<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Guidelines for Privacy and Security in IoT</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>B. Regulations</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Pasquale Annicchino Archimede Solutions Geneva</institution>
          ,
          <country country="CH">Switzerland</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Simone Seminara, Francesco Capparelli Istituto Italiano per la Privacy e la Valorizzazione dei Dati Rome</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <fpage>19</fpage>
      <lpage>24</lpage>
      <abstract>
        <p>- Norms and standards define the ecosystem in which IoT solutions are developed and deployed. It is often difficult for people without a legal training or an understanding of standardization dynamics to fully grasp the state of the art in this very relevant field. This contribution aims at highlighting the most relevant tools available and explaining their relevance.</p>
      </abstract>
      <kwd-group>
        <kwd>Data protection</kwd>
        <kwd>privacy</kwd>
        <kwd>security</kwd>
        <kwd>Internet of Things</kwd>
        <kwd>guide-lines</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION: MAPPING THE LANDSCAPE</title>
      <sec id="sec-1-1">
        <title>A. Relevance of the exercise</title>
        <p>
          The mapping of international security and data protection by
design guidelines is of paramount relevance in the identification
of best practices in the context of IoT. With regard to the
implementation and demonstration of appropriate technical and
organizational measures as referred in Articles 24(1)-(3), 25,
and 32(1)-(3) of the General Data Protection Regulation
(GDPR) [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ], the literature on data protection is extensive,
ranging from regulations to privacy-enhancing technologies
and rules that are general. Without any objective of
completeness, which would be outside the scope of this
contribution, we briefly introduce below some of the
bestknown approaches to data management and data protection
from a technical perspective (among those freely available
online) which might be useful also for researchers with no
previous legal training.
        </p>
        <p>
          First of all, the European Union Agency for Cybersecurity
(ENISA) in the eminent document Privacy and Data Protection
by Design [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] declares eight general strategies for implementing
the principle of “privacy by design“ as defined in the GDPR:
minimise, hide, separate, aggregate, inform, control, enforce
and demonstrate.
        </p>
        <p>
          Another important approach to formulate general principles for
the protection of personal data and cybersecurity is the one
developed by the Information &amp; Privacy Commissioner of the
State of Ontario, Canada. This work [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] proposes seven general
principles: Proactive not Reactive (Preventative not Remedial);
Privacy as the Default Setting; Privacy Embedded into Design;
Full Functionality (Positive-Sum, not Zero-Sum); End-to-End
Security (Full Lifecycle Protection); Visibility and
Transparency (Keep it Open); Respect for User Privacy (Keep
it User-Centric).
        </p>
        <p>
          This work has been partially supported by NGIoT [
          <xref ref-type="bibr" rid="ref36">52</xref>
          ], a Coordination and
Support Action funded by European Union’s Horizon 2020 research and
innovation programme (H2020-EU.2.1.1.) under grant agreement ID
825082.
Almost all the articles of the GDPR provide the European
interpretation of the concept of personal data protection,
specifying several rights for citizens with regard to the
processing of their personal data. Rights such as access and
limitation are well detailed in the Regulation, which therefore
gives control over the data primarily to the individual to whom
the data are related. To complement this, there are three articles
referring to cybersecurity, without which data protection would
inevitably be compromised. Article 32 outlines the security
measures, while Articles 33 and 34 the notification obligations
in case of data breach.
        </p>
        <p>In relation to the focus on the IoT systems in this document,
however, it should be noted that the GDPR is not entirely
explicit on how an IoT device should protect data. The
manufacturers are therefore obliged to supply products that
comply with the Regulation and to ensure that the companies
that will (acquire and then) use them can operate in accordance
with the Regulation. Finally, Article 25 outlines provisions on
data protection by design and by default, i.e. already by design
and by default, taking over the concepts outlined in Articles 5
(on “data minimization”) and 32 (on security measures,
mentioning in particular “pseudonymization”). However, it is
completely implicit what characteristics an application must
have in order to be considered GDPR-compliant.</p>
        <p>The processing of personal data within the IoT framework often
sees the interaction between the system and its operator, the
latter being authorised to the specific processing possible
through the use of the given IoT device. In particular, the
authorisation to the processing – as mandated by the GDPR –
details the areas of the processing itself, i.e. what and how the
authorised person is allowed to process personal data. There is
then a so-called ceremony between device and operator, i.e. a
protocol distributed and enacted between machines and human
beings. Sometimes such a protocol may involve several persons
or even none: the GDPR defines the latter case as automated
processing.</p>
        <p>The articles of the GDPR can be interpreted as a set of
requirements, aimed at achieving the general objective of
personal data protection, for the participants in the
ceremony/protocol mentioned above.</p>
        <p>Copyright © 2020 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).</p>
        <p>II. RELEVANT GUIDELINES
In this paragraph we detail general guidelines, reviews and
mappings which can be applied to the world of the Internet of
Things as a whole. Each subsection details one of the
organisations involved in such publications.</p>
      </sec>
      <sec id="sec-1-2">
        <title>A. OWASP</title>
        <p>
          The Open Web Application Security Project (OWASP) [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] is a
nonprofit foundation that works to improve the security of
software through its community-led open source software
projects. One of its flagship projects is the OWASP Top 10 [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ],
a standard awareness document for developers and web
application security; it represents a broad consensus about the
most critical security risks to web applications.
