NIST Floats Revised IoT Guidance as California Law Goes Into Effect
Client Alert | 3 min read | 01.28.20
Notable for being its first IoT guidance published since the January 1, 2020, implementation of California’s law requiring all IoT devices to include “reasonable security features,” the National Institute of Standards and Technology (NIST) has updated its manufacturer-facing IoT cybersecurity guidelines, NISTIR 8259, Recommendations for IoT Device Manufacturers: Foundational Activities and Core Device Cybersecurity Capability Baseline. This second draft “contains the same main concepts” as the first but revises how these concepts are presented to “clarify the concepts and address other comments from the public.” The second draft describes “voluntary, recommended activities related to cybersecurity” that IoT device manufacturers can use to enhance the security profiles of IoT devices when they are ultimately deployed by consumers.
The recommended activities continue to center on designing and preparing IoT devices such that they can be properly outfitted by consumers with the firmware and software necessary to remain secure in myriad environments. NIST’s aim is one of both flexibility and adaptability: through the activities, manufacturers can improve “how securable the IoT devices they make are,” given what manufacturers might know about how their IoT devices will be used.
The revised NISTIR 8259 contains six broad activities and splits them into two groups: those that involve device design and configuration prior to sale, and those that involve communication with consumers after a device’s sale.
In the “Pre-Market” group, NIST lists four primary activities that are focused on understanding how IoT products can meet consumer expectations regarding cybersecurity:
- Activity 1: Identify expected customers and define expected use cases.
- Activity 2: Research customer cybersecurity goals.
- Activity 3: Determine how to address customer goals.
- Activity 4: Plan for adequate support of customer goals.
By engaging in these activities, NIST expects that manufacturers will be better able to anticipate the environments in which consumers will deploy their devices and, in turn, design devices so that consumers can more easily secure them once in use.
The most robust of the four pre-market activities is Activity 3, for which NIST recommends a “core device cybersecurity capability baseline,” described as “a set of device cybersecurity capabilities that customers are likely to need” in most IoT environments. Examples include the ability to change and update a device’s firmware and software, using a secure and configurable mechanism; the ability to restrict logical access to a device’s local and network interfaces, as well as the protocols and services used by those interfaces, to authorized entities only; and the ability to determine a device’s cybersecurity state at any given time.
In the “Post-Market” group, NIST includes two activities:
- Activity 5: Define approaches for communicating to customers.
- Activity 6: Decide what to communicate to customers and how to communicate it.
These two activities center on providing consumers with the information necessary to secure particular IoT devices once deployed, and to maintain that security over a device’s lifespan. Examples of “what to communicate to customers” include the cybersecurity “risk-related assumptions that the manufacturer made when designing and developing the device,” device “support and lifespan expectations,” and the “cybersecurity capabilities that a device provides.”
The focus of the second draft of NISTIR 8259 continues to extend only to devices that can operate on their own, and that “have at least one transducer (sensor or actuator) for interacting directly with the physical world and at least one network interface . . . for interfacing with the digital world.”
Public comments on the second draft will be accepted through February 7, 2020. Even in draft form, however, IoT manufacturers can expect that consumers and regulators alike will consider NIST’s guidance when assessing an IoT device’s reasonable security.
Contacts

Partner and Crowell Global Advisors Senior Director
- Washington, D.C.
- D | +1.202.624.2698
- Washington, D.C. (CGA)
- D | +1 202.624.2500
Insights
Client Alert | 4 min read | 03.25.26
NAIC Intensifies AI Regulatory Focus: What Health Insurance Payors Need to Know
The National Association of Insurance Commissioners (NAIC) is intensifying its oversight of how insurers use AI — and the pace of regulatory activity shows no signs of slowing. Over the past several months, the NAIC has published a formal Issue Brief staking out its position on federal AI legislation, launched a multistate AI Evaluation Tool pilot aimed at examining insurers’ AI governance programs, and continued to expand adoption of its AI Model Bulletin across state lines. These developments continue a trend towards enhancing regulation; the NAIC adopted AI Principles in 2020 and a Model Bulletin in 2023 clarifying that existing insurance laws apply to AI systems and establishing expectations for governance, documentation, testing, and third-party oversight. That Model Bulletin has now been adopted in approximately 24 states.
Client Alert | 11 min read | 03.25.26
White House National AI Policy Framework Calls for Preempting State Laws, Protecting Children
Client Alert | 3 min read | 03.24.26
California Considering A Massive Expansion of Its Antitrust Laws
Client Alert | 2 min read | 03.23.26



