ISO/IEC TS 30149:2024
(Main)Internet of Things (IoT) — Trustworthiness principles
Internet of Things (IoT) — Trustworthiness principles
This document provides principles for IoT trustworthiness based on ISO/IEC 30141 - IoT Reference Architecture.
Titre manque
General Information
Overview
ISO/IEC TS 30149:2024 - Internet of Things (IoT) - Trustworthiness principles is a Technical Specification (Edition 1.0, May 2024) that defines principles and conceptual guidance for establishing trustworthiness in IoT products and solutions. The document specializes the trustworthiness viewpoint of the IoT Reference Architecture (ISO/IEC 30141) and describes characteristics, management practices, and patterns to help stakeholders identify, design and demonstrate trustworthiness across IoT systems.
Key topics
- Concept of trustworthiness: relationship between trust, context, characteristics, behaviour, assurance and confidence.
- Core characteristics: detailed principles for safety, security, privacy, resilience, and reliability (sections 6.1–6.5).
- Managing trustworthiness: guidance on assumptions, assurance, risk, composition, and trustworthiness profiles (section 7).
- Building trustworthiness: viewpoints and methods for capability, risk and assurance, plus operationalization into architectures and processes (section 8).
- Assurance model: use of claims, arguments and evidence to establish justified confidence.
- Practical patterns (Annex A): best-practice patterns such as trustworthiness characterization, maturity models, impact assessment, engineering and assurance patterns for construction views aligned to ISO/IEC 30141.
Practical applications
- Use ISO/IEC TS 30149:2024 to identify trust elements and risks across IoT lifecycle stages (design, implementation, deployment, operation).
- Apply the characteristics and assurance concepts to design IoT solutions that meet stakeholder expectations for safety, security, privacy, resilience, and reliability.
- Integrate the guidance into architecture, procurement and risk-management processes to support composable IoT components and system-of-systems thinking.
- Leverage the Annex A patterns to create trustworthiness profiles, maturity assessments and evidence-based assurance artefacts for audits and supplier evaluation.
Who should use it
- IoT architects and system designers aligning solutions with ISO/IEC 30141
- Security, privacy and safety engineers developing IoT components
- Risk managers, product owners and solution integrators assessing trust and composability
- Auditors and assurance practitioners preparing claims, arguments and evidence for conformity or third‑party assessment (note: ISO/IEC do not provide conformity attestation; certification is handled by independent bodies)
Related standards
- ISO/IEC 30141 - IoT Reference Architecture (primary alignment)
- Other referenced ISO/IEC vocabulary and assurance standards (see Bibliography of the Technical Specification)
Keywords: ISO/IEC TS 30149:2024, IoT trustworthiness, IoT reference architecture, ISO/IEC 30141, IoT security, privacy, safety, resilience, assurance, risk management.
Standards Content (Sample)
ISO/IEC TS 30149
Edition 1.0 2024-05
TECHNICAL
SPECIFICATION
Internet of Things (IoT) – Trustworthiness principles
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or
by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from either
IEC or IEC's member National Committee in the country of the requester. If you have any questions about ISO/IEC
copyright or have an enquiry about obtaining additional rights to this publication, please contact the address below or
your local IEC member National Committee for further information.
IEC Secretariat Tel.: +41 22 919 02 11
3, rue de Varembé info@iec.ch
CH-1211 Geneva 20 www.iec.ch
Switzerland
About the IEC
The International Electrotechnical Commission (IEC) is the leading global organization that prepares and publishes
International Standards for all electrical, electronic and related technologies.
About IEC publications
The technical content of IEC publications is kept under constant review by the IEC. Please make sure that you have the
latest edition, a corrigendum or an amendment might have been published.
IEC publications search - webstore.iec.ch/advsearchform IEC Products & Services Portal - products.iec.ch
The advanced search enables to find IEC publications by a Discover our powerful search engine and read freely all the
variety of criteria (reference number, text, technical publications previews, graphical symbols and the glossary.
committee, …). It also gives information on projects, replaced With a subscription you will always have access to up to date
and withdrawn publications. content tailored to your needs.
IEC Just Published - webstore.iec.ch/justpublished
Electropedia - www.electropedia.org
Stay up to date on all new IEC publications. Just Published
The world's leading online dictionary on electrotechnology,
details all new publications released. Available online and once
containing more than 22 500 terminological entries in English
a month by email.
and French, with equivalent terms in 25 additional languages.
