This document describes typical IoT security use cases and provides guidance for applying TCG technology to those use cases.
Because IoT devices vary widely in their cost, usage, and capabilities, there is no one-size-fits-all solution to IoT security. The practical security requirements for different devices and systems will vary. Therefore, this list of solutions should be regarded as a menu from which the implementer can pick the options most suitable for their product or service.
This document is a preliminary draft. It is for use in comment only and is subject to change without notice.

Revision Under Public Review:
TCG Guidance for Securing IoT, Version 1.0, Revision 14