SIST EN 303 645 V3.1.3:2024
(Main)CYBER - Cyber Security for Consumer Internet of Things: Baseline Requirements
CYBER - Cyber Security for Consumer Internet of Things: Baseline Requirements
The present document specifies high-level security and data protection provisions for consumer IoT devices that are
connected to network infrastructure (such as the Internet or home network) and their interactions with associated
services. A non-exhaustive list of examples of consumer IoT devices includes:
• connected children's toys and baby monitors;
• connected smoke detectors, door locks and window sensors;
• IoT gateways, base stations and hubs to which multiple devices connect;
• smart cameras, smart speakers and smart Televisions together with their remote controls;
• wearable health trackers;
• connected home automation and alarm systems, especially their gateways and hubs;
• connected appliances, such as washing machines and fridges; and
• smart home assistants.
Moreover, the present document addresses security considerations specific to constraints in device resources.
EXAMPLE: Typical device resources that might constrain the security capabilities are energy supply,
communication bandwidth, processing power or (non-)volatile memory capacity.
The present document provides basic guidance through examples and explanatory text for organizations involved in the
development and manufacturing of consumer IoT on how to implement those provisions. Table B.1 provides a schema
for the reader to give information about the implementation of the provisions.
Devices that are not consumer IoT devices, for example those that are primarily intended to be used in manufacturing,
healthcare or other industrial applications, are not in scope of the present document.
The present document has been developed primarily to help protect consumers, however, other users of consumer IoT
equally benefit from the implementation of the provisions set out here.
Annex A (informative) of the present document has been included to provide context to clauses 4, 5 and 6 (normative).
Annex A contains examples of device and reference architectures and an example model of device states including data
storage for each state.
CYBER - Kibernetska varnost za uporabniški internet stvari: osnovne zahteve
Ta dokument vsebuje določbe glede varnosti na visoki ravni in zaščite podatkov za uporabniške naprave v internetu stvari (IoT), ki so povezane z omrežno infrastrukturo (kot je internet ali domače omrežje), ter določa njihove interakcije s povezanimi storitvami. Nepopoln seznam primerov uporabniških naprav v internetu stvari vključuje:
• povezane igrače za otroke in otroške varuške;
• povezane detektorje dima, vratne ključavnice in senzorje za okna;
• internetne prehode, bazne postaje in vozlišča, s katerimi je povezanih več naprav;
• pametne kamere, zvočnike in televizorje ter njihove daljinske upravljalnike;
• nosljive naprave za spremljanje zdravja;
• povezane sisteme za avtomatizacijo doma in alarmne sisteme, zlasti njihove prehode in vozlišča;
• povezane naprave, kot so pralni stroji in hladilniki; ter
• pomočnike za pametne domove.
Ta dokument obravnava tudi varnostne vidike v zvezi z omejitvami virov naprav.
PRIMER: Tipični viri naprav, ki lahko omejijo varnostno zmogljivost, so oskrba z energijo, komunikacijska pasovna širina, procesorska moč ali zmogljivost (ne)obstojnega pomnilnika.
Ta dokument podaja osnovna navodila v zvezi z izvajanjem teh določb, s primeri in razlagami za organizacije, ki se ukvarjajo z razvojem in proizvodnjo uporabniškega interneta stvari. V preglednici B.1 je shema, ki bralcu zagotavlja informacije o izvajanju določb.
Naprave, ki niso uporabniške naprave v internetu stvari (na primer tiste, ki se uporabljajo predvsem v proizvodnji, zdravstvu ali za druge industrijske namene), ne spadajo na področje uporabe tega dokumenta.
Ta dokument je bil razvit predvsem za zaščito potrošnikov, vendar imajo od izvajanja tukaj navedenih določb enako korist tudi drugi uporabniki uporabniškega interneta stvari.
Dodatek A (informativni) k temu dokumentu je bil vključen za zagotavljanje konteksta za točke 4, 5 in 6 (normativne).
