Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

IoT Cybersecurity Improvement Act: An Important Step Forward

At Tenable, we look forward to working with our partners on Capitol Hill to move the IoT Cybersecurity Improvement Act forward and strengthen the security of federal networks.  

Billions of devices connect the world we live in and track our daily activities and patterns. From the smartwatch on your wrist to your front door security camera, your personal data and everyday movements enable our digitally transformed lives. Internet of things (IoT) devices are also enabling more advanced technological capabilities for the federal government, including critical infrastructure, and it’s critical to ensure that these devices are cyber-secure.

Many IoT devices are shipped with existing vulnerabilities, which can heighten risk. For example, many devices include factory-set, hardcoded passwords. Other devices can’t be patched or updated. This presents critical security gaps and leaves networks vulnerable to cyberattacks and data compromises. 

To address these growing security challenges, Senator Mark Warner (D-VA), along with his colleagues Senators Cory Gardner (R-CO), Maggie Hassan (D-NH) and Steve Daines (R-MT), and Representatives Robin Kelly (D-IL) and Will Hurd (R-TX) introduced the IoT Cybersecurity Improvement Act (S. 734/H.R. 1668). This legislation would establish baseline security requirements for IoT devices purchased by the federal government to create a stronger and more secure ecosystem. It is an important step forward in shrinking the ever-expanding attack surface. 

The IoT Cybersecurity Improvement Act would require the National Institute of Standards and Technology (NIST) to develop recommended standards for the use of IoT devices by the federal government and would issue guidelines for each agency consistent with those recommendations. In consultation with cybersecurity researchers and private-sector industry experts, NIST would also be required to publish guidance on policies and procedures for reporting, coordinating, publishing and receiving information about security vulnerabilities in devices used by the government and the resolution of such vulnerabilities. Additionally, the Office of Management and Budget (OMB) and the General Services Administration (GSA) contractors and vendors would be required to adhere to these established NIST guidelines. 

NIST’s recommended standards for federal IoT devices would act as a key baseline to help agencies manage their risk. It would also be an important step towards addressing the standards gap and the cyber exposure gap for IoT devices. The current lack of guidance continues to put the security of federal agencies at risk.  

Tenable strongly supports the bill’s call for NIST to include Cyber Exposure considerations in a report on the increasing convergence of IT, IoT and OT devices, networks and systems. Cyber Exposure, a way to manage and measure the modern attack surface, helps organizations accurately understand and reduce cyber risk. Ultimately, Tenable believes there must be a shift in mentality away from traditional IT management for IoT to more self-healing IoT devices. This would reduce the burden on consumers so they don’t need to serve as system administrators for each device. Further, we will need to build stronger trust in consumer IoT devices, as they tend to have access to much more personal information (photos, health data, etc.) about us than computers. We applaud the development of standards and guidelines at NIST to help assert that trust.

The IoT Cybersecurity Improvement Act is an important step to help secure the billions of IoT devices that connect our world. The government has significant buying power, and stronger federal procurement standards for the security of IoT will lead to stronger security practices in the commercial marketplace as well. We also believe this legislation will play a strong role as the government works to manage its collective cyber risk. Finally, other nations are moving forward with IoT security regulations and requirements and we believe it is important for the U.S. to play a leadership role in IoT security policy. 

Developing advanced cyber hygiene practices is in the best interest of the global ecosystem. We urge the Oversight and Reform Committee to advance this critical piece of legislation and we hope it will be considered by the full House and Senate in the near future. We look forward to working with our partners on Capitol Hill to move the bill forward and strengthen the security of federal networks.  

Learn more:

Subscribe to the Tenable Blog

Subscribe
Try for Free Buy Now

Try Tenable.io

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,190.00

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 60 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578.00

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 60 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.