Trusted IoT Device Network-Layer Onboarding and Lifecycle Management

As with any other device, an IoT device needs appropriate credentials in order to connect to a network securely. The process of provisioning these credentials to the device is called network-layer onboarding.

Approaches to trusted network-layer onboarding of IoT devices and lifecycle management of the devices

The NCCoE, in collaboration with industry, is committed to providing actionable cybersecurity solutions to help strengthen the security of IoT devices and their networks through trusted network-layer onboarding and lifecycle management.
Status: Reviewing Comments

The public comment period has closed for Trusted Internet of Things (IoT) Device Network-Layer Onboarding and Lifecycle Management: Enhancing Internet Protocol-Based IoT Device and Network Security. We are currently reviewing the comments received. Thank you to everyone who shared their feedback with us. 

NIST SP 1800-36A: Executive Summary (2nd Preliminary Draft)Document Version NIST SP 1800-36A: Executive Summary (2nd Preliminary Draft)
NIST SP 1800-36B: Approach, Architecture, and Security Characteristics (2nd Preliminary Draft)Document Version NIST SP 1800-36B: Approach, Architecture, and Security Characteristics (2nd Preliminary Draft)
NIST SP 1800-36C: How-To Guides (2nd Preliminary Draft)Document Version NIST SP 1800-36C: How-To Guides (2nd Preliminary Draft)
NIST SP 1800-36D: Functional Demonstrations (2nd Preliminary Draft)Document Version NIST SP 1800-36D: Functional Demonstrations (2nd Preliminary Draft)
NIST SP 1800-36E: Risk and Compliance Management (2nd Preliminary Draft)Document Version NIST SP 1800-36E: Risk and Compliance Management (2nd Preliminary Draft)

Project Abstract

Provisioning network credentials to IoT devices in an untrusted manner leaves networks vulnerable to having unauthorized IoT devices connect to them. It also leaves IoT devices vulnerable to being taken over by unauthorized networks. Instead, trusted, scalable, and automatic mechanisms are needed to safely manage IoT devices throughout their lifecycles, beginning with secure ways to provision devices with their network credentials—a process known as trusted network-layer onboarding. Trusted network-layer onboarding, in combination with additional device security capabilities such as device attestation, application-layer onboarding, secure lifecycle management, and device intent enforcement could improve the security of networks and IoT devices.

This draft practice guide aims to demonstrate how organizations can protect both their IoT devices and their networks. The NCCoE is collaborating with product and service providers to produce example implementations of trusted network-layer onboarding and capabilities that improve device and network security throughout the IoT-device lifecycle to achieve this.

Read the project description

The current lack of trusted IoT device onboarding processes leaves many networks vulnerable to having unauthorized devices connect to them.

Collaborating Vendors

Organizations participating in this project submitted their capabilities in response to an open call in the Federal Register for all sources of relevant security capabilities from academia and industry (vendors and integrators). The following respondents with relevant capabilities or product components (identified as “Technology Partners/Collaborators” herein) signed a Cooperative Research and Development Agreement to collaborate with NIST in a consortium to build this example solution.

Supplemental Resources

Cybersecurity Paper: Trusted Internet of Things (IoT) Device Network-Layer Onboarding and Lifecycle Management 

This document provides background information on trusted IoT device network-layer onboarding and lifecycle management and defines a taxonomy of onboarding characteristics that can be used to discuss potential onboarding solutions in product-agnostic terms. This document in conjunction with the Virtual Workshop on Trusted IoT Device Network-Layer Onboarding and Lifecycle Management informed the development of the project description.

Read the paper
Metal arrow pointing upward

Join the Community of Interest

Employee speaking on video call with colleagues on online briefing with laptop at home

A Community of Interest (COI) is a group of professionals and advisors who share business insights, technical expertise, challenges, and perspectives to guide NCCoE projects. COIs often include experts, innovators, and everyday users of cybersecurity and privacy technologies. Share your expertise and consider becoming a member of this project's COI. 

Tell us about yourself

First & Last Name