CoP 5: Communicate securely

Security-sensitive data, including any remote management and control, should be encrypted in transit, appropriate to the properties of the technology and usage. All keys should be managed securely.

The use of open, peer-reviewed internet standards is strongly encouraged.

Primarily applies to: Device Manufacturers, IoT Service Providers, Mobile Application Developers

View a full-screen version of this mapping

Download this data

v4 (JSON) (CSV) (ODS)

v3 (JSON) (CSV) (ODS)

v2 (JSON) (CSV) (ODS)

v1 (JSON) (CSV) (ODS)

search previous next tag category expand menu location phone mail time cart zoom edit close