You are on page 1of 1

IoT Security 1. Knowledge Base Creation 2.

Deriving Security Rules


Standards

Extracting Security Elaborated Security Summarizing Extracting Values Deriving Security


Controls Standard  Security Controls utilizing NER Rules

Annotating Data Labelled Corpus

Step: 1.1

NIST SP 800-53r5 Expert Inspection


Technical  Building Structural Device 1
Specification  Knowledge Device 2 Step 2.1 Deriving Security Rules
IoT Devices API Device 3

MUDGEE
Documentation Building Functional
Configuration  Knowledge Instantiating Security Interpreting in
Device  N

Rules Formal Language


Step: 1.2 Step: 2.2 Rules Instantiation

3. Application to IoT Security Auditing

Identifying Policy Collecting & Processing Converting into Formal Conducting Formal Generating Audit
Specific Data Sources run-time Data Language Verification Report

You might also like