Also known as the International Electrotechnical Vocabulary
IEC Customer Service Centre - webstore.iec.ch/csc
(IEV) online.
If you wish to give us your feedback on this publication or need
further assistance, please contact the Customer Service
Centre: sales@iec.ch.
ISO/IEC TS 30149
Edition 1.0 2024-05
TECHNICAL
SPECIFICATION
Internet of Things (IoT) – Trustworthiness principles
INTERNATIONAL
ELECTROTECHNICAL
COMMISSION
ICS 35.020; 35.030 ISBN 978-2-8322-8406-3
– 2 – ISO/IEC TS 30149:2024 ISO/IEC 2024
CONTENTS
FOREWORD . 4
INTRODUCTION . 5
1 Scope . 6
2 Normative references . 6
3 Terms and definitions . 6
4 Abbreviated terms . 7
5 Concept of trustworthiness . 7
5.1 Relation to trust . 7
5.2 Relation to context . 8
5.3 Relation to characteristics, behaviour, assurance and confidence . 9
6 Characteristics . 9
6.1 Safety . 9
6.1.1 General . 9
6.1.2 Safety goals . 10
6.1.3 Safety design . 10
6.1.4 Safety assurance and control. 10
6.2 Security . 10
6.2.1 General . 10
6.2.2 Security goals . 10
6.2.3 Security assumptions . 11
6.2.4 Security design . 12
6.2.5 Security assurance and control . 12
6.3 Privacy . 12
6.3.1 Overview . 12
6.3.2 Privacy goals . 13
6.3.3 Privacy assumptions . 14
6.3.4 Privacy design . 14
6.3.5 Privacy assurance and control . 15
6.4 Resilience . 15
6.5 Reliability . 16
7 Managing trustworthiness . 16
7.1 General . 16
7.2 Assumptions . 17
7.3 Assurance . 17
7.4 Risks . 18
7.5 Composition . 18
7.6 Trustworthiness profiles . 19
8 Building trustworthiness . 19
8.1 General . 19
8.2 Capability viewpoint . 19
8.3 Risk viewpoint . 20
8.4 Assurance viewpoint . 21
8.5 Operationalization . 21
Annex A (informative) Best practices for IoT trustworthiness . 25
A.1 Relation with ISO/IEC 30141 . 25
A.2 Concerns . 25
A.3 Patterns . 26
A.3.1 General . 26
A.3.2 Trustworthiness characterization method pattern . 27
A.3.3 Trustworthiness maturity model pattern . 28
A.3.4 Trustworthiness impact assessment pattern . 28
A.3.5 Trustworthiness engineering pattern . 30
A.3.6 Trustworthiness assurance pattern . 32
Bibliography . 33
Figure 1 – Relationship between ISO/IEC TS 30149 and ISO/IEC 30141 . 5
Figure 2 – Trustworthiness and trust . 8
Figure 3 – Concepts of characteristics, behaviour, assurance and confidence . 9
Figure 4 – Relationship between security and privacy . 13
Figure 5 – Trustworthiness characteristics examples . 16
Figure 6 – Goal oriented trustworthiness . 20
Figure 7 – Risk oriented trustworthiness . 21
Figure 8 – Assurance based on claims, arguments, and evidence . 21
Figure 9 – Conceptual model for trustworthiness . 22
Figure 10 – Determining risk factors within an RA . 23
Table 1 – Example of goals and properties . 20
Table 2 – Principles for trustworthiness operationalization . 22
Table A.1 – Concerns for an implementation architecture . 25
Table A.2 – Trustworthiness characterization pattern . 27
Table A.3 – Trustworthiness maturity model pattern . 28
Table A.4 – Trustworthiness impact assessment pattern . 28
Table A.5 – Trustworthiness engineering pattern . 30
Table A.6 – Trustworthiness assurance pattern . 32
– 4 – ISO/IEC TS 30149:2024 ISO/IEC 2024
INTERNET OF THINGS (IoT) –
TRUSTWORTHINESS PRINCIPLES
FOREWORD
1) ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission)
form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC
participate in the development of International Standards through technical committees established by the
respective organization to deal with particular fields of technical activity. ISO and IEC technical committees
collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental,
in liaison with ISO and IEC, also take part in the work.