Dodatek A vsebuje primere arhitektur za naprave in referenčnih arhitektur ter modela stanj naprav, vključno s shranjevanjem podatkov za posamezno stanje.
General Information
Standards Content (Sample)
Draft ETSI EN 303 645 V3.1.2 (2024-06)
EUROPEAN STANDARD
CYBER;
Cyber Security for Consumer Internet of Things:
Baseline Requirements
2 Draft ETSI EN 303 645 V3.1.2 (2024-06)
Reference
REN/CYBER-00127
Keywords
cybersecurity, IoT, privacy
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - APE 7112B
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° w061004871
Important notice
The present document can be downloaded from:
https://www.etsi.org/standards-search
The present document may be made available in electronic versions and/or in print. The content of any electronic and/or
print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any
existing or perceived difference in contents between such versions and/or in print, the prevailing version of an ETSI
deliverable is the one made publicly available in PDF format at www.etsi.org/deliver.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx
If you find errors in the present document, please send your comment to one of the following services:
https://portal.etsi.org/People/CommiteeSupportStaff.aspx
If you find a security vulnerability in the present document, please report it through our
Coordinated Vulnerability Disclosure Program:
https://www.etsi.org/standards/coordinated-vulnerability-disclosure
Notice of disclaimer & limitation of liability
The information provided in the present deliverable is directed solely to professionals who have the appropriate degree of
experience to understand and interpret its content in accordance with generally accepted engineering or
other professional standard and applicable regulations.
No recommendation as to products and services or vendors is made or should be implied.
In no event shall ETSI be held liable for loss of profits or any other incidental or consequential damages.
Any software contained in this deliverable is provided "AS IS" with no warranties, express or implied, including but not
limited to, the warranties of merchantability, fitness for a particular purpose and non-infringement of intellectual property
rights and ETSI shall not be held liable in any event for any damages whatsoever (including, without limitation, damages
for loss of profits, business interruption, loss of information, or any other pecuniary loss) arising out of or related to the use
of or inability to use the software.
Copyright Notification
No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and
microfilm except as authorized by written permission of ETSI.
The content of the PDF version shall not be modified without the written authorization of ETSI.
The copyright and the foregoing restriction extend to reproduction in all media.
© ETSI 2024.
All rights reserved.
ETSI
3 Draft ETSI EN 303 645 V3.1.2 (2024-06)
Contents
Intellectual Property Rights . 4
Foreword . 4
Modal verbs terminology . 4
Introduction . 5
1 Scope . 6
2 References . 6
2.1 Normative references . 6
2.2 Informative references . 7
3 Definition of terms, symbols and abbreviations . 8
3.1 Terms . 8
3.2 Symbols . 11
3.3 Abbreviations . 11
4 Implementation of the standard . 12
5 Cyber security provisions for consumer IoT . 12
5.0 Reporting implementation . 12
5.1 No universal default passwords . 13
5.2 Implement a means to manage reports of vulnerabilities . 14
5.3 Keep software updated . 15
5.4 Securely store sensitive security parameters . 19
5.5 Communicate securely . 20
5.6 Minimize exposed attack surfaces . 22
5.7 Ensure software integrity . 23
5.8 Ensure that personal data is secure . 24
5.9 Make systems resilient to outages . 24
5.10 Examine system telemetry data . 25
5.11 Make it easy for users to delete user data . 25
5.12 Make installation and maintenance of devices easy . 26
5.13 Validate input data. 27
6 Data protection provisions for consumer IoT . 27
Annex A (informative): Basic concepts and models . 29
A.1 Architecture . 29
A.2 Device states . 31
A.3 Interfaces . 33
Annex B (informative): Implementation conformance statement pro forma . 35
Annex C (informative): Change history . 39
History . 40
ETSI
4 Draft ETSI EN 303 645 V3.1.2 (2024-06)
Intellectual Property Rights
Essential patents
IPRs essential or potentially essential to normative deliverables may have been declared to ETSI. The declarations
pertaining to these essential IPRs, if any, are publicly available for ETSI members and non-members, and can be
found in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to
ETSI in respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the
ETSI Web server (https://ipr.etsi.org/).
