From sensors to gateways IoT security with SESIP

From sensors to gateways IoT security with SESIP

Learn about SESIP, the evaluation standard for IoT security, its scope, requirements and use cases. Understand how it aims to improve security across a wide range of IoT devices.

What is SESIP?

SESIP, developed by the non-profit GlobalPlatform, is a comprehensive evaluation standard for the security of IoT platforms. It provides a structured framework for assessing the security properties of IoT products, from simple sensors to complex gateways. SESIP is notable for its flexibility and scalability, which let the standard be applied to a broad spectrum of IoT solutions.

Core elements of SESIP

The SESIP standard stands out through several innovative core elements that make it a promising approach to evaluating IoT security. These elements address the specific challenges of the IoT ecosystem and provide a flexible framework for security evaluations.

Scalable security levels

A central feature of SESIP is its scalability. The standard defines multiple security levels that impose different requirements on the implementation and verification of security functions. This allows flexible adaptation to various IoT products, from resource-constrained devices to complex systems.

Comprehensive security objectives

SESIP sets clear objectives for critical aspects of IoT security, including privacy, integrity, authentication and secure communication. These comprehensive security goals form the basis for a thorough evaluation of an IoT platform's security features.

Flexible applicability

SESIP is designed to be applicable to a wide range of IoT products. This flexibility is particularly important in the diverse landscape of the Internet of Things, where devices with very different capabilities and resources coexist.

Reuse of evaluation results

An innovative aspect of SESIP is its encouragement of reusing evaluation results. This can significantly save time and cost in developing new products, since already evaluated components or platforms can be used in new designs.

Compatibility with existing standards

SESIP was developed with compatibility in mind. In particular, its alignment with the Common Criteria (CC), an established standard for IT security evaluations, is noteworthy. This compatibility makes it easier to transition to SESIP and allows manufacturers to build on existing certifications.

Content and requirements of SESIP

SESIP defines a set of security functions that IoT devices should implement. These include secure communication, secure storage, cryptographic operations, authentication, authorization, secure boot and firmware update mechanisms. The standard also includes a generic threat model for IoT devices and specifies how a product's security functions and mechanisms should be assessed.

SESIP requirements cover conformity with security objectives, conducting penetration tests (depending on the security level), effective lifecycle management, robust cryptographic implementations and secure key management. Higher security levels may require specific hardware security mechanisms.

SESIP and Common Criteria

SESIP can be seen as a specialized, IoT-focused adaptation of the principles behind Common Criteria (CC). While CC is a broader standard for many types of IT products, SESIP was specifically developed to address the needs and challenges of IoT devices and platforms. SESIP offers a more accessible and efficient approach for IoT products without compromising the thoroughness of security evaluation. The compatibility between the two standards allows manufacturers to use SESIP as a stepping stone toward more comprehensive security certifications.

Application and users of SESIP

SESIP can be used by various actors in the IoT industry. IoT device manufacturers can apply the standard to evaluate and certify their products, helping to build customer trust and meet market requirements. Semiconductor vendors can use SESIP to assess IoT chipsets and platforms, while software developers can apply it to ensure the security of their IoT operating systems and middleware.

Regulators, large enterprises, cloud service providers and telecommunications companies can also rely on SESIP to ensure the security of IoT deployments. In specific sectors such as automotive, healthcare and industrial IoT, SESIP could play a significant role in ensuring high security standards.

It is important to emphasize that the practical application and acceptance of SESIP are still in their early stages. The extent to which the standard will be widely implemented and beneficial in practice remains to be seen.

The SESIP evaluation process

SESIP testing is carried out by accredited testing laboratories that have specific expertise in IoT security and the SESIP methodology. The evaluation process includes several steps, such as documentation review, functional testing, vulnerability analysis and, for higher security levels, penetration testing.

Evaluators assess not only the technical aspects but also the development processes and lifecycle management of the product. After the evaluation is complete, a detailed assessment report is produced and reviewed by an independent certification body. If the product passes the evaluation, a SESIP certificate is issued.

Currently TrustCB is the only certification body that can confirm conformity with SESIP. The list of official certification bodies is available here: https://globalplatform.org/sesip-cb/.

TrustCB works with several laboratories for SESIP scheme conformity assessment, including Applus+ (Spain), Riscure (Netherlands), Serma Safety & Security (France), SGS Brightsight (Netherlands and Spain) and TÜV Informationstechnik (Germany).

Assessment and conclusion

SESIP represents a promising new approach to evaluating the cybersecurity of IoT devices. The standard offers a balanced approach between rigor and practicality and addresses the specific challenges of the IoT ecosystem. By proposing a unified framework for security evaluation in the IoT domain, SESIP has the potential to contribute to improving the overall security of connected devices.

However, it is important to note that SESIP is still in an early phase and has not yet established itself as a widely adopted standard. The limited number of testing laboratories and certification bodies indicates that its spread is still restricted. Whether SESIP will gain broad industry acceptance and become more established remains to be seen.

Regardless of how widely it will be adopted in the future, SESIP offers an innovative and structured approach to assessing IoT security. For manufacturers, developers and users of IoT solutions, SESIP could become a valuable tool to improve and demonstrate the security of their products.