Summary

This chapter provided an introduction to identity and access management for IoT devices. We reviewed the identity life cycle and discussed infrastructure components such as PKIs required for provisioning authentication credentials. We examined different types of authentication credentials and explored new approaches to providing authorization and access control for IoT devices.

In Chapter 8, Mitigating IoT Privacy Concerns, we will visit the complex ecosystem in which IoT privacy concerns need to be addressed and mitigated. Security controls, such as effective identity and access management, which were discussed in this chapter, represent only one element of the IoT privacy challenge.

Get Practical Internet of Things Security - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.