Pursuant to the ETSI Directives including the ETSI IPR Policy, no investigation regarding the essentiality of IPRs,
including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not
referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become,
essential to the present document.
Trademarks
The present document may include trademarks and/or tradenames which are asserted and/or registered by their owners.
ETSI claims no ownership of these except for any which are indicated as being the property of ETSI, and conveys no
right to use or reproduce any trademark and/or tradename. Mention of those trademarks in the present document does
not constitute an endorsement by ETSI of products, services or organizations associated with those trademarks.
DECT™, PLUGTESTS™, UMTS™ and the ETSI logo are trademarks of ETSI registered for the benefit of its
Members. 3GPP™ and LTE™ are trademarks of ETSI registered for the benefit of its Members and of the 3GPP
Organizational Partners. oneM2M™ logo is a trademark of ETSI registered for the benefit of its Members and of the ®
oneM2M Partners. GSM and the GSM logo are trademarks registered and owned by the GSM Association. ®
BLUETOOTH is a trademark registered and owned by Bluetooth SIG, Inc.
Foreword
This draft European Standard (EN) has been produced by ETSI Technical Committee Cyber Security (CYBER), and is
now submitted for the combined Public Enquiry and Vote phase of the ETSI EN Approval Procedure.
Proposed national transposition dates
Date of latest announcement of this EN (doa): 3 months after ETSI publication
Date of latest publication of new National Standard
or endorsement of this EN (dop/e): 6 months after doa
Date of withdrawal of any conflicting National Standard (dow): 6 months after doa
Modal verbs terminology
In the present document "shall", "shall not", "should", "should not", "may", "need not", "will", "will not", "can" and
"cannot" are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of
provisions).
"must" and "must not" are NOT allowed in ETSI deliverables except when used in direct citation.
ETSI
5 Draft ETSI EN 303 645 V3.1.2 (2024-06)
Introduction
As more devices in the home connect to the Internet, the cyber security and data protection of the Internet of Things
(IoT) becomes a growing concern. People entrust their personal data to an increasing number of online devices and
services. Products and appliances that have traditionally been offline are now connected and need to be designed to
withstand cyber threats.
The present document brings together widely considered good practices in security for Internet-connected consumer
devices in a set of high-level outcome-focused provisions. The objective of the present document is to support all
parties involved in the development and manufacturing of consumer IoT with guidance on securing their products.
The provisions are primarily outcome-focused, rather than prescriptive, giving organizations the flexibility to innovate
and implement security and data protection solutions appropriate for their products.
The present document is not intended to solve all security, data protection and privacy challenges associated with
consumer IoT. It also does not focus on protecting against attacks that are prolonged/sophisticated or that require
sustained physical access to the device. Rather, the focus is on the technical controls and organizational policies that
matter most in addressing the most significant and widespread security shortcomings. Overall, a baseline level of
security and data protection is considered; this is intended to protect against elementary attacks on fundamental design
weaknesses (such as the use of easily guessable passwords).
The present document provides a set of baseline provisions applicable to all consumer IoT devices. It is intended to be
complemented by other standards defining more specific provisions and fully testable and/or verifiable requirements for
specific devices which, together with the present document, will facilitate the development of assurance schemes.
A clause in the present document in some cases begins with general information about the context of the following
provisions. A provision is followed by explanatory text describing, where appropriate, the intent of the provision and
how the provision might be implemented. Further information on implementation examples is given in ETSI
TR 103 621 [i.31].
Many consumer IoT devices and their associated services process and store personal data, the present document can
help in ensuring that these are compliant with the General Data Protection Regulation (GDPR) [i.7]. Security by design
is an important principle that is endorsed by the present document.
ETSI TS 103 701 [i.19] provides guidance on how to assess and assure IoT products against provisions within the
present document.
