FB pixel

IoT device authentication rules unclear as California law comes into force

IoT device authentication rules unclear as California law comes into force
 

This article originally appeared on EdgeIR.com

California has become the first state in the country to regulate IoT security, an action that has raised concern from tech vendors and industry experts. Approved by then-California Governor Jerry Brown in September 2018, Senate Bill 327 aims to bolster the security of internet-connected devices by requiring manufacturers to take reasonable measures to ensure that data are protected.

The bill, now enacted, stated that “a manufacturer of a connected device, as those terms are defined, to equip the device with a reasonable security feature or features that are appropriate to the nature and function of the device, appropriate to the information it may collect, contain or transmit, and designed to protect the device and any information contained therein from unauthorized access, destruction, use, modification or disclosure, as specified.”

This is not the first time US lawmakers have addressed IoT manufacturers in an attempt to regulate the connected landscape. Senator Warner (D-VA) introduced in March 2019 the Internet of Things Cybersecurity Improvement Act of 2019 to require enhanced security measures from IoT device manufacturers. California, by virtue of being the world’s fifth largest economy, has put its own stamp on the matter with the new regulations that took effect Jan. 1, 2020.

Critics say the new law leaves an open question regarding a clear definition of key terms such as “reasonable security feature” and “connected device,” making future steps unclear. Additionally, the law does not only address consumer devices, but it impacts an overwhelmingly number of different devices sold in the state.

“The definition of “connected device” is fairly clear in the law’s language, but has some potential gaps,” according to Adrian Sanabria, advocate for Thinkst Applied Research. “There are many examples of IoT devices that don’t connect to the Internet (and would therefore be exempt from this law) that could be attacked if anyone is in physical proximity to them,” he said, noting that devices such as headphones with built-in microphones as an example of devices that might-or might not-be exempt.

According to the law, any equipment that connects to the internet and has an IP or Bluetooth address is considered a connected device, including printers, PoS terminals, medical equipment, fridges, smart light bulbs and smart watches. Additionally, hard-coded passwords, also known as embedded credentials, are not accepted as security standards under the new law, and, to be activated, devices will need to have unique passcodes.

Is it just a matter of device authentication to enable a quick fix or is the industry looking at a more stringent approach for connected devices sold across the state such as creating a special line of products? There’s no clear answer to that question yet.

Another question: what happens if there is a violation of the law? The government is the only institution that can run investigations under the law, as it can only be enforced by the California Attorney General, city attorneys, county councils and district attorneys, and does not give the right of private action. Manufacturers will have to share data with law enforcement if authorized by a court order.

As of January 2020, enterprises trying to do business in California will not only have to deal with new guidelines and responsibilities under the IoT cybersecurity law, but also with the separate matter of the California Consumer Privacy Act (CCPA) which addresses data privacy and security. There are some valid, pressing issues that the California legislature has tried to address with these two laws in the absence of federal leadership on matters of privacy and security. Still, there are clearly many new issues of interpreting and enforcing the law that are raised with the implementation of CCPA and SB 327.

What is the law missing? How will it affect manufacturers and what does “reasonable security feature” even mean? At national level, how will the new restrictions affect manufacturers’ product offering in a constant struggle to satisfy consumer expectations? Thinkst’s Sanabria offers his in-depth response to these questions in this related article.

Jim Davis is the managing editor of EdgeIR.com and founder and principal analyst at Edge Research Group. Luana Pascu also contributed to this report.

Article Topics

 |   |   |   |   |   |   |   |   |   | 

Latest Biometrics News

 

Biometrics race for the borders

Biometrics to ease border crossings are a major theme of the week among Biometric Update’s most-read articles of the week….

 

US election likely to be a missed opportunity to advance digital ID policy

The 2024 U.S. election represents an opportunity for social dialogue around digital identity policy in the wake of a series…

 

India to pilot Digi Yatra for foreign nationals in 2025

India is planning an international pilot project for June 2025 that will see the introduction of facial recognition technology beyond…

 

Papua New Guinea advances digital ID, wallet and govt platform to pilot

Papua New Guinea has stood up a new digital ID, wallet and online government platform, and plans to pilot them…

 

UK police organized crime unit seeks new facial recognition software

The UK’s main law enforcement agency against organized crime is looking into new facial recognition solutions, as the country doubles…

 

The EUDI Wallet was not meant for age assurance: AVPA

The European Union should not look at the EU Digital Identity (EUDI) Wallet as an age-assurance solution to keep minors…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Most Read This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events