IIC Journal of Innovation 9th Edition | Page 120

Extending the IIC IoT Security Maturity Model to Trustworthiness Although it is possible to use the IoT Security Maturity Model to evaluate trustworthiness aspects individually, using the model to consider trustworthiness holistically can better enable prioritization and investment decisions, especially if the tradeoffs among the trustworthiness aspects are properly evaluated and conflicts are resolved. In this case, the comprehensiveness levels can be used to understand the approach to trustworthiness, ranging from ad hoc approaches to using assurance cases to build trust. Scope is also important. Some trustworthiness aspects may restrict the scope with requirements specific to the industry or system while other aspects may remain general in terms of their required maturity. We anticipate further work to raise awareness of the IIC IoT Security Maturity Model and invite any ideas and detailed considerations on how to demonstrate its applicability to other trustworthiness aspects.  Return to the beginning of this article  Return to the Table of Contents The views expressed in the IIC Journal of Innovation are the contributing authors’ views and do not necessarily represent the views of their respective employers nor those of the Industrial Internet Consortium. © 2018 The Industrial Internet Consortium logo is a registered trademark of Object Management Group®. Other logos, products and company names referenced in this publication are property of their respective companies. September 2018 - 115 -