<html><head><meta http-equiv="Content-Type" content="text/html charset=us-ascii"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" class=""><pre style="font-size: 13.333333015441895px; margin-top: 0px; margin-bottom: 0px;" class=""><span class="h1" style="line-height: 0pt; display: inline; font-size: 1em; font-weight: bold;"><h1 style="line-height: 0pt; display: inline; font-size: 1em;" class="">Best Current Practices for Securing Internet of Things (IoT) Devices</h1></span>
<span class="h1" style="line-height: 0pt; display: inline; font-size: 1em; font-weight: bold;"><h1 style="line-height: 0pt; display: inline; font-size: 1em;" class="">draft-moore-iot-security-bcp-01</h1></span>
Abstract
In recent years, embedded computing devices have increasingly been
provided with Internet interfaces, and the typically-weak network
security of such devices has become a challenge for the Internet
infrastructure. This document lists a number of minimum requirements
that vendors of Internet of Things (IoT) devices need to take into
account during development and when producing firmware updates, in
order to reduce the frequency and severity of security incidents in
which such devices are implicated.
</pre><div class=""><br class=""></div><div style="font-size: 14px;" class="">See:</div><div style="font-size: 14px;" class=""><br class=""></div><div style="font-size: 14px;" class=""><a href="https://tools.ietf.org/html/draft-moore-iot-security-bcp-01" class="">https://tools.ietf.org/html/draft-moore-iot-security-bcp-01</a></div></body></html>