        </p>
        <p>Here are two of its publications about IoT.</p>
      </sec>
      <sec id="sec-1-3">
        <title>1) OWASP IoT Top 10, 2018 (previous version in 2014)</title>
        <p>
          Along the lines of the widely known Top 10 for web apps, the
OWASP IoT Top 10 [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] focuses on things to avoid when
building, deploying or managing IoT systems. The list is:
1) Weak, Guessable, or Hardcoded Passwords. Use of easily
brute forced, publicly available, or unchangeable
credentials, including backdoors in firmware or client
software that grants unauthorised access to deployed
systems.
2) Insecure Network Services. Unneeded or insecure network
services running on the device itself, especially those
exposed to the internet, that compromise the
confidentiality, integrity/authenticity, or availability of
information or allow unauthorised remote control.
3) Insecure Ecosystem Interfaces. Insecure web, backend API,
cloud, or mobile interfaces in the ecosystem outside of the
device that allows compromise of the device or its related
components. Common issues include a lack of
authentication/authorization, lacking or weak encryption,
and a lack of input and output filtering.
4) Lack of Secure Update Mechanism. Lack of ability to
securely update the device. This includes lack of firmware
validation on device, lack of secure delivery (un-encrypted
in transit), lack of anti-rollback mechanisms, and lack of
notifications of security changes due to updates.
5) Use of Insecure or Outdated Components. Use of
deprecated or insecure software components/libraries that
could allow the device to be compromised. This includes
insecure customization of operating system platforms, and
the use of third-party software or hardware components
from a compromised supply chain.
6) Insufficient Privacy Protection. User’s personal
information stored on the device or in the ecosystem that is
used insecurely, improperly, or without permission.
7) Insecure Data Transfer and Storage. Lack of encryption or
access control of sensitive data anywhere within the
ecosystem, including at rest, in transit, or during
processing.
8) Lack of Device Management. Lack of security support on
devices deployed in production, including asset
management, update management, secure
decommissioning, systems monitoring, and response
capabilities.
9) Insecure Default Settings. Devices or systems shipped with
insecure default settings or lack the ability to make the
system more secure by restricting operators from
modifying configurations.
10) Lack of Physical Hardening. Lack of physical hardening
measures, allowing potential attackers to gain sensitive
information that can help in a future remote attack or take
local control of the device.
        </p>
      </sec>
      <sec id="sec-1-4">
        <title>B. UK Government, Department for Digital, Culture, Media &amp; Sport</title>
        <p>
          The Department for Digital, Culture, Media &amp; Sport (DCMS)
[19] helps to drive growth, enrich lives and promote Britain
abroad. Among other activities, the DCMS commissioned the
PETRAS IoT Research Hub [
          <xref ref-type="bibr" rid="ref19">20</xref>
          ], a consortium of universities
and research institutions that work together to explore critical
issues in privacy, ethics, trust, reliability, acceptability and
security of the IoT to conduct two literature reviews: on
industry recommendations for government to improve IoT
security; on the current international developments around IoT
security. The two aims to these reviews, jointly published in
[
          <xref ref-type="bibr" rid="ref20">21</xref>
          ], were to identify the key themes emerging from the
literature and to identify international consensus around core
Security by Design principles for the IoT.
        </p>
      </sec>
      <sec id="sec-1-5">
        <title>1) Code of Practice for Consumer IoT Security, 14 October 2018</title>
        <p>
          The DCMS, in conjunction with the UK National Cyber
Security Centre (NCSC) [
          <xref ref-type="bibr" rid="ref21">22</xref>
          ] and following engagement with
industry, consumer associations and academia, has developed
this Code of Practice [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] (see § 2.1.2) to support all parties
involved in the development, manufacturing and retail of
consumer IoT with a set of guidelines to ensure that products
are secure by design and to make it easier for people to stay
secure in a digital world. The Code of Practice brings together,
in thirteen outcome-focused guidelines, what is widely
considered good practice in IoT security. The Code was first
published in draft in March 2018 as part of the Secure by Design
collection of reports [
          <xref ref-type="bibr" rid="ref22">23</xref>
          ].
        </p>
        <p>An indication is given for each guideline as to which
stakeholder is primarily responsible for implementation.