2) The formal decisions or agreements of IEC and ISO on technical matters express, as nearly as possible, an
international consensus of opinion on the relevant subjects since each technical committee has representation
from all interested IEC and ISO National bodies.
3) IEC and ISO documents have the form of recommendations for international use and are accepted by IEC and
ISO National bodies in that sense. While all reasonable efforts are made to ensure that the technical content of
IEC and ISO documents is accurate, IEC and ISO cannot be held responsible for the way in which they are used
or for any misinterpretation by any end user.
4) In order to promote international uniformity, IEC and ISO National bodies undertake to apply IEC and ISO
documents transparently to the maximum extent possible in their national and regional publications. Any
divergence between any IEC and ISO document and the corresponding national or regional publication shall be
clearly indicated in the latter.
5) IEC and ISO do not provide any attestation of conformity. Independent certification bodies provide conformity
assessment services and, in some areas, access to IEC and ISO marks of conformity. IEC and ISO are not
responsible for any services carried out by independent certification bodies.
6) All users should ensure that they have the latest edition of this document.
7) No liability shall attach to IEC and ISO or their directors, employees, servants or agents including individual
experts and members of its technical committees and IEC and ISO National bodies for any personal injury,
property damage or other damage of any nature whatsoever, whether direct or indirect, or for costs (including
legal fees) and expenses arising out of the publication, use of, or reliance upon, this ISO/IEC document or any
other IEC and ISO documents.
8) Attention is drawn to the Normative references cited in this document. Use of the referenced publications is
indispensable for the correct application of this document.
9) IEC and ISO draw attention to the possibility that the implementation of this document may involve the use of (a)
patent(s). IEC and ISO take no position concerning the evidence, validity or applicability of any claimed patent
rights in respect thereof. As of the date of publication of this document, IEC and ISO had not received notice of
(a) patent(s), which may be required to implement this document. However, implementers are cautioned that this
may not represent the latest information, which may be obtained from the patent database available at
https://patents.iec.ch and www.iso.org/patents. IEC and ISO shall not be held responsible for identifying any or
all such patent rights.
ISO/IEC 30149 has been prepared by subcommittee 41: Internet of Things and Digital Twin, of
ISO/IEC joint technical committee 1: Information technology. It is a Technical Specification.
The text of this Technical Specification is based on the following documents:
Draft Report on voting
JTC1-SC41/390/DTS JTC1-SC41/412/RVDTS
Full information on the voting for its approval can be found in the report on voting indicated in
the above table.
The language used for the development of this Technical Specification is English.
This document was drafted in accordance with ISO/IEC Directives, Part 2, and developed in
accordance with ISO/IEC Directives, Part 1, and the ISO/IEC Directives, JTC 1 Supplement
available at www.iec.ch/members_experts/refdocs and www.iso.org/directives.
INTRODUCTION
With the complexity of many Internet of Things (IoT) solutions today, understanding the inherent
risks of these products and solutions can be difficult without the correct context or technical
understanding of the solution. Trust is a concept to ensure that all relevant stakeholders
understand the specific trust elements of a solution and any potential risks to their given use
case.
As potential vulnerabilities and attacks increase in complexity, they are only one aspect of the
risk at hand. Design, components, and development techniques are some of the elements that
can be considered during the creation, building and deployment of an IoT solution. Ensuring
trust elements are identified at each stage of development for each component while
considering all relevant stakeholders will provide a means to demonstrate a level of
trustworthiness.
Leveraging the system architecture-based approach to ensure alignment to products and
services used in ISO/IEC 30141:–[1] will allow all stakeholders to implement trustworthiness
for products and solutions.
Figure 1 shows the relationship with ISO/IEC 30141.
– This document specializes the trustworthiness view of the IoT reference architecture.
– This document lists in Annex A a number of patterns that can be used in the construction
view of the IoT reference architecture.
Figure 1 – Relationship between ISO/IEC TS 30149 and ISO/IEC 30141
___________
Numbers in square brackets refer to the Bibliography.
– 6 – ISO/IEC TS 30149:2024 ISO/IEC 2024
INTERNET OF THINGS (IoT) –
TRUSTWORTHINESS PRINCIPLES
1 Scope
This document provides elements of IoT trustworthiness based on the IoT reference
architecture specified in ISO/IEC 30141.
