2025-01-07
Launch of US Cyber Trust Mark Program
An initiative voted into action by the US Federal Communications Commission (FCC) in March, 2024, has now finalized and launched the US Cyber Trust Mark Program, which "allows [manufacturers and retailers] to test products against established cybersecurity criteria from the U.S. National Institute of Standards and Technology via compliance testing by accredited labs, and earn the Cyber Trust Mark label, providing an easy way for American consumers to see the cybersecurity of products they choose to bring into their homes," according to a White House press release. Analogous to the Energy Star certification, the label will indicate IoT products vetted and tested for cybersecurity compliance by a group of eleven companies designated "third-party cybersecurity labeling administrators." Anne Neuberger, US Deputy National Security Director for Cybersecurity and Emerging Technology, anticipates the Cyber Trust Mark will soon become a requirement for government technology purchases, and expects consumers to see the label in use in 2025.
Editor's Note
If the US Government commits to only buying products or services that pass this testing, this can be a raise-the-bar effort. When the government years ago said ÒWe will only use web browsers and servers that pass FIPS 140 certification,' transport encryption like SSL got much stronger Ð not perfect, but stronger. The same has been true for cloud services and the US Government's FedRAMP program. But the Trust Mark is not what forces change. It is the procurement commitment to only buy secure products that achieve the Trust Mark that matters. First by the government, then by those who want to connect to the government and then by biggest part of the market that eventually follows the lead of others.
John Pescatore
An initiative like this is badly needed. A lot of the details are still unknown, and I am sure no matter what the FCC and UL come up with, some will consider it regulatory overreach and others will consider it too little too late. This initiative is late, it will not solve the problem, and it will be bureaucratic and produce many convoluted documents nobody will read. On the other hand, the problem is huge. I am much more in favor of 'failing now' and arriving at something better later than never trying. Too many good security initiatives never get off the ground because they do not solve 'all problems at once'.
Johannes Ullrich
This closes out 18 months of comments. To get the label, devices must meet NIST cybersecurity criteria which includes unique and strong default passwords, software updates, data protection, and incident detection capabilities. The label includes a QR code for more information about the security of the device, such as changing default password, secure configuration instructions, and manufacturer support period, as well as information on applying updates, automatic or otherwise.
Lee Neely
The USG did something similar back in the 80's, referred to as Common Criteria. It allows for mutual recognition by other select countries and their labs. Common Criteria in its simplest form, is a security certification scheme for IT products. It also had evaluation labs [err, labeling administrators], and required by the government for IT purchases. Unfortunately, it suffers from high certification costs, length of evaluation, and poor participation as the government didn't enforce the requirement. Let's hope this new program doesn't suffer the same problems.
Curtis Dukes
Read more in
FCC: Certification Mark Ð U.S. Cybersecurity Labeling Program for Smart Devices
Meritalk: White House Launches 'U.S. Cyber Trust Mark' Program
NextGov: White House unveils Cyber Trust Mark program for consumer devices
CyberScoop: White House launches cybersecurity label program for consumers
Bleeping Computer: US govt launches cybersecurity safety label for smart devices