Stakeholders are defined as Device Manufacturers, IoT Service
Providers, Mobile Application Developers and Retailers. The
thirteen guidelines are:
1) No default passwords. All IoT device passwords shall be
unique and not resettable to any universal factory default
value.
2) Implement a vulnerability disclosure policy. All companies
that provide internet-connected devices and services shall
provide a public point of contact as part of a vulnerability
disclosure policy in order that security researchers and
others are able to report issues. Disclosed vulnerabilities
should be acted on in a timely manner.
3) Keep software updated. Software components in
internetconnected devices should be securely updateable. Updates
shall be timely and should not impact on the functioning of
the device. An end-of-life policy shall be published for
endpoint devices which explicitly states the minimum length of
time for which a device will receive software updates and
the reasons for the length of the support period. The need
for each update should be made clear to consumers and an
update should be easy to implement. For constrained
devices that cannot physically be updated, the product
should be isolatable and replaceable.
4) Securely store credentials and security-sensitive data. Any
credentials shall be stored securely within services and on
devices. Hard-coded credentials in device software are not
acceptable.
5) Communicate securely. Security-sensitive data, including
any remote management and control, should be encrypted
in transit, appropriate to the properties of the technology
and usage. All keys should be managed securely.
6) Minimise exposed attack surfaces. All devices and services
should operate on the ‘principle of least privilege’; unused
ports should be closed, hardware should not unnecessarily
expose access, services should not be available if they are
not used and code should be minimised to the functionality
necessary for the service to operate. Software should run
with appropriate privileges, taking account of both security
and functionality.
7) Ensure software integrity. Software on IoT devices should
be verified using secure boot mechanisms. If an
unauthorised change is detected, the device should alert the
consumer/administrator to an issue and should not connect
to wider networks than those necessary to perform the
alerting function.</p>
      </sec>
      <sec id="sec-1-6">
        <title>8) Ensure that personal data is protected. Where devices</title>
        <p>and/or services process personal data, they shall do so in
accordance with applicable data protection law, such as the</p>
        <p>GDPR. Device manufacturers and IoT service providers
shall provide consumers with clear and transparent
information about how their data is being used, by whom,
and for what purposes, for each device and service. This
also applies to any third parties that may be involved
(including advertisers). Where personal data is processed
on the basis of consumers’ consent, this shall be validly and
lawfully obtained, with those consumers being given the
opportunity to withdraw it at any time.
9) Make systems resilient to outages. Resilience should be
built in to IoT devices and services where required by their
usage or by other relying systems, taking into account the
possibility of outages of data networks and power. As far
as reasonably possible, IoT services should remain
operating and locally functional in the case of a loss of
network and should recover cleanly in the case of
restoration of a loss of power. Devices should be able to
return to a network in a sensible state and in an orderly
fashion, rather than in a massive scale reconnect.
10) Monitor system telemetry data. If telemetry data is
collected from IoT devices and services, such as usage and
measurement data, it should be monitored for security
anomalies.
11) Make it easy for consumers to delete personal data.</p>
        <p>Devices and services should be configured such that
personal data can easily be removed from them when there
is a transfer of ownership, when the consumer wishes to
delete it and/or when the consumer wishes to dispose of the
device. Consumers should be given clear instructions on
how to delete their personal data.
12) Make installation and maintenance of devices easy.</p>
        <p>Installation and maintenance of IoT devices should employ
minimal steps and should follow security best practice on
usability. Consumers should also be provided with
guidance on how to securely set up their device.
13) Validate input data. Data input via user interfaces and
transferred via application programming interfaces (APIs)
or between networks in services and devices shall be
validated.</p>
      </sec>
      <sec id="sec-1-7">
        <title>2) Mapping of IoT Security Recommendations, Guidance</title>
        <p>and Standards to the UK’s Code of Practice for Consumer IoT</p>
      </sec>
      <sec id="sec-1-8">
        <title>Security, 14 October 2018</title>
        <p>This document [24], and the open data files and graphs provided
in its companion website [25], maps the Code of Practice for
Consumer IoT Security against published standards,
recommendations and guidance on IoT security and privacy
from around the world. Around 100 documents were reviewed
from nearly 50 organizations. Whilst not exhaustive, it
represents one of the largest collections of guidance available
to date in this area.</p>
        <p>The purpose of the mapping is to serve as a reference and tool
for users of the Code of Practice. Manufacturers and other
organisations are already implementing a range of standards,
recommendations and guidance and will seek to understand the
relationship between the Code of Practice and existing material
from industry and other interested parties.</p>
      </sec>
      <sec id="sec-1-9">
        <title>C. GSMA</title>
        <p>
          The GSM Association (GSMA) [
          <xref ref-type="bibr" rid="ref23">26</xref>
          ] represents the interests
of mobile operators worldwide, uniting more than 750 operators
with almost 400 companies in the broader mobile ecosystem,
including handset and device makers, software companies,
equipment providers and internet companies, as well as
organisations in adjacent industry sectors.
