Security Resources and Information from TechTarget 09月29日
FCC推出IoT安全认证计划
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

美国联邦通信委员会(FCC)推出自愿性U.S. Cyber Trust Mark计划,旨在通过认证确保消费级物联网设备符合特定网络安全标准。制造商需满足设备识别、配置、数据保护、接口访问控制、软件更新及安全状态感知等要求。通过认证的设备将展示Cyber Trust Mark标志和二维码,供用户扫描获取安全信息,如修改默认密码、安全配置、软件更新及支持期限等。该计划由第三方认证机构评估,FCC监督,预计2026年开始接受申请,涵盖智能家电、智能手表、安全摄像头等多种设备。

🔐U.S. Cyber Trust Mark是FCC推出的自愿性计划,旨在通过认证确保消费级物联网设备符合特定网络安全标准,增强消费者信任。

📋制造商需满足多项关键要求,包括设备具备唯一标识符、可安全配置、数据加密保护、接口访问权限控制、可靠软件更新机制及安全状态感知能力。

🔗认证设备将展示Cyber Trust Mark标志和二维码,用户可扫描获取安全信息,如修改默认密码方法、安全配置指南、软件更新及支持期限等。

🤝该计划采用公私合作模式,由第三方认证机构评估产品,FCC监督实施,预计2026年开始接受申请,涵盖智能家电、智能手表、安全摄像头等多种设备。

📚制造商还需向客户提供全面的安全文档和数据隐私政策,建立问题反馈及漏洞报告渠道,并传播产品安全教育材料。

<p>Consumer IoT device manufacturers have been gearing up to participate in an FCC program -- the U.S. Cyber Trust Mark -- that certifies they engineered their products to meet certain cybersecurity standards. The voluntary initiative is designed to validate the <a href="https://www.techtarget.com/iotagenda/tip/5-IoT-security-threats-to-prioritize"&gt;security of IoT devices</a> for consumers' benefit. From a manufacturer's perspective, IoT devices that earn the Cyber Trust Mark certification may have a competitive advantage in winning customer trust.</p><div class="ad-wrapper ad-embedded"> <div id="halfpage" class="ad ad-hp"> <script>GPT.display('halfpage')</script> </div> <div id="mu-1" class="ad ad-mu"> <script>GPT.display('mu-1')</script> </div> </div> <p>The Federal Communications Commission (FCC) set up the program as a public-private partnership. In late 2024, it named 11 companies as cybersecurity label administrators (CLAs) and Illinois-based testing firm UL Solutions as the lead administrator. &nbsp;</p> <p>The program has said it expects to begin accepting applications for certification from IoT device makers by 2026, although an <a href="https://www.cybersecuritydive.com/news/fcc-cyber-trust-mark-ul-investigation-delay/758507/"&gt;investigation into UL Solutions and its ties to China might delay that timeline</a>. In the meantime, here's what IoT device manufacturers need to know to prepare.</p> <section class="section main-article-chapter" data-menu-title="How does Cyber Trust Mark certification work?"> <h2 class="section-title"><i class="icon" data-icon="1"></i>How does Cyber Trust Mark certification work?</h2> <p>The U.S. Cyber Trust Mark logo will appear on wireless consumer IoT products that qualify for certification, along with QR codes that users can scan to access security information specific to the devices, such as the following:</p> <ul class="default-list"> <li>How to <a href="https://www.techtarget.com/searchsecurity/tip/Top-5-password-hygiene-tips-and-best-practices"&gt;change default passwords</a>.</li> <li>How to securely configure devices.</li> <li>Information about accessing software updates and security patches, if they are not automatic.</li> <li>The minimum support period, or the date when the customer can no longer count on the manufacturer to issue security updates.</li> </ul> <p>The approved third-party CLAs will evaluate product applications and authorize use of the Cyber Trust Mark label, accredited labs will handle compliance testing and the FCC will oversee the program.</p> <p>Eligible products include smart kitchen appliances, smart speakers, baby monitors, smart televisions, smart watches, fitness trackers, home security cameras, smart light bulbs, robot vacuum cleaners, garage door openers and more.</p></section> <section class="section main-article-chapter" data-menu-title="How can devices qualify for Cyber Trust Mark certification?"> <h2 class="section-title"><i class="icon" data-icon="1"></i>How can devices qualify for Cyber Trust Mark certification?</h2> <p>To qualify to use the Cyber Trust Mark label, manufacturers will need to equip their IoT devices with key cybersecurity capabilities.</p> <p>Although official program requirements are still under review as of mid-2025, the FCC expects them to align closely with the following existing <a href="https://nvlpubs.nist.gov/nistpubs/ir/2022/NIST.IR.8425.pdf"&gt;recommendations from NIST</a>.