The provisions in the present document have been developed following a review of published standards,
recommendations and guidance on IoT security and privacy, in
...
EUROPEAN STANDARD
CYBER;
Cyber Security for Consumer Internet of Things:
Baseline Requirements
2 ETSI EN 303 645 V3.1.3 (2024-09)
Reference
REN/CYBER-00127
Keywords
cybersecurity, IoT, privacy
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - APE 7112B
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° w061004871
Important notice
The present document can be downloaded from the
ETSI Search & Browse Standards application.
The present document may be made available in electronic versions and/or in print. The content of any electronic and/or
print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any
existing or perceived difference in contents between such versions and/or in print, the prevailing version of an ETSI
deliverable is the one made publicly available in PDF format on ETSI deliver.
Users should be aware that the present document may be revised or have its status changed,
this information is available in the Milestones listing.
If you find errors in the present document, please send your comments to
the relevant service listed under Committee Support Staff.
If you find a security vulnerability in the present document, please report it through our
Coordinated Vulnerability Disclosure (CVD) program.
Notice of disclaimer & limitation of liability
The information provided in the present deliverable is directed solely to professionals who have the appropriate degree of
experience to understand and interpret its content in accordance with generally accepted engineering or
other professional standard and applicable regulations.
No recommendation as to products and services or vendors is made or should be implied.
In no event shall ETSI be held liable for loss of profits or any other incidental or consequential damages.
Any software contained in this deliverable is provided "AS IS" with no warranties, express or implied, including but not
limited to, the warranties of merchantability, fitness for a particular purpose and non-infringement of intellectual property
rights and ETSI shall not be held liable in any event for any damages whatsoever (including, without limitation, damages
for loss of profits, business interruption, loss of information, or any other pecuniary loss) arising out of or related to the use
of or inability to use the software.
Copyright Notification
No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and
microfilm except as authorized by written permission of ETSI.
The content of the PDF version shall not be modified without the written authorization of ETSI.
The copyright and the foregoing restriction extend to reproduction in all media.
© ETSI 2024.
All rights reserved.
ETSI
3 ETSI EN 303 645 V3.1.3 (2024-09)
Contents
Intellectual Property Rights . 4
Foreword . 4
Modal verbs terminology . 4
Introduction . 5
1 Scope . 6
2 References . 6
2.1 Normative references . 6
2.2 Informative references . 7
3 Definition of terms, symbols and abbreviations . 8
3.1 Terms . 8
3.2 Symbols . 11
3.3 Abbreviations . 11
4 Implementation of the standard . 12
5 Cyber security provisions for consumer IoT . 12
5.0 Reporting implementation . 12
5.1 No universal default passwords . 13
5.2 Implement a means to manage reports of vulnerabilities . 14
5.3 Keep software updated . 16
5.4 Securely store sensitive security parameters . 20
5.5 Communicate securely . 21
5.6 Minimize exposed attack surfaces . 22
5.7 Ensure software integrity . 24
5.8 Ensure that personal data is secure . 24
5.9 Make systems resilient to outages . 25
5.10 Examine system telemetry data . 25
5.11 Make it easy for users to delete user data . 25
5.12 Make installation and maintenance of devices easy . 26
5.13 Validate input data. 27
6 Data protection provisions for consumer IoT . 28
Annex A (informative): Basic concepts and models . 30
A.1 Architecture . 30
A.2 Device states . 32
A.3 Interfaces . 34
Annex B (informative): Implementation conformance statement pro forma . 36
Annex C (informative): Change history . 40
History . 41
ETSI
4 ETSI EN 303 645 V3.1.3 (2024-09)
Intellectual Property Rights
Essential patents
IPRs essential or potentially essential to normative deliverables may have been declared to ETSI. The declarations
pertaining to these essential IPRs, if any, are publicly available for ETSI members and non-members, and can be
found in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to
ETSI in respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the
ETSI Web server (https://ipr.etsi.org/).