        </p>
      </sec>
      <sec id="sec-1-10">
        <title>1) GSMA IoT Security Guidelines, version 2.2, 29 February 2020</title>
        <p>The goal of the Internet of Things Security Guidelines
document set [27][28][29][30] is to provide the implementer of
an IoT technology or service with a set of design guidelines for
building a secure product. The set of guideline documents
promotes a methodology for developing secure IoT Services to
ensure security best practices are implemented throughout the
life cycle of the service. The documents provide
recommendations on how to mitigate common security threats
and weaknesses within IoT Services.</p>
      </sec>
      <sec id="sec-1-11">
        <title>2) GSMA IoT Security Assessment</title>
        <p>The GSMA IoT Security Assessment [31][32] (see § 2.1.2)
provides a flexible framework that addresses the diversity of the
IoT market, enabling companies to build secure IoT devices and
solutions as laid out in the GSMA IoT Security Guidelines (see
§ 2.3.1), a comprehensive set of best practices promoting the
secure end-to-end design, development and deployment of IoT
solutions.</p>
      </sec>
      <sec id="sec-1-12">
        <title>D. ENISA</title>
        <p>The European Union Agency for Cybersecurity [33] has been
working to make Europe cyber secure since 2004. The Agency
works closely together with Members States and other
stakeholders to deliver advice and solutions as well as
improving their cybersecurity capabilities. It also supports the
development of a cooperative response to large-scale
crossborder cybersecurity incidents or crises and since 2019, it has
been drawing up cybersecurity certification schemes.</p>
      </sec>
      <sec id="sec-1-13">
        <title>1) ENISA Good practices for IoT and Smart Infrastructures</title>
      </sec>
      <sec id="sec-1-14">
        <title>Tool</title>
        <p>
          This website [34] intends to provide an aggregated view of the
ENISA Good Practices for IoT and Smart Infrastructure [35]
that have been published the last years. This link comprises the
above-mentioned Baseline Security Recommendations for IoT
in the context of Critical Information Infrastructures [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] (see
§ 2.1.2) and then other publications about cars, hospitals,
airports, public transport and Industry 4.0.
        </p>
      </sec>
      <sec id="sec-1-15">
        <title>E. Other sources and references</title>
        <p>In this subsection we mention other miscellaneous sources
about privacy and security in IoT.</p>
        <p>
          CTIA [36] represents the U.S. wireless communications
industry and companies throughout the mobile ecosystem and
has organised a certification programme for the cybersecurity
of IoT devices [
          <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
          ] (see § 2.1.2).
        </p>
        <p>
          The Cloud Security Alliance (CSA) [37] is an organization
dedicated to defining and raising awareness of best practices to
help ensure a secure cloud computing environment, including
the Internet of Things with specific security controls [
          <xref ref-type="bibr" rid="ref14 ref15">14, 15</xref>
          ]
(see § 2.1.2).
        </p>
        <p>
          The Internet of Things Security Foundation (IoTSF) [38] is a
collaborative, nonprofit, international response to the complex
challenges posed by cybersecurity in the expansive
hyperconnected IoT world. Among its publications, listed in [39], we
can cite [
          <xref ref-type="bibr" rid="ref24">40</xref>
          ][
          <xref ref-type="bibr" rid="ref25">41</xref>
          ].
        </p>
        <p>
          The World Wide Web Consortium (W3C) [
          <xref ref-type="bibr" rid="ref26">42</xref>
          ] is an
international community that develops open standards to ensure
the long-term growth of the Web. It is led by Tim Berners-Lee,
the inventor of the Web. Its Web of Things (WoT) section [
          <xref ref-type="bibr" rid="ref27">43</xref>
          ]
seeks to counter the fragmentation of the IoT through standard
complementing building blocks (e.g. metadata and APIs) that
enable easy integration across IoT platforms and application
domains; to date, two W3C Recommendations have been
published about WoT [
          <xref ref-type="bibr" rid="ref28">44</xref>
          ][
          <xref ref-type="bibr" rid="ref29">45</xref>
          ].
        </p>
        <p>
          Of course, international standards developing organisations
(SDOs) – whose members are governmental bodies, agencies or
committees, one per member economy – have published
IoTrelated standards. We can cite the ITU-T Y.4000 series from the
International Telecommunication Union (ITU) [
          <xref ref-type="bibr" rid="ref30">46</xref>
          ][
          <xref ref-type="bibr" rid="ref31">47</xref>
          ] and a
few of those jointly published by the International Organization
for Standardization (ISO) and the International Electrotechnical
Commission (IEC) [
          <xref ref-type="bibr" rid="ref32">48</xref>
          ][
          <xref ref-type="bibr" rid="ref33">49</xref>
          ][
          <xref ref-type="bibr" rid="ref34">50</xref>
          ].
