>. It seems the US is taking the potential for IoT chaos seriously and I\u2019d be amazed if this doesn\u2019t end up going live in additional states in the near future.<\/p>\n<h3>Tackling the IoT problem globally<\/h3>\n<p>It\u2019s <a href=\"https:\/\/www.gov.uk\/government\/collections\/secure-by-design\" target=\"_blank\" rel=\"noopener noreferrer\">not just the US<\/a> trying to get a grip on IoT. <a href=\"https:\/\/www.zdnet.com\/article\/australia-releases-draft-iot-cybersecurity-code-of-practice\/\" target=\"_blank\" rel=\"noopener noreferrer\">Australia just pushed out<\/a> the voluntary <a href=\"https:\/\/www.homeaffairs.gov.au\/reports-and-pubs\/files\/code-of-practice.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">code of practice: securing the Internet of Things for consumers<\/a> [PDF]. Spread across 13 principles, it seems to be significantly more in-depth than the US bill, which so far leaves a lot of areas up for debate. The 13 principles tackle communication security, updates, the ability to easily scrub personal data, and more besides.<\/p>\n<p>Of course, we should temper our expectations somewhat. The US bill goes live in two states only, and there doesn\u2019t seem to be much (or any!) information with regards to punishment, fines, or anything else.<\/p>\n<p>Additionally, you yourself as a consumer can\u2019t do anything off the back of the bill directly. It would have to be the California Attorney General or similar stepping up to the plate. On the other hand, as impressive as the Australian code is\u2014and it is still under consultation\u2014it\u2019s currently only voluntary.<\/p>\n<p>Even so, getting people in a position of authority to think about these issues is important, and at the very least these guides will help people at home to make considered, informed decisions about the technology they allow into their homes on a daily basis. Some good first steps, then, but we have a long way to go.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/privacy\/2019\/11\/iot-bills-and-guidelines-a-global-response\/\">IoT bills and guidelines: a global response<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/privacy\/2019\/11\/iot-bills-and-guidelines-a-global-response\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Fri, 22 Nov 2019 16:27:47 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/privacy\/2019\/11\/iot-bills-and-guidelines-a-global-response\/' title='IoT bills and guidelines: a global response'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/shutterstock_235654321.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>IoT laws and guidelines abound, as we take a look what&#8217;s happening around the world in the name of securing Internet-connected devices.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/iot\/\" rel=\"category tag\">IoT<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/privacy\/\" rel=\"category tag\">Privacy<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/australia\/\" rel=\"tag\">Australia<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/california\/\" rel=\"tag\">California<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/internet\/\" rel=\"tag\">internet<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/internet-of-things\/\" rel=\"tag\">Internet of Things<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/iot\/\" rel=\"tag\">IoT<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/iot-laws\/\" rel=\"tag\">iot laws<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/iot-legislation\/\" rel=\"tag\">iot legislation<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/passwords\/\" rel=\"tag\">passwords<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/technology-laws\/\" rel=\"tag\">technology laws<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/technology-legislation\/\" rel=\"tag\">technology legislation<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/uk\/\" rel=\"tag\">uk<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/united-states\/\" rel=\"tag\">united states<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/us\/\" rel=\"tag\">us<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/privacy\/2019\/11\/iot-bills-and-guidelines-a-global-response\/' title='IoT bills and guidelines: a global response'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/privacy\/2019\/11\/iot-bills-and-guidelines-a-global-response\/\">IoT bills and guidelines: a global response<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[1709,1683,4314,6269,10495,23519,23520,10602,5897,23521,23522,6674,403,544],"class_list":["post-16970","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-australia","tag-california","tag-internet","tag-internet-of-things","tag-iot","tag-iot-laws","tag-iot-legislation","tag-passwords","tag-privacy","tag-technology-laws","tag-technology-legislation","tag-uk","tag-united-states","tag-us"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16970","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16970"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16970\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16970"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16970"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16970"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}