IIC Journal of Innovation 9th Edition | Page 120
Extending the IIC IoT Security Maturity Model to Trustworthiness
Although it is possible to use the IoT Security
Maturity Model to evaluate trustworthiness
aspects individually, using the model to
consider trustworthiness holistically can
better enable prioritization and investment
decisions, especially if the tradeoffs among
the trustworthiness aspects are properly
evaluated and conflicts are resolved. In this
case, the comprehensiveness levels can be
used to understand the approach to
trustworthiness, ranging from ad hoc
approaches to using assurance cases to build
trust. Scope is also important. Some
trustworthiness aspects may restrict the
scope with requirements specific to the
industry or system while other aspects may
remain general in terms of their required
maturity.
We anticipate further work to raise
awareness of the IIC IoT Security Maturity
Model and invite any ideas and detailed
considerations on how to demonstrate its
applicability to other trustworthiness
aspects.
Return to the beginning of this article
Return to the Table of Contents
The views expressed in the IIC Journal of Innovation are the contributing authors’ views and do
not necessarily represent the views of their respective employers nor those of the Industrial
Internet Consortium.
© 2018 The Industrial Internet Consortium logo is a registered trademark of Object Management
Group®. Other logos, products and company names referenced in this publication are property
of their respective companies.
September 2018
- 115 -