        </p>
        <p>
          Lastly, we show a glimpse of other relevant international
standards, under development or just finished. This list is taken
from the outcome of the 2020-04-10 webinar Integrating
privacy in the IoT ecosystem [
          <xref ref-type="bibr" rid="ref35">51</xref>
          ], organised by the Horizon
2020 project Next Generation Internet of Things (NGIoT) [
          <xref ref-type="bibr" rid="ref36">52</xref>
          ],
with the participation of Antonio Kung:
• ISO/IEC TR 20547-1, Information technology — Big data
reference architecture — Part 1: Framework and
application process, first edition published August 2020
• ISO/IEC TR 20547-2:2018, Information technology — Big
data reference architecture — Part 2: Use cases and derived
requirements, first edition published January 2018
• ISO/IEC 20547-3:2020, Information technology — Big data
reference architecture — Part 3: Reference architecture,
first edition published March 2020
• ISO/IEC 20547-4, Information technology — Big data
reference architecture — Part 4: Security and privacy, first
edition published September 2020
• ISO/IEC TR 20547-5:2018, Information technology — Big
data reference architecture — Part 5: Standards roadmap,
first edition published February 2018
• ISO/IEC CD 23751, Information technology — Cloud
computing and distributed platforms — Data sharing
agreement (DSA) framework
• ISO/IEC CD 27400.2, Cybersecurity – IoT security and
privacy – Guidelines (formerly known as ISO/IEC CD
27030, Information technology — Security techniques —
Guidelines for security and privacy in Internet of Things
(IoT))
• ISO/IEC CD TS 27101, Information technology — Security
techniques — Cybersecurity — Framework development
guidelines
• ISO/IEC CD 27556, Information technology — User-centric
framework for the handling of personally identifiable
information (PII) based on privacy preferences
• ISO/IEC WD 27557, Organizational privacy risk
management
• ISO/IEC WD TS 27560, Privacy technologies — Consent
record information structure
• ISO/IEC AWI 30149, Internet of things (IoT) —
        </p>
      </sec>
      <sec id="sec-1-16">
        <title>Trustworthiness framework</title>
        <p>• ISO/AWI 31700, Consumer protection — Privacy by design
for consumer goods and services</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>III. CONCLUSION</title>
      <p>Guidelines are important tools for different stakeholders
involved in the deployment of IoT solutions. They offer key
basic points and requirements to enhance the trust of end-users
and facilitate deployment. The documents highlighted in this
contribution show that an important amount of work has been
already done by several organisations and deserves to be taken
into account.</p>
      <p>Following the recommendations provided by the mapped
international standards, therefore, allows to respect the
principles of the GDPR: for example, the international standards
referred to the development phase are useful to respect the
“privacy by design” principle set in Article 25 GDPR; the
standards on the security of personal data processing are
functional to the respect of Article 32 GDPR.</p>
      <p>
        As a side note, the application of the principles of the GDPR
is not sufficient in cases where such processing of personal data
should concern Law Enforcement Agencies (LEAs). According
to the provisions of Article 29 of Directive (EU) 2016/680 [
        <xref ref-type="bibr" rid="ref37">53</xref>
        ],
in fact, the data controller may use an accountability mechanism
in the evaluation and adoption of technical-organisational
measures. In any case, the aforementioned measures must be
suitable to guarantee an adequate level of security in order to
avoid the risk of personal data violation.
      </p>
      <p>
        In general, it is useful to use all international standards as
guidelines and to deduce the best practices necessary to achieve
a level of security that can generate trust in end-users and
simultaneously achieve compliance with the main regulations.
All the mapping efforts across different security controls and
publications show that the amount of redundancies is very high:
we can then state that a consensus, a “common sense” has
emerged in the field of IoT cybersecurity and privacy. Moreover,
from a broader perspective, we can say that IoT security
measures overlap consistently with cybersecurity frameworks
and standards already in place for “traditional computing”:
consider, for instance, ISO/IEC 27001:2013 [
        <xref ref-type="bibr" rid="ref38">54</xref>
        ] and the
      </p>
      <sec id="sec-2-1">
        <title>Common Criteria for Information Technology Security</title>
        <p>
          Evaluation [
          <xref ref-type="bibr" rid="ref39">55</xref>
          ][
          <xref ref-type="bibr" rid="ref40">56</xref>
          ][
          <xref ref-type="bibr" rid="ref41">57</xref>
          ][
          <xref ref-type="bibr" rid="ref42">58</xref>
          ][
          <xref ref-type="bibr" rid="ref43">59</xref>
          ][
          <xref ref-type="bibr" rid="ref44">60</xref>
          ].
