UK Enforces IoT Device Cybersecurity Rules | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware

[ad_1]

Law Bans Universal Default Passwords; Requires Bug-Reporting Channels, Update Plan

Secure by Design: UK Enforces IoT Device Cybersecurity Rules
The United Kingdom is cracking down on insecure internet of things devices. (Image: Shutterstock)

Say goodbye to buying internet of things devices in Britain with a default or hard-coded password set to “12345” now that the country will enforce a ban on manufacturers from shipping internet-connected and network-connected devices that don’t comply with minimum cybersecurity standards.

See Also: Webinar | From Risk to Resilience: EMEA’s Container Security Reinvention

A grace period expired Monday for companies to comply with demands of the U.K. Product Security and Telecommunications Infrastructure Act, allowing the government to police the security standards of a range of IoT goods, including smartphones, game consoles, wearable fitness trackers and children’s toys, as well as internet-connected fridges, speakers, baby monitors and more.


The connected-device law kicks in following repeat attacks against devices with known or easily guessable passwords, which have led to repeat distributed denial-of-service attacks that have affected major institutions, including the BBC as well as major U.K. banks such as Lloyds and the Royal Bank of Scotland.

Officials said the law is designed not just for consumer protection but also to improve national cybersecurity resilience, including against malware that targets IoT devices, such as Mirai and its spinoffs, all of which can exploit default passwords in devices.

Western officials have also warned that Chinese and Russian nation-state hacking groups exploit known vulnerabilities in consumer-grade network devices. U.S. authorities earlier this year disrupted a Chinese botnet used by a group tracked as Volt Typhoon, warning that Beijing threat actors used infected small office and home office routers to cloak their hacking activities (see: Here’s How the FBI Stopped a Major Chinese Hacking Campaign).

“It’s encouraging to see growing emphasis on implementing best practices in securing IoT devices before they leave the factory,” said Kevin Curran, a professor of cybersecurity at Ulster University in Northern Ireland. “Despite their perceived simplicity, these devices hold unexpected power to disrupt when left unpatched or poorly managed.”


The law requires:



  • No universal default passwords: Manufacturers must ship every device with a unique password, regardless of whether a user has the ability to change the password. The initial password must also meet a range of criteria to ensure that it cannot be “easily guessable.”

  • Vulnerability reporting channels: Manufacturers must publicly designate a point of contact for anyone who wants to report a security flaw in a device they build, and do so in a manner that is “accessible, clear and transparent.” Manufacturers must also detail “the timescales within which an acknowledgment of the receipt of the report and status updates until the resolution of the reported security issues can be expected by person making the report.”

  • Security update guarantees: Manufacturers must specify to consumers “the minimum length of time security updates will be provided along with an end date.”




Britain is the first country to mandate minimum cybersecurity standards for IoT devices, the government said in a statement. “The security requirements are actions that relevant businesses in the supply chain must take, or requirements that a product must meet, to address a security problem or eliminate a potential security vulnerability,” it said.




The rules apply to all “manufacturers, importers and distributors of relevant connectable products,” and also include record-keeping requirements and a duty to investigate potential compliance violations by supply chain partners, it said.


The rules will be enforced by the Office for Product Safety and Standards, a part of the Department for Business and Trade that already enforces other product safety regulations.


In Britain, 99% of adults own at least one “smart” device, and households have an average of nine different internet- or network-connected devices.


“The use and ownership of consumer products that can connect to the internet or a network is growing rapidly,” said Graham Russell, chief executive of OPSS. “U.K. consumers should be able to trust that these products are designed and built with security in mind, protecting them from the increasing cyber threats to connectable devices.”


Law Replaces Voluntary Code


Multiple security experts have celebrated the law, not least because it requires manufacturers to establish channels for receiving bug reports and carries the threat of legal action if they fail to do so.


“It’s got teeth, which I love,” Ken Munro, a connected-device security expert with Pen Test Partners, told the BBC. Via social media, he said the law is “a big step in the right direction for IoT” but added, “My worry is that enforcement action won’t be taken” (see: Don’t Hug These Internet-Connected Stuffed Toys).




The government previously attempted to bolster device security through a voluntary IoT cybersecurity code of practice introduced in 2018. But a parliamentary probe found that by 2020, only 27% of manufacturers had implemented one of the key tenets: giving security researchers a direct channel for reporting any vulnerabilities they found in the manufacturer’s devices.


Following a 2020 consultation on device security, Parliament passed the PSTI Act in 2022, and some details – such as the minimum cybersecurity requirements to be enforced – were hammered out in 2023 (see: Consumer IoT Security Labels: Transparency Push Intensifies).


Experts said they hope more consumers will shop for devices in part based on the support period the manufacturers offer.


“This landmark act will help consumers to make informed decisions about the security of products they buy,” said Sarah Lyons, the U.K. National Cyber Security Center’s deputy director for economy and society.


The law includes a number of device exceptions, often because they’re already subject to existing regulations. These include medical devices, smart meters and charge points for electric vehicles, as well as desktop, laptop computers and tablet computers that don’t have the ability to connect to cellular networks – unless they’re designed exclusively for the use of children under 14 years of age.


The government also said it plans to introduce legislation to exempt some automotive vehicles “from the product security regulatory regime, as they will be covered by alternative legislation.”



[ad_2]

——————————————————-


Click Here For The Original Source.

National Cyber Security

FREE
VIEW