2 Normative references
There are no normative references in this document.
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
ISO and IEC maintain terminological databases for use in standardization at the following
addresses:
• IEC Electropedia: available at http://www.electropedia.org/
• ISO Online browsing platform: available at http://www.iso.org/obp
3.1
assurance
grounds for justified confidence that a claim has been or will be achieved
[SOURCE: ISO/IEC/IEEE 15026-1:2019, 3.1.1]
3.2
composability
ability to assemble components logically and physically (without need for adaptation of the
components or additional interfacing work)
Note 1 to entry: While ‘integration’ generally implies significant effort, ‘composition’ generally implies limited to no
effort
EXAMPLE composition of a hardware security component and a data storage component to create a secure data
storage component
[SOURCE: ISO 22166-1:2021, 3.3.1, modified – In the definition, "modules" has been replaced
by "components" and "using various combinations into new modules" has been deleted from
the end of the definition. Note 1 to entry and the example have been added.]
3.3
trustworthiness
ability to meet stakeholders’ expectations in a verifiable way
Note 1 to entry: Depending on the context or sector, and also on the specific product or service, data, technology
and process used, different characteristics apply and need verification to ensure stakeholders’ expectations are met.
Note 2 to entry: Characteristics of trustworthiness include, for instance, accountability, accuracy, authenticity,
availability, controllability, integrity, privacy, quality, reliability, resilience, robustness, safety, security, transparency
and usability.
Note 3 to entry: Trustworthiness is an attribute that can be applied to services, products, technology, data and
information as well as to organizations.
Note 4 to entry: Verifiability includes measurability and demonstrability by means of objective evidence.
[SOURCE: ISO/IEC TS 5723:2022, 3.1.1]
3.4
claim
proposition representing a requirement of the IoT system that enables the IoT system to achieve
tolerable risk if it were met
[SOURCE: ISO/IEC 15026-3:2015, 3.2, modified – In the definition, "system-of-interest" has
been replaced by "IoT system". Notes 1 and 2 to entry have been deleted.]
3.5
ecosystem
infrastructure and services based on a network of organizations and stakeholders
[SOURCE: ISO/IEC TS 27570:2021, 3.8, modified – Note 1 to entry has been deleted.]
3.6
IoT system assumption
condition concerning an IoT system that is accepted as true without proof of demonstration
3.7
trust
degree to which a user or other stakeholder has confidence that a product or system will behave
as intended
[SOURCE: ISO/IEC 25010:2011, 4.1.3.2]
4 Abbreviated terms
IoT Internet of Things
PII personally identifiable information
RA reference architecture
5 Concept of trustworthiness
5.1 Relation to trust
Figure 2 depicts the relation between trustworthiness (3.3) and trust (3.7):
– a supplier provides an IoT system which includes trustworthiness, expressed through
evidence; and
– evidence is evaluated to judge trust, based on criteria on trust.
– 8 – ISO/IEC TS 30149:2024 ISO/IEC 2024
Figure 2 – Trustworthiness and trust
Trustworthiness is dependent on an IoT system reference architecture and its characteristics.
Requirements to be verified are derived from the RA characteristics. Some requirements will be
derived as a result of a risk management system in order to mitigate risks in the IoT system.
Trustworthiness is then determined on the level of assurance as a result of the verification of
the derived requirements. As such, trustworthiness is a deterministic characteristic of the IoT
system based on verifiable evidence.
Trust is based on assumptions the user or stakeholder makes about the IoT system based on
their past experience with the supplier, access to the verification evidence, or claims made by
the supplier regarding the IoT system. Trust can extend to the entire IoT system or individually
to each of the IoT system components.
NOTE ISO/IEC 15026-3:2015 [2] provides more information on establishing levels of trust.
5.2 Relation to context
Trust is the "acceptable dependence" related to the system in the context of the system use.
EXAMPLE 1 Smart traffic lights require safety of traffic regulation, authorized access for local and remote control
and maintenance, resilience to weather conditions and vandal-proof implementation and deployment.
EXAMPLE 2 Online shopping for the customer requires a secure payment system. reliable delivery, and accurate
shopping cart calculations (e.g. applying discounts, recalculating total when removing items from the cart, etc.).
EXAMPLE 3 Medical record systems require accuracy, security, and backup mechanisms.