        </p>
        <p>
          It is paramount at legislation level to properly address the
need to go beyond what the GDPR and the NISD (Network and
Information Security Directive) [
          <xref ref-type="bibr" rid="ref45">61</xref>
          ] today represent. With the
progress of technology, is obvious that lawmakers have the duty
to follow rapidly the new challenges that arise from the evolution
in the societal and economic global landscape. In this sense, the
integration of IoT in homes, cities and industries gives the
legislators the opportunity (or necessity?) to build a new legal
framework to comply with ethical requirements, to better protect
freedoms and rights of citizens, at an increasingly supranational
and intergovernmental level. A “GDPR of Things” is therefore
urgent, with an expanded scope from previous laws, in order to
establish stricter rules and norms for information security and
personal data protection in World that moves fast towards
“ubiquitous computing” (IoT, 5G, wearables, etc.).
        </p>
        <p>In parallel with new legislative frameworks, it would be
preferable a consolidation of standards and best practices carried
forward by SDOs and the private sector in an open and
interoperable way, before the proliferation of “walled gardens”
that may compromise freedoms and rights of citizens worldwide.
[19]
https://www.gov.uk/government/organisations/department-for-digitalculture-media-sport/
[24]
https://www.gov.uk/government/publications/mapping-of-iot-securityrecommendations-guidance-and-standards/
[25] Copper Horse Ltd. on behalf of DCMS, Mapping Securi-ty &amp; Privacy in
the Internet of Things; https://iotsecuritymapping.uk/
[28] GSMA, IoT Security Guidelines for IoT Service Ecosystem;
https://www.gsma.com/iot/iot-security-guidelines-for-iot-serviceecosystem/
[30] GSMA, IoT Security Guidelines for Network
https://www.gsma.com/iot/iot-security-guidelines-for-networkoperators/
Operators;
[31] GSMA, IoT Security Assessment Checklist, version 3.0, 30 September
2018; .zip file available at
https://www.gsma.com/iot/iot-securityassessment/
[32] GSMA, IoT Security Assessment Process, version 2.0, 30 September
2018; .zip file available at
https://www.gsma.com/iot/iot-securityassessment/
[33] https://www.enisa.europa.eu/
[34]
https://www.enisa.europa.eu/topics/iot-and-smart</p>
        <p>infrastructures/iot/good-practices-for-iot-and-smart-infrastructures-tool/
[35] https://www.enisa.europa.eu/topics/iot-and-smart-infrastructures/
[36] https://www.ctia.org/
[37] https://cloudsecurityalliance.org/
[38] https://www.iotsecurityfoundation.org/
[39] https://www.iotsecurityfoundation.org/best-practice-guidelines/</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Regulation</surname>
          </string-name>
          (EU)
          <year>2016</year>
          /
          <article-title>679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of per-sonal data and on the free movement of such data</article-title>
          ,
          <source>and repealing Directive</source>
          <volume>95</volume>
          /46/EC (
          <article-title>General Data Protection Regulation) (Text with EEA relevance); current consoli-dated version (</article-title>
          <year>2016</year>
          -05-04) available at https://eur-lex.europa.eu/eli/reg/2016/679/2016-05-04
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>European</given-names>
            <surname>Union</surname>
          </string-name>
          <article-title>Agency for Cybersecurity (ENISA), Privacy and Data Protection by Design - from policy to en-gineering, 12 January 2015</article-title>
          ; PDF available at https://www.enisa.europa.eu/publications/privacy-and
          <article-title>-dataprotection-by-design/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Information</surname>
          </string-name>
          &amp; Privacy
          <string-name>
            <surname>Commissioner</surname>
          </string-name>
          (Ontario, Cana-da), Ann Cavoukian,
          <article-title>The 7 Foundational Principles</article-title>
          .