Pursuant to the ETSI Directives including the ETSI IPR Policy, no investigation regarding the essentiality of IPRs,
including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not
referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become,
essential to the present document.
Trademarks
The present document may include trademarks and/or tradenames which are asserted and/or registered by their owners.
ETSI claims no ownership of these except for any which are indicated as being the property of ETSI, and conveys no
right to use or reproduce any trademark and/or tradename. Mention of those trademarks in the present document does
not constitute an endorsement by ETSI of products, services or organizations associated with those trademarks.
DECT™, PLUGTESTS™, UMTS™ and the ETSI logo are trademarks of ETSI registered for the benefit of its
Members. 3GPP™ and LTE™ are trademarks of ETSI registered for the benefit of its Members and of the 3GPP
Organizational Partners. oneM2M™ logo is a trademark of ETSI registered for the benefit of its Members and of the ®
oneM2M Partners. GSM and the GSM logo are trademarks registered and owned by the GSM Association. ®
BLUETOOTH is a trademark registered and owned by Bluetooth SIG, Inc.
Foreword
This European Standard (EN) has been produced by ETSI Technical Committee Cyber Security (CYBER).
National transposition dates
Date of adoption of this EN: 11 September 2024
Date of latest announcement of this EN (doa): 31 December 2024
Date of latest publication of new National Standard
or endorsement of this EN (dop/e): 30 June 2025
Date of withdrawal of any conflicting National Standard (dow): 30 June 2025
Modal verbs terminology
In the present document "shall", "shall not", "should", "should not", "may", "need not", "will", "will not", "can" and
"cannot" are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of
provisions).
"must" and "must not" are NOT allowed in ETSI deliverables except when used in direct citation.
ETSI
5 ETSI EN 303 645 V3.1.3 (2024-09)
Introduction
As more devices in the home connect to the Internet, the cyber security and data protection of the Internet of Things
(IoT) becomes a growing concern. People entrust their personal data to an increasing number of online devices and
services. Products and appliances that have traditionally been offline are now connected and need to be designed to
withstand cyber threats.
The present document brings together widely considered good practices in security for Internet-connected consumer
devices in a set of high-level outcome-focused provisions. The objective of the present document is to support all
parties involved in the development and manufacturing of consumer IoT with guidance on securing their products.
The provisions are primarily outcome-focused, rather than prescriptive, giving organizations the flexibility to innovate
and implement security and data protection solutions appropriate for their products.
The present document is not intended to solve all security, data protection and privacy challenges associated with
consumer IoT. It also does not focus on protecting against attacks that are prolonged/sophisticated or that require
sustained physical access to the device. Rather, the focus is on the technical controls and organizational policies that
matter most in addressing the most significant and widespread security shortcomings. Overall, a baseline level of
security and data protection is considered; this is intended to protect against elementary attacks on fundamental design
weaknesses (such as the use of easily guessable passwords).
The present document provides a set of baseline provisions applicable to all consumer IoT devices. It is intended to be
complemented by other standards defining more specific provisions and fully testable and/or verifiable requirements for
specific devices which, together with the present document, will facilitate the development of assurance schemes.
A clause in the present document in some cases begins with general information about the context of the following
provisions. A provision is followed by explanatory text describing, where appropriate, the intent of the provision and
how the provision might be implemented. Further information on implementation examples is given in ETSI
TR 103 621 [i.31].
Many consumer IoT devices and their associated services process and store personal data, the present document can
help in ensuring that these are compliant with the General Data Protection Regulation (GDPR) [i.7]. Security by design
is an important principle that is endorsed by the present document.
ETSI TS 103 701 [i.19] provides guidance on how to assess and assure IoT products against provisions within the
present document.
The provisions in the present document have been developed following a review of published standards,
recommendations and guidance on IoT security and privacy, including: ETSI TR 103 305-3 [i.1], ETSI
TR 103 309 [i.2], ENISA Baseline Security Recommendations [i.8], UK Department for Digital, Culture, Media and
Sport (DCMS) Secure by Design Report [i.9], IoT Security Foundation Compliance Framework [i.10], GSMA IoT
Security Guidelines and Assessment [i.11], ETSI TR 103 533
...
