This document describes typical IoT security use cases and provides guidance for applying TCG technology to those use cases.

Because IoT devices vary widely in their cost, usage, and capabilities, there is no one-size-fits-all solution to IoT security. The practical security requirements for different devices and 71 systems will vary. Therefore, this list of solutions should be regarded as a menu from which the implementer can pick the options most suitable for their product or service.

Latest Revision:

Guidance for Securing IoT Using TCG Technology Version 1.0, Revision 21