          <article-title>Im-plementation and Mapping of Fair Information Practices</article-title>
          ; PDF available at https://www.ipc.on.ca/wpcontent/uploads/Resources/pbd-implement
          <string-name>
            <surname>-</surname>
          </string-name>
          7found-principles.pdf
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>OWASP</given-names>
            <surname>Foundation</surname>
          </string-name>
          , Inc.; https://owasp.org/
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>OWASP</given-names>
            <surname>Top</surname>
          </string-name>
          <article-title>10; https://owasp.org/www-project-top-ten/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <source>[6] OWASP IoT Top 10</source>
          ,
          <year>2018</year>
          ; https://wiki.owasp.org/index.php/OWASP_Internet_of_Things_Project#t ab=
          <source>IoT_Top_10</source>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <source>[7] OWASP IoT Top</source>
          <volume>10</volume>
          2018
          <string-name>
            <given-names>Mapping</given-names>
            <surname>Project</surname>
          </string-name>
          ; https://scriptingxss.gitbook.io/owasp-iot-top-10
          <string-name>
            <surname>-</surname>
          </string-name>
          mapping-project/ and https://wiki.owasp.org/index.php/OWASP_Internet_of_Things_Project#t ab=OWASP_IoT_Top_
          <volume>10</volume>
          _2018_Mapping_Project
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <source>[8] OWASP IoT Top 10</source>
          ,
          <year>2018</year>
          ; https://wiki.owasp.org/index.php/Top_10_IoT_Vulnerabilities_(
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9] https://www.gsma.com/security/resources/clp-17
          <string-name>
            <surname>-</surname>
          </string-name>
          gsma
          <article-title>-iot-securityassessment-checklist-v3-0/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10] https://www.gov.uk/government/publications/code
          <article-title>-of-practice-forconsumer-iot-security/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11] https://www.enisa.europa.eu/publications/baseline
          <article-title>-securityrecommendations-for-iot/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12] CTIA,
          <source>IoT Cybersecurity Certification Program Manage-ment Document, version 1</source>
          .1,
          <string-name>
            <surname>May</surname>
            <given-names>2019</given-names>
          </string-name>
          ; PDF available at https://api.ctia.org/wp-content/uploads/2019/05/ctia_IoT_
          <article-title>cybersecurity_pmd_ver-1_1</article-title>
          .pdf
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13] CTIA,
          <string-name>
            <surname>IoT Cybersecurity Certification</surname>
            <given-names>FAQ</given-names>
          </string-name>
          , version
          <volume>1</volume>
          .0,
          <issue>28</issue>
          <year>March 2019</year>
          ; PDF available at https://api.ctia.org/wp-content/uploads/2019/03/CTIACertification-FAQ-Ver-
          <volume>1</volume>
          .
          <fpage>0</fpage>
          -28-March-2019.pdf
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14] CSA,
          <source>IoT Security Controls Framework, 5 March</source>
          <year>2019</year>
          ; https://cloudsecurityalliance.org/artifacts/iot-security-controlsframework/
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>CSA</surname>
          </string-name>
          , Guide to the
          <source>IoT Security Controls Framework, 5 March</source>
          <year>2019</year>
          ; https://cloudsecurityalliance.org/artifacts/guide
          <article-title>-to-the-iot-securitycontrols-framework/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>[16] https://www.etsi.org/deliver/etsi_ts/103600_103699/103645/01.01.01_6 0/ts_103645v010101p.pdf</mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>[17] https://www.etsi.org/deliver/etsi_ts/103600_103699/103645/02.01.02_6 0/ts_103645v020102p.pdf</mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>ETSI</given-names>
            <surname>European</surname>
          </string-name>
          <article-title>Standard (EN) 303 645 V2</article-title>
          .1.
          <issue>1</issue>
          (
          <issue>2020</issue>
          -06); https://www.etsi.org/deliver/etsi_en/303600_303699/303645/02.01.01_6 0/en_303645v020101p.pdf
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>[20] https://petras-iot.org/</mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [21]
          <string-name>
            <surname>PETRAS IoT Hub</surname>
          </string-name>
          ,
          <article-title>Summary literature review of industry recommendations and international developments on IoT se-curity, 7 March 2018</article-title>
          ; https://www.gov.uk/government/publications/summaryliterature
          <article-title>-review-on-iot-security/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>[22] https://www.ncsc.gov.uk/</mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>[23] https://www.gov.uk/government/collections/secure-by-design/</mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>[26] GSM Association; https://www.gsma.com/</mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [40] IoTSF,
          <source>IoT Security Compliance Framework, Release</source>
          <volume>2</volume>
          .1, May
          <year>2020</year>
          ; .zip file available at https://www.iotsecurityfoundation.org/wpcontent/uploads/2020/05/
          <string-name>
            <surname>IoTSF-IoT-Security-Compliance-FrameworkQuestionnaire-</surname>
          </string-name>
          Release-
          <volume>2</volume>
          .1.zip
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [41]
          <article-title>IoTSF, Mapping the IoT Security Foundation's Compliance Framework to ETSI TS 103 645 Standard</article-title>
          ,
          <year>February 2019</year>
          ; PDF available at https://www.iotsecurityfoundation.org/wpcontent/uploads/2019/02/Mapping-the-IoTSF%
          <article-title>E2%80%99sCompliance-Framework-to-</article-title>
          <string-name>
            <surname>ETSI-TS-</surname>
          </string-name>
          103-645-Standard.pdf
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>[42] https://www.w3.org/</mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>[43] https://www.w3.org/WoT/</mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [44]
          <fpage>W3C</fpage>
          ,
          <article-title>Web of Things (WoT) Architecture, W3C Recom-mendation, 9 April 2020</article-title>
          ; https://www.w3.org/TR/wot-architecture/
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [45]
          <fpage>W3C</fpage>
          ,
          <article-title>Web of Things (WoT) Thing Description, W3C Rec-ommendation, 9 April 2020 (link errors corrected 23</article-title>
          <year>June 2020</year>
          ); https://www.w3.org/TR/wot-thing-description/
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [46]
          <string-name>
            <surname>ITU-T Recommendation</surname>
          </string-name>
          Y.4000/Y.