</p> <h3>Device identification</h3> <p>Each IoT device must have a unique logical and physical identifier that sets the device apart from any other IoT model, even one that's identical. The unique physical identifier must be readily apparent, such as a serial number etched into the device's case or printed on a label affixed to the case. The device's software provides the unique logical identifier to other devices and networks it interacts with -- e.g., a <a href="https://www.techtarget.com/searchnetworking/definition/MAC-address"&gt;MAC address</a> for a network interface. These identifiers make it easy to determine which device is involved if a security issue occurs.</p> <h3>Device configuration</h3> <p>Each IoT device must be configurable -- that is, its software must have settings that users can change to alter its security posture. For example, a user might configure a device to automatically check for, download and install security updates, rather than relying on manual intervention. To qualify for Cyber Trust Mark certification, IoT devices must also provide users with the ability to restore their settings to previous configurations.</p> <p>Of course, it's vital that only authorized people, such as device owners, can alter configurations. Configuring a device to improve its security does no good if anyone can alter it at will.</p> <h3>Data protection</h3> <p>Data protection safeguards the confidentiality and integrity of the data an IoT device stores and transmits, using <a href="https://www.techtarget.com/searchsecurity/definition/encryption"&gt;encryption and other forms of cryptography</a>. It also permits owners to render any data stored on devices inaccessible, allowing them to resell, recycle or dispose of their devices without worrying that a third party could recover their data.</p> <h3>Logical access to interfaces</h3> <p>To prevent any misuse of IoT devices, owners must be able to deactivate any local or network interfaces that they don't need.</p> <p>In the case of a necessary network interface, an owner must be able to require authentication so that only authorized people or devices can communicate with it. This prevents remote attackers and compromised computers from gaining unauthorized access to an IoT device.</p> <h3>Software updates</h3> <p>Regular and reliable <a href="https://www.techtarget.com/searchenterprisedesktop/definition/patch-management"&gt;software updates and patches</a> help owners protect their IoT devices from vulnerabilities. To that end, manufacturers must engineer certified devices to do the following:</p> <ul class="default-list"> <li>Ensure software updates are legitimate before installation.</li> <li>Offer a rollback feature in the event an update needs to be removed.</li> <li>Give owners the choice to acquire updates either automatically or manually.</li> </ul> <p>Collectively, these features enable device owners to ensure secure updates and control when they occur.</p> <h3>Cybersecurity state awareness</h3> <p><i>Cybersecurity state awareness</i> means the device itself "knows" its current cybersecurity state and can provide that information to owners on demand. Importantly, devices must also prevent any unauthorized users from altering state information to mislead owners.</p> <p>The NIST recommendations expected to inform Cyber Trust Mark certification requirements also call for IoT device manufacturers to do the following:</p> <ul class="default-list"> <li>Share comprehensive security documentation and <a href="https://www.techtarget.com/iotagenda/definition/Internet-of-Things-privacy-IoT-privacy"&gt;data privacy policies</a> with customers.</li> <li>Provide channels for customers to ask questions and register complaints, and for <a href="https://www.techtarget.com/healthtechsecurity/feature/How-Cybersecurity-Vulnerability-Disclosures-Help-the-Healthcare-Community"&gt;security researchers to report vulnerabilities</a>.</li> <li>Disseminate product education and security awareness materials.</li> </ul> <p><i>Karen Scarfone is the principal consultant at Scarfone Cybersecurity in Clifton, Va. She provides cybersecurity publication consulting to organizations and was formerly a senior computer scientist for NIST.</i></p> <p><i>Alissa Irei is senior site editor of Informa TechTarget Security.</i></p></section>

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

FCC 物联网安全 Cyber Trust Mark 消费级设备 网络安全标准
相关文章