The identity life cycle

Before we begin to examine the technologies that support IAM for the IoT, it is useful to lay out the life cycle phases of what we call identity. The identity life cycle for an IoT device begins with defining the naming conventions for the device; it ends with the removal of the device's identity from the system. The following diagram provides a view of the process flow:

This life cycle procedure should be established and applied to all IoT devices that are procured, configured, and ultimately attached to an organization's network. The first aspect requires a coordinated understanding of the categories of IoT devices ...

Get Practical Internet of Things Security - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.