SLOVENSKI STANDARD
01-november-2024
CYBER - Kibernetska varnost za uporabniški internet stvari: osnovne zahteve
CYBER - Cyber Security for Consumer Internet of Things: Baseline Requirements
Ta slovenski standard je istoveten z: ETSI EN 303 645 V3.1.3 (2024-09)
ICS:
35.030 Informacijska varnost IT Security
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.
EUROPEAN STANDARD
CYBER;
Cyber Security for Consumer Internet of Things:
Baseline Requirements
2 ETSI EN 303 645 V3.1.3 (2024-09)
Reference
REN/CYBER-00127
Keywords
cybersecurity, IoT, privacy
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - APE 7112B
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° w061004871
Important notice
The present document can be downloaded from the
ETSI Search & Browse Standards application.
The present document may be made available in electronic versions and/or in print. The content of any electronic and/or
print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any
existing or perceived difference in contents between such versions and/or in print, the prevailing version of an ETSI
deliverable is the one made publicly available in PDF format on ETSI deliver.
Users should be aware that the present document may be revised or have its status changed,
this information is available in the Milestones listing.
If you find errors in the present document, please send your comments to
the relevant service listed under Committee Support Staff.
If you find a security vulnerability in the present document, please report it through our
Coordinated Vulnerability Disclosure (CVD) program.
Notice of disclaimer & limitation of liability
The information provided in the present deliverable is directed solely to professionals who have the appropriate degree of
experience to understand and interpret its content in accordance with generally accepted engineering or
other professional standard and applicable regulations.
No recommendation as to products and services or vendors is made or should be implied.
In no event shall ETSI be held liable for loss of profits or any other incidental or consequential damages.
Any software contained in this deliverable is provided "AS IS" with no warranties, express or implied, including but not
limited to, the warranties of merchantability, fitness for a particular purpose and non-infringement of intellectual property
rights and ETSI shall not be held liable in any event for any damages whatsoever (including, without limitation, damages
for loss of profits, business interruption, loss of information, or any other pecuniary loss) arising out of or related to the use
of or inability to use the software.
Copyright Notification
No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and
microfilm except as authorized by written permission of ETSI.
The content of the PDF version shall not be modified without the written authorization of ETSI.
The copyright and the foregoing restriction extend to reproduction in all media.
© ETSI 2024.
All rights reserved.
ETSI
3 ETSI EN 303 645 V3.1.3 (2024-09)
Contents
Intellectual Property Rights . 4
Foreword . 4
Modal verbs terminology . 4
Introduction . 5
1 Scope . 6
2 References . 6
2.1 Normative references . 6
2.2 Informative references . 7
3 Definition of terms, symbols and abbreviations . 8
3.1 Terms . 8
3.2 Symbols . 11
3.3 Abbreviations . 11
4 Implementation of the standard . 12
5 Cyber security provisions for consumer IoT . 12
5.0 Reporting implementation . 12
5.1 No universal default passwords . 13
5.2 Implement a means to manage reports of vulnerabilities . 14
5.3 Keep software updated . 16
5.4 Securely store sensitive security parameters . 20
5.5 Communicate securely . 21
5.6 Minimize exposed attack surfaces . 22
5.7 Ensure software integrity . 24
5.8 Ensure that personal data is secure . 24
5.9 Make systems resilient to outages . 25
5.10 Examine system telemetry data . 25
5.11 Make it easy for users to delete user data . 25
5.12 Make installation and maintenance of devices easy . 26
5.13 Validate input data. 27
6 Data protection provisions for consumer IoT . 28
Annex A (informative): Basic concepts and models . 30
A.1 Architecture . 30
A.2 Device states . 32
A.3 Interfaces . 34
Annex B (informative): Implementation conformance statement pro forma . 36
Annex C (informative): Change history . 40
History . 41
ETSI
4 ETSI EN 303 645 V3.1.3 (2024-09)
Intellectual Property Rights
Essential patents
IPRs essential or potentially essential to normative deliverables may have been declared to ETSI. The declarations
pertaining to these essential IPRs, if any, are publicly available for ETSI members and non-members, and can be
found in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to
ETSI in respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the
ETSI Web server (https://ipr.etsi.org/).