Trustworthiness is validated evidence that the requirements of the system are met at a point of
time.
NOTE Trustworthiness can be subjective as the criteria often depend on who set them for the system.
5.3 Relation to characteristics, behaviour, assurance and confidence
Figure 3 – Concepts of characteristics, behaviour, assurance and confidence
Figure 3 provides a conceptual viewpoint for trustworthiness, focusing on the relation to
characteristics, behaviour, assurance and confidence:
– trustworthiness is associated with an entity of interest;
EXAMPLE Machine learning systems, autonomous systems, genomic processing systems are entities of
interest.
NOTE The term "entity of interest" is defined in ISO/IEC/IEEE 42010 [3] as a generalization of the term "system
of interest".
– trustworthiness is based on characteristics (e.g. safety, security) of an entity of interest;
– trustworthiness is verified by assurance on an entity of interest;
– characteristics enable the behaviour of an entity of interest; and
– trust measures confidence on an entity of interest.
6 Characteristics
6.1 Safety
6.1.1 General
Some trustworthiness characteristics can be described through generic program properties,
which are attributes of a program that is true for every possible execution of that program.
The safety generic program property asserts that nothing bad happens during execution, i.e. the
program does not reach a bad state.
The liveness generic program property asserts that something good eventually happens, i.e. the
program will eventually reach a good state.
Each safety objective can be described through safety generic program properties.
More descriptive details can be found in the IEC 61508 series [4] and the IEC 61511 series [5].
These should be referenced if the RA has safety characteristics that need to be considered. In
some sectors, these aspects are mandatory and will have regulatory implications.
– 10 – ISO/IEC TS 30149:2024 ISO/IEC 2024
Safety is related to trustworthiness as follows:
– Safety is determined by a set of objectives. More descriptive details can be found in the
IEC 61508 series [4] and the IEC 61511 series [5].
– Damage to the system itself can be included as damage to property or persons or not
considered as a part of safety.
– Safety covers non-intentional system failures and negligence, not intentional behaviour.
6.1.2 Safety goals
Safety is determined through the set of safety goals. For the certification purposes these goals
are very concrete.
6.1.3 Safety design
By design, a predictive analysis model for the IoT system shall be established to analyse the
data of IoT devices and to perform the visual operations based on the predictive model.
Meanwhile, the behaviour patterns of device failures are learned and predicted, and then the
optimized solutions or improved design are provided.
6.1.4 Safety assurance and control
Assurance of safety goals endeavours to eliminate both systematic and probabilistic failures.
Traditional operational technology (OT) safety-assessment techniques focus on physical items
and processes, then combine empirically derived component failure probabilities into total
system risk. Risk analysis to identify hazards intends to prevent faulty operations and improve
system resilience to unexpected events.
6.2 Security
6.2.1 General
Security in the context of trustworthiness is the assurance that a security measure is effective
relative to an actual or perceived threat. A threat can be either intentional or unintentional. An
intentional attack can involve targeting IoT to stage an attack by an adversary. An unintentional
attack can involve a worm that proliferates and infects IoT and non-IoT systems beyond its
intended target. The adversary is as important as mitigating unintentional attacks through basic
security fundamentals.
NOTE A threat model is the main artefact from risk assessment. It will lead to the development of countermeasures
for identified threats.
More information about specific security aspects can be found in the IEC 62443 series [6],
ISO/IEC 27400 [7], and ISO/IEC 27402 [8].
6.2.2 Security goals
Security objectives say what security controls exist for the particular solution (device,
component, etc.). Identification of the security objectives, which are very high-level security
requirements, is a crucial step towards the description of relevant threats for the particular
system or solution. CIA (confidentiality, integrity, and availability) triad is the simplest example
of security objectives for general informational resources. Other characteristics of
trustworthiness can also represent the general security objectives, including safety, resources
integrity, fail-safety, privacy, attack resilience, etc. These factors will depend solely on the
proposed or implemented RA.
The distinctive characteristics of security objectives are the following:
– A security objective that is in scope should not change as the system evolves and changes
within the boundaries described by the system specification.
– Security objectives of a subsystem can relate to the whole system. This means that the
impact of the objective violation has the potential to spread across the whole system, not
only its separate part.
– A security objective describes how the system behaves or how characteristics can change
rather than how it does not behave or whether the characteristics cannot change.
