Security Experts:

Connect with us

Hi, what are you looking for?


IoT Security

Senators Reintroduce IoT Cybersecurity Improvement Bill

Four U.S. senators backed by two House representatives and several major tech companies this week reintroduced a bill whose goal is to improve the security of Internet of Things (IoT) devices.

Four U.S. senators backed by two House representatives and several major tech companies this week reintroduced a bill whose goal is to improve the security of Internet of Things (IoT) devices.

Senators Mark R. Warner (D-VA), Cory Gardner (R-CO), Maggie Hassan (D-NH) and Steve Daines (R-MT), along with representatives Robin Kelly (D-IL) and Will Hurd (R-TX) have introduced the IoT Cybersecurity Improvement Act of 2019.

The same senators introduced a similar bill in 2017, but it did not make it very far.

The new bipartisan legislation would require the National Institute of Standards and Technology (NIST) to issue recommendations addressing the secure development, identity management, patching, and configuration of IoT devices. It would also direct the Office of Management and Budget (OMB) to issue guidelines consistent with the NIST recommendations for each federal agency, and require agencies to ensure that the Internet-connected devices they acquire comply with these recommendations.IoT security

The bill also aims to improve the way vulnerabilities found in IoT devices are reported to the vendor and addressed.

“While I’m excited about their life-changing potential, I’m also concerned that many IoT devices are being sold without appropriate safeguards and protections in place, with the device market prioritizing convenience and price over security,” said Sen. Warner. “This legislation will use the purchasing power of the federal government to establish some minimum security standards for IoT devices.”

The list of companies that supports this bill includes The Software Alliance (BSA), Symantec, Mozilla, Cloudflare, Rapid7, CTIA and Tenable. Cryptography expert Bruce Schneier, and representatives of Stanford University and Harvard University’s Berkman Klein Center for Internet & Society have also shown support for the bill.

“The proliferation of insecure Internet-connected devices presents an enormous security challenge. The risks are no longer solely about data; they affect flesh and steel. The market is not going to provide security on its own, because there is no incentive for buyers or sellers to act in anything but their self-interests. I applaud Senator Warner and his cosponsors for nudging the market in the right direction by establishing thorough, yet flexible, security requirements for connected devices purchased by the government,” Bruce Schneier said.

NIST has been working on a publication titled “Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks,” which was open for public comments until October 2018.

It’s also worth noting that the European Telecommunications Standards Institute (ETSI) recently published a new IoT cybersecurity standard.

The U.S. state of California already has an IoT cybersecurity law, which its governor signed in October 2018 and should go into effect on January 1, 2020. The law requires manufacturers of Internet-connected devices to ensure that their products have “reasonable security features” that can protect sensitive customer information from unauthorized access.

Related: Addressing IoT Device Security Head-on

Related: Why it’s So Hard to Implement IoT Security

Related: As IoT Grows, Confidence in Security Remains Low

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...


Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.


Twenty-one cybersecurity-related M&A deals were announced in December 2022.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.