Pursuant to the ETSI Directives including the ETSI IPR Policy, no investigation regarding the essentiality of IPRs,
including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not
referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become,
essential to the present document.
Trademarks
The present document may include trademarks and/or tradenames which are asserted and/or registered by their owners.
ETSI claims no ownership of these except for any which are indicated as being the property of ETSI, and conveys no
right to use or reproduce any trademark and/or tradename. Mention of those trademarks in the present document does
not constitute an endorsement by ETSI of products, services or organizations associated with those trademarks.
DECT™, PLUGTESTS™, UMTS™ and the ETSI logo are trademarks of ETSI registered for the benefit of its
Members. 3GPP™ and LTE™ are trademarks of ETSI registered for the benefit of its Members and of the 3GPP
Organizational Partners. oneM2M™ logo is a trademark of ETSI registered for the benefit of its Members and of the ®
oneM2M Partners. GSM and the GSM logo are trademarks registered and owned by the GSM Association. ®
BLUETOOTH is a trademark registered and owned by Bluetooth SIG, Inc.
Foreword
This European Standard (EN) has been produced by ETSI Technical Committee Cyber Security (CYBER).
National transposition dates
Date of adoption of this EN: 11 September 2024
Date of latest announcement of this EN (doa): 31 December 2024
Date of latest publication of new National Standard
or endorsement of this EN (dop/e): 30 June 2025
Date of withdrawal of any conflicting National Standard (dow): 30 June 2025
Modal verbs terminology
In the present document "shall", "shall not", "should", "should not", "may", "need not", "will", "will not", "can" and
"cannot" are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of
provisions).
"must" and "must not" are NOT allowed in ETSI deliverables except when used in direct citation.
ETSI
5 ETSI EN 303 645 V3.1.3 (2024-09)
Introduction
As more devices in the home connect to the Internet, the cyber security and data protection of the Internet of Things
(IoT) becomes a growing concern. People entrust their personal data to an increasing number of online devices and
services. Products and appliances that have traditionally been offline are now connected and need to be designed to
withstand cyber threats.
The present document brings together widely considered good practices in security for Internet-connected consumer
devices in a set of high-level outcome-focused provisions. The objective of the present document is to support all
parties involved in the development and manufacturing of consumer IoT with guidance on securing their products.
The provisions are primarily outcome-focused, rather than prescriptive, giving organizations the flexibility to innovate
and implement security and data protection solutions appropriate for their products.
The present document is not intended to solve all security, data protection and privacy challenges associated with
consumer IoT. It also does not focus on protecting against attacks that are prolonged/sophisticated or that require
sustained physical access to the device. Rather, the focus is on the technical controls and organizational policies that
matter most in addressing the most significant and widespread security shortcomings. Overall, a baseline level of
security and data protection is considered; this is intended to protect against elementary attacks on fundamental design
weaknesses (such as the use of easily guessable passwords).
The present document provides a set of baseline provisions applicable to all consumer IoT devices. It is intended to be
complemented by other standards defining more specific provisions and fully testable and/or verifiable requirements for
specific devices which, together with the present document, will facilitate the development of assurance schemes.
A clause in the present document in some cases begins with general information about the context of the following
provisions. A provision is followed by explanatory text describing, where appropriate, the intent of the provision and
how the provision might be implemented. Further information on implementation examples is given in ETSI
TR 103 621 [i.31].
Many consumer IoT devices and their associated services process and store personal data, the present document can
help in ensuring that these are com
...
Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.