The level of abstraction can vary from the generic reference to desirable behaviour of the
system like "resilience to attacks" to the very concrete. For the system more concrete security
objectives can be set. These security objectives usually reflect the system purpose and
scenarios of its intended use. Examples are:
– maintaining privacy while working online;
– component security tolerance to reverse engineering;
– authenticity of the system software updates;
– authentication of the message source;
– authorization based on default-deny principle;
– safe execution of the security controls.
It is highly desirable to organize the process of identification of security objectives with
involvement of system stakeholders (owners, users) and third-party OT experts and IT experts,
led by security specialists.
Every security objective can be represented through a separate safety generic program property
so they can be combined using the logical AND operation. Violation of each separate objective
leads to the violation of the security of the system.
The statement of a security objective should be defined through positive statements.
EXAMPLE 1 "No data leak should happen during data transfer" is a negative statement variant.
EXAMPLE 2 "Data remains available only to authorized subjects" is a clearer variant. The last variant is clearer
which can be operationalized into set of requirements.
6.2.3 Security assumptions
Security assumptions establish the base for the security of the system. All assumptions should
be based on risks that have been identified as part of software development or similar lifecycle
management approach. In some instances, it is not possible to make provision for protection
against all potential threats: for example, in a case of compromised hardware, even the
trustworthy software can be incapable of guaranteeing the required security level.
The clear definition of security assumptions contributes to determining the level of confidence
in the security and helps to identify trusted (but not necessarily trustworthy) objects and
processes.
For a threat model, definition of the security assumptions means that the appropriate threats
are not considered in the scope of this model. Examples of security assumptions are:
– the hardware does not contain any undocumented features;
– trusted anchor (e.g. X.509 certificate) for the crypto mechanisms is trustworthy.
The general recommendation is the minimization of the impact of security assumptions.
– 12 – ISO/IEC TS 30149:2024 ISO/IEC 2024
6.2.4 Security design
Security by design is the concept of applying the methods of software development to minimize
the security risks early in the design process and during the system implementation. This
approach demonstrates the strong connection with a participative (stakeholder based) approach
and relies on the threat model as the main artefact for elaborating the "secure by design
system".
For the IoT system, the security for sensing the physical space is an essential issue to realize
the IoT security, which is the base and core for the security design of the IoT system.
As deployment environments of IoT application systems are different and bring potential
security risks, the impact of the surrounding environment on the security of IoT devices shall
be considered by design, so appropriate security measures are adopted to reduce such risks.
6.2.5 Security assurance and control
As the excessively optimistic assumptions and human factor in software development and use
pose additional risk on the system, even when developed according to "security by design"
principles, the assurance for security is still required.
The assurance (and control) methods on security include but are not limited to:
– The responsible parties (person or organization) of each IoT subsystem should formulate
and obey the security strategies for system operating.
– The security responsibility and conduct criterion for the responsible party of each IoT
subsystem are clarified.
– The emergency response plan and policy are formulated to prevent the assurance of
element being invalid.
Regular security assessments should be carried out for the assurance of the elements.
6.3 Privacy
6.3.1 Overview
Privacy is framed in ISO/IEC 29100:2011 [9]. It focuses on
– PII principals who provide their PII for processing to PII controllers and PII processors and,
when it is not otherwise provided by applicable law, they give consent and determine their
privacy preferences for how their PII should be processed;
NOTE ISO/IEC 29184:2020 [10], ISO/IEC TS 27560:2023 [11], and ISO/IEC 27556:2022 [12] provide further
guidance on consent and privacy preferences
– PII controllers who determine why (purpose) and how (means) the processing of PII takes
place, ensure adherence to the privacy principles of ISO/IEC 29100:2011 [9]; and
– PII processors who carry the processing of PII on behalf of a PII controller.
The privacy principles to adhere to are the following:
– consent and choice;
– purpose legitimacy and specification;
– collection limitation;
– data minimization;
– use, retention and disclosure limitation;
– accuracy and quality;
– openness, transparency, and notice;
– individual participation and access;
– accountability;
– information security;
– privacy compliance.
The nature of the privacy property is the following: privacy is a goal that depends on the PII
principal and on the context.
EXAMPLE A picture at home can be shared within the family community but not externally.