          <year>2060</year>
          (approved in 2012-
          <volume>06</volume>
          -15); SERIES Y:
          <article-title>GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS</article-title>
          AND
          <string-name>
            <surname>NEXT-GENERATION</surname>
            <given-names>NETWORKS</given-names>
          </string-name>
          ;
          <article-title>Next Generation Networks - Frameworks and func-tional architecture models; Overview of the Internet of things (former ITU-T Y.2060 renumbered as ITU-T Y.4000 on 2016-02-05 without further modification and without being republished</article-title>
          ); https://www.itu.int/rec/TREC-Y.
          <fpage>4000</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>[47] https://www.itu.int/ITU-T/recommendations/index.aspx?ser=Y</mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [48] ISO/IEC 21823-1:
          <fpage>2019</fpage>
          ,
          <article-title>Internet of things (IoT) - Interop-erability for IoT systems</article-title>
          - Part 1: Framework,
          <year>February 2019</year>
          ; https://www.iso.org/standard/71885.html
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [49] ISO/IEC 21823-2:
          <fpage>2020</fpage>
          ,
          <article-title>Internet of things (IoT) - Interop-erability for IoT systems</article-title>
          - Part 2:
          <string-name>
            <surname>Transport</surname>
          </string-name>
          interoperabil-ity,
          <year>April 2020</year>
          ; https://www.iso.org/standard/80986.html
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [50] ISO/IEC 30141:
          <year>2018</year>
          ,
          <article-title>Internet of Things (loT) - Reference Architecture, first edition published August 2018 (sec-ond edition pending</article-title>
          ); https://www.iso.org/standard/65695.html
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [51] https://www.ngiot.eu/event/ngiot
          <article-title>-webinar-integrating-privacy-in-the-iotecosystem/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>[52] https://cordis.europa.eu/project/id/825082</mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [53]
          <string-name>
            <surname>Directive</surname>
          </string-name>
          (EU)
          <year>2016</year>
          /
          <article-title>680 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of per-sonal data by competent authorities for the purposes of the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penal-ties, and on the free movement of such data, and re-pealing Council Framework Decision 2008/977/JHA; current consolidated version (</article-title>
          <year>2016</year>
          -05-04) available at https://eurlex.europa.eu/eli/dir/2016/680/2016-05-04
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [54] ISO/IEC 27001:
          <year>2013</year>
          ,
          <article-title>Information technology - Security techniques - Information security management systems</article-title>
          - Requirements; https://www.iso.org/standard/54534.html
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [55] ISO/IEC 15408-1:
          <fpage>2009</fpage>
          ,
          <article-title>Information technology - Securi-ty techniques - Evaluation criteria for IT security - Part 1: Introduction and general model</article-title>
          ,
          <year>December 2009</year>
          (
          <article-title>cor-rected version</article-title>
          <source>January</source>
          <year>2014</year>
          ); https://www.iso.org/standard/50341.html
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [56] ISO/IEC 15408-2:
          <fpage>2008</fpage>
          ,
          <article-title>Information technology - Securi-ty techniques - Evaluation criteria for IT security - Part 2: Security functional components</article-title>
          ,
          <year>August 2008</year>
          (corrected version May
          <year>2011</year>
          ); https://www.iso.org/standard/46414.html
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [57] ISO/IEC 15408-3:
          <fpage>2008</fpage>
          ,
          <article-title>Information technology - Securi-ty techniques - Evaluation criteria for IT security - Part 3: Security assurance components</article-title>
          ,
          <year>August 2008</year>
          (corrected version May
          <year>2011</year>
          ); https://www.iso.org/standard/46413.html
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          <source>[58] ISO/IEC DIS 15408-4</source>
          , Information security, cybersecurity
          <article-title>and privacy protection - Evaluation criteria for IT security - Part 4: Framework for the specification of evaluation methods and activities</article-title>
          , under development; https://www.iso.org/standard/72913.html
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          <source>[59] ISO/IEC DIS 15408-5</source>
          , Information security, cybersecurity
          <article-title>and privacy protection - Evaluation criteria for IT security - Part 5: Pre-defined packages of security requirements, under development</article-title>
          ; https://www.iso.org/standard/72917.html
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          [60] ISO/IEC 18045:
          <year>2008</year>
          ,
          <article-title>Information technology - Security techniques - Methodology for IT security evaluation, Au-gust 2008 (corrected version January</article-title>
          <year>2014</year>
          ); https://www.iso.org/standard/46412.html
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          [61]
          <string-name>
            <surname>Directive</surname>
          </string-name>
          (EU)
          <year>2016</year>
          /
          <article-title>1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and in-formation systems across the Union; https://eurlex</article-title>
          .europa.eu/eli/dir/2016/1148/oj
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>