Page 103 - 2015 Security in Telecommunications and Information Technology
P. 103
Unleashing the potential of the Internet of Things 3
Requirement Requirement Requirement description Summary of
number category the requirement
SP4 Security and Integration of different security Integration of different
privacy policies and techniques related security policies and
protection to the variety of devices and user techniques is required.
networks in IoT is required.
SP5 Security and Before a device (or an IoT user) Mutual authentication
privacy can access the IoT, mutual and authorization is
protection authentication and authorization required.
is required according to
predefined security policies.
SP6 Security and Any data access or attempt to Security audit is
privacy access IoT applications are required to be
protection required to be fully transparent, supported in IoT.
traceable and reproducible
according to appropriate
regulation and laws.
Rec. ITU-T Y.4100/Y.2066 (06/2014) 89