Privacy can be defined by its nature [13] or by its harm [14]. Privacy is enforced through privacy
management capability such as consent and privacy preference management through privacy
controls resulting from a privacy risk assessment.
6.3.2 Privacy goals
From the system perspective, privacy is a prominent issue for IoT. IoT acquires real and real-
time information of the physical objects, and the data are sensitive and private. As privacy can
be interpreted as an aspect of security, Figure 4 illustrates how these two concepts interplay
and differ.
SOURCE: Figure 2 of NISTIR 8062 [15]. Reproduced with permission of the US National Institute of Standards and
Technology.
Figure 4 – Relationship between security and privacy
The role of privacy objectives is to ensure that developed systems provide capabilities for
privacy protection. Privacy objectives and their relations with respect to security are shown in
Figure 4 (see ISO/IEC TR 27550:2019 [16]):
– security risks arise from unauthorized system and user behaviour,
– privacy risks arise as a by-product of authorized PII processing, and
– some security risks are also privacy risks, for instance a lack of security of collected PII
(e.g. health data, location data, etc.).
– 14 – ISO/IEC TS 30149:2024 ISO/IEC 2024
The following privacy protection goals are used.
– Unlinkability: it ensures that a PII principal can make multiple uses of resources or services
without others being able to link these uses together. The objective is to minimize the risk
to privacy created by the potential linking of separate sets of PII.
– Transparency: it ensures that an adequate level of clarity of the processes in privacy-
relevant data processing is reached so that the processing of the information can be
understood and reconstructed at any time. The objective is to allow involved parties (e.g. PII
principals, PII controllers and PII processors) to know the risks to privacy (e.g. the
processing of health data or location data) and have sufficient information on
countermeasures, how to employ them and what limitations they have.
– Intervenability: it ensures that PII principals, PII controllers, PII processors and supervisory
authorities can intervene in all privacy-relevant data processing.
NOTE There can be legislative or regulatory limitations on the extent to which a PII principal or supervisory authority
can intervene in data processing.
6.3.3 Privacy assumptions
Assumptions are the following:
– availability of evidence on the application of ISO/IEC 29100 principles;
– availability of capabilities to enforce privacy policies;
– availability of a process to audit privacy controls.
6.3.4 Privacy design
The role and approaches to implementing privacy-by-design are the following:
– integration in the system lifecycle process; and
– integration in the ICT ecosystem.
Privacy integration in the system lifecycle process requires the integration of the goal-oriented
activities and the risk-oriented activities:
– in the goal-oriented activities, each privacy principle is considered as a high-level concern
that the system needs to fulfil. Each principle is then decomposed into a set of specific goals
to meet the concern. Privacy control requirements are then identified to address the specific
goals; and
– in the risk-oriented activities, the focus is on the identification of the threats to and
vulnerabilities of the PII assets in the system, and the identification of the risks associated
with PII processing that can compromise compliance with the privacy principles.
NOTE 1 ISO/IEC 27561 [17] provides guidance on the operationalization of privacy principles.
NOTE 2 ISO/IEC/IEEE 15288:2023 [18] provides guidance on system lifecycle processes.
NOTE 3 ISO/IEC TR 27550:2019 [16] provides guidance on the engineering of privacy.
NOTE 4 ISO 31700-1:2023 [19] lists requirements for the engineering of consumer goods and services.
Privacy integration requires collaboration between organizations in the ecosystem.
ISO/IEC TS 27570 [20] describes five collaboration processes:
– governance process;
– risk management process;
– data management process;
– engineering process; and
– the citizen engagement process.
6.3.5 Privacy assurance and control
Privacy assurance requires
– demonstrating that processing meets data protection and privacy safeguarding
requirements through periodic audits;
NOTE 1 In the case of information security, ISO/IEC 27701:2019 [21] and ISO/IEC TS 27006-2:2021 [22] can
be used.
– having appropriate internal controls and independent supervision mechanisms to assure
compliance with relevant privacy law and with their security, data protection and privacy
policies and procedures; and
– developing and maintaining privacy risk assessments.
NOTE 2 ISO/IEC 29134:2017 [23] can be used.
The role of assurance and control for privacy is as follows: Privacy assurance focuses on
verifying
– capabilities to meet the goals, and
– measures (controls) to treat the risks.
NOTE 3 ISO/IEC 27400 [7] provides a list of security and privacy controls for IoT systems.
