A group of U.S. senators decided to confront the vulnerabilities the Internet of Things trigger even at the level of governmental high-security institutions such as the Pentagon. The tech industry defines this system like the entirety of computing devices that serve the needs on a daily basis. Since all these tools are connected to the Internet, they can send and receive data. Therefore, the U.S. bipartisan group intends to strengthen global cyber security.
The U.S. Bipartisan Group Is Supporting a Paper Created by Harvard and Atlantic Council Experts
The proposal of the U.S. senators concerns vendors first and foremost. Those who are in direct partnership with the government will have to secure their Internet-connected products before moving them into the property of the state. This includes making sure the equipment can receive patches for any kind of issues and it is in alignment with industry security standards.
The new bill is going to create a safer cyber environment for the government. Another requirement is going to force vendors to discard devices with passwords that cannot be changed or any other tool that bears suspicions of security flaws.
The bipartisan group constitutes of Republicans Steve Daines and Cory Gardner and Democrats Ron Wyden and Mark Warner. However, the creators of the bill were actually professionals at the Atlantic Council and Harvard University.
Manufacturers Are Currently Free to Design Any Security Level They Want
Mark Warner stated that they are reviewing the bill to change it into the most seamless version possible. To his view, the legislation is but an answer to a market weakness. At the moment, there is no regulation to give manufacturers the incentive to build their products with security matters in mind.
On another note, the text will allow exceptions to the rule to address all possibilities. For instance, federal agencies will still have the possibility to acquire non-compliant devices. However, this will be possible only if the U.S. Office of Management and Budget will attest that there are other security measures instead such as network segmentations.
Image source: 1