Skip to main content
Version: 4.0

2.4.8 Authentication & Authorisation

This section’s intended audience is for those personnel who are responsible for the security of the IoT systems interfaces and authentication processes. Guidance is available from the IoTSF Best Practice Guides (IOTSF.SD-BPG) regarding Credential Management (part F).

Req NoRequirementPrimary KeywordSecondary KeywordCompliance Class And Applicability
2.4.8.1The product contains a unique and tamper-resistant device identifier. E.g.: the chip serial number or other unique silicon identifier, for example to bind code and data to a specific device hardware. This is to mitigate threats from cloning and also to ensure authentication may be done assuredly using the device identifier e.g. using a device certificate containing the device identifier.SystemHardwareMandatory for all classes
2.4.8.2Where the product has a secure source of time there is a method of validating its integrity.SystemSoftwareMandatory for Class 1 and above
2.4.8.3Where a user interface password is used for login authentication, the factory issued or reset password is randomly unique for every device in the product family. If a password-less authentication is used the same principles of uniqueness apply.SystemSoftwareMandatory for all classes
2.4.8.4The product does not accept the use of null or blank passwords.SystemSoftwareMandatory for all classes
2.4.8.5The product will not allow new passwords containing the user account name with which the user account is associated.SystemSoftwareMandatory for all classes
2.4.8.6Password entry follows industry standard practice on password length, characters from the groupings and special characters.SystemSoftwareMandatory for all classes
2.4.8.7The product has defence against brute force repeated login attempts, such as exponentially increasing retry attempt delays.SystemSoftwareMandatory for Class 1 and above
2.4.8.8The product securely stores any passwords using an industry standard cryptographic algorithm, compliant with an industry standard.SystemSoftwareMandatory for Class 1 and above
2.4.8.9The product supports access control measures to the root/highest privilege account to restrict access to sensitive information or system processes.SystemSoftwareMandatory for Class 1 and above
2.4.8.10The access control privileges are defined, justified and documented.BusinessProcessMandatory for Class 1 and above
2.4.8.11The product only allows controlled user account access; access using anonymous or guest user accounts is not supported without justification.SystemSoftwareMandatory for Class 1 and above
2.4.8.12The product allows the factory issued or OEM login accounts to be disabled or erased or renamed when installed or commissioned.SystemSoftwareAdvisory for all classes
2.4.8.13The product supports having any or all of the factory default user login passwords altered when installed or commissioned.BusinessProcessMandatory for all classes
2.4.8.14If the product has a password recovery or reset mechanism, an assessment has been made to confirm that this mechanism cannot readily be abused by an unauthorised party.BusinessProcessMandatory for Class 1 and above
2.4.8.15Where passwords are entered on a user interface, the actual pass phrase is obscured by default.SystemSoftwareMandatory for Class 1 and above
2.4.8.16The product allows an authorised and complete factory reset of all of the device’s authorisation information.SystemSoftwareAdvisory for all classes
2.4.8.17Where the product has the ability to remotely recover from attack, it should rely on a known good state, to enable safe recovery and updating of the device, but should limit access to sensitive assets until the devices is in a known secure condition.SystemSoftwareMandatory for Class 1 and above
2.4.8.18Devices are provided with a RoT-backed unique authenticable logical identity.SystemSoftwareMandatory for Class 1 and above