It is important that both privacy controls and privacy assurance cover the case of ecosystems.
EXAMPLE 1 PII that is exchanged for data analytics within a smart city ecosystem can involve consent management
and privacy preference management by many PII controllers or PII processors. The goal of having a functioning
consent and privacy preference management involving the ecosystem can require a capability focusing on a
collaborative consent and privacy preference management. Assurance on this collaboration capability is a
requirement for trustworthiness.
EXAMPLE 2 PII that is exchanged for data analytics within a smart city ecosystem can involve many PII controllers
or PII processors. The risk of having a privacy breach involving the ecosystem can require a privacy control focusing
on collaborative incident management. Assurance on this collaboration measure is a requirement for trustworthiness.
Privacy assurance also covers IoT ecosystems or IoT system of systems, which consist of
interacting individual systems which are independently managed and operated. This requires
the provision of compliance schemes involving multiple organizations.
NOTE 4 ISO/IEC/IEEE 21839 [24] provides a definition of system of systems (SoS).
6.4 Resilience
Resilience is covered in ISO/IEC 9837-1:– [25]. Resilience is the element of a system that
behaves in a manner to avoid, absorb and manage dynamic adversarial conditions while
completing the assigned missions, and to reconstitute the operational capabilities after
causalities:
– resilience expects system failure or unstable functioning due to some reason and provides
support for recovery and continuous execution;
– resilience covers both intentional attacks and non-intentional system failures; and
– resilience addresses the uncertainty about expected system behaviour through redundancy,
e.g. alternative functionality, implementations, configurations, locations or network
segments that can have different weaknesses so the same threats and hazards are not as
disruptive to the replacement capabilities.
Resilience is a generic "liveness property" as it implies the commitment to bring out the
behaviour supporting the system mission under adversarial conditions.
– 16 – ISO/IEC TS 30149:2024 ISO/IEC 2024
6.5 Reliability
Reliability is covered in ISO/IEC 25010 [26]. Reliability can be characterized by the following
aspects:
– a well-defined set of conditions under which the system is tested to demonstrate that the
functions perform for a specified period of time;
– a constrained set of functions to which reliability requirements apply;
– a practically guaranteed period of time during which the functions from this set reliably
perform; and
– usually reliability covers non-intentional system failures.
The factors affecting the reliability of IoT system are divided into external factors and internal
factors. External factors include working environment, installation location and position, human
operation, electromagnetic environment, packaging conditions, etc. Internal factors include
system management, equipment quality, network structure, business requirements, mechanism
strategies, etc.
7 Managing trustworthiness
7.1 General
An aggregation of characteristics is expected (see Figure 5), e.g. safety, security, privacy,
resilience, reliability, governability. The list of characteristics depends on stakeholders
concerns and on the environment.
Figure 5 – Trustworthiness characteristics examples
Trustworthiness aspects are described in this document as system characteristics – or
properties as they do not just manifest as specific functions. Trustworthiness of an entire system
can be seen as a set of emergent characteristics derived from the trustworthiness of its sub-
systems and from the overall architectural and functional design.
A system can exhibit these characteristics while operating.
Each characteristic can be associated with policies and regulation, with objectives, and with
agreements (e.g. service level agreements (SLA) or service level objectives (SLO)), possibly
involving contractual aspects. Such policies, objectives, agreements are in turn subject to
measures, audits, and assurance procedures that involve metrics, key performance
indicators (KPIs) and targets.
Even if components are considered trustworthy, the system can remain untrustworthy for two
reasons:
– trustworthiness (the priorities of characteristics) is different for the syste
...
Frequently Asked Questions
ISO/IEC TS 30149:2024 is a technical specification published by the International Organization for Standardization (ISO). Its full title is "Internet of Things (IoT) — Trustworthiness principles". This standard covers: This document provides principles for IoT trustworthiness based on ISO/IEC 30141 - IoT Reference Architecture.
This document provides principles for IoT trustworthiness based on ISO/IEC 30141 - IoT Reference Architecture.
ISO/IEC TS 30149:2024 is classified under the following ICS (International Classification for Standards) categories: 35.020 - Information technology (IT) in general. The ICS classification helps identify the subject area and facilitates finding related standards.
You can purchase ISO/IEC TS 30149:2024 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of ISO standards.








Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...