This chapter provided an introduction to identity and access management for IoT devices. We reviewed the identity life cycle and discussed infrastructure components such as PKIs required for provisioning authentication credentials. We examined different types of authentication credentials and explored new approaches to providing authorization and access control for IoT devices.
In Chapter 8, Mitigating IoT Privacy Concerns, we will visit the complex ecosystem in which IoT privacy concerns need to be addressed and mitigated. Security controls, such as effective identity and access management, which were discussed in this chapter, represent only one element of the IoT privacy challenge.