Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

IoT Security

Senators Reintroduce IoT Cybersecurity Improvement Bill

Four U.S. senators backed by two House representatives and several major tech companies this week reintroduced a bill whose goal is to improve the security of Internet of Things (IoT) devices.

Four U.S. senators backed by two House representatives and several major tech companies this week reintroduced a bill whose goal is to improve the security of Internet of Things (IoT) devices.

Senators Mark R. Warner (D-VA), Cory Gardner (R-CO), Maggie Hassan (D-NH) and Steve Daines (R-MT), along with representatives Robin Kelly (D-IL) and Will Hurd (R-TX) have introduced the IoT Cybersecurity Improvement Act of 2019.

The same senators introduced a similar bill in 2017, but it did not make it very far.

The new bipartisan legislation would require the National Institute of Standards and Technology (NIST) to issue recommendations addressing the secure development, identity management, patching, and configuration of IoT devices. It would also direct the Office of Management and Budget (OMB) to issue guidelines consistent with the NIST recommendations for each federal agency, and require agencies to ensure that the Internet-connected devices they acquire comply with these recommendations.IoT security

The bill also aims to improve the way vulnerabilities found in IoT devices are reported to the vendor and addressed.

“While I’m excited about their life-changing potential, I’m also concerned that many IoT devices are being sold without appropriate safeguards and protections in place, with the device market prioritizing convenience and price over security,” said Sen. Warner. “This legislation will use the purchasing power of the federal government to establish some minimum security standards for IoT devices.”

The list of companies that supports this bill includes The Software Alliance (BSA), Symantec, Mozilla, Cloudflare, Rapid7, CTIA and Tenable. Cryptography expert Bruce Schneier, and representatives of Stanford University and Harvard University’s Berkman Klein Center for Internet & Society have also shown support for the bill.

“The proliferation of insecure Internet-connected devices presents an enormous security challenge. The risks are no longer solely about data; they affect flesh and steel. The market is not going to provide security on its own, because there is no incentive for buyers or sellers to act in anything but their self-interests. I applaud Senator Warner and his cosponsors for nudging the market in the right direction by establishing thorough, yet flexible, security requirements for connected devices purchased by the government,” Bruce Schneier said.

NIST has been working on a publication titled “Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks,” which was open for public comments until October 2018.

Advertisement. Scroll to continue reading.

It’s also worth noting that the European Telecommunications Standards Institute (ETSI) recently published a new IoT cybersecurity standard.

The U.S. state of California already has an IoT cybersecurity law, which its governor signed in October 2018 and should go into effect on January 1, 2020. The law requires manufacturers of Internet-connected devices to ensure that their products have “reasonable security features” that can protect sensitive customer information from unauthorized access.

Related: Addressing IoT Device Security Head-on

Related: Why it’s So Hard to Implement IoT Security

Related: As IoT Grows, Confidence in Security Remains Low

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...