Data Protection & Privacy
DETAIL

Australia IoT Code of Practice — Voluntary Code of Practice for Securing the Internet of Things

SmartSuite provides the system for managing controls, evidence, mappings, assessments, and reporting.
Framework text may require a separate license unless explicitly provided.

Overview

Australia IoT Code of Practice is a voluntary cybersecurity framework that helps organizations strengthen the security and privacy of consumer Internet of Things (IoT) devices and related services. Its primary purpose is to provide practical guidance on protecting connected devices against cyber threats and safeguarding end-user data.

Published by the Australian Government, the Code is targeted at manufacturers, service providers, and developers involved in designing, developing, or supplying IoT devices for the Australian market. It addresses key areas such as secure device configuration, vulnerability management, data protection, access controls, and privacy governance.

Organizations typically implement the Code of Practice by integrating its principles into product design, development lifecycles, and supply chain risk management processes.

Why it Matters

The Australia IoT Code of Practice provides organizations with clear cybersecurity and privacy guidance to better protect Internet of Things devices and consumer data.

Key benefits include:

Strengthen risk management for IoT

Support identification and mitigation of unique cyber risks associated with connected devices and service ecosystems.

Enhance compliance with privacy standards

Enable alignment with privacy laws and regulations through practical data protection and governance measures.

Improve incident response readiness

Facilitate faster detection, reporting, and mitigation of IoT-specific security incidents, reducing potential impact on users and systems.

Promote secure product development

Encourage the integration of security principles throughout product design and supply chain processes for safer device offerings.

Boost consumer trust and confidence

Demonstrate proactive efforts to safeguard user data and security, strengthening organizational reputation in the competitive IoT market.

How it Works

The Australia IoT Code of Practice is structured as a set of voluntary principles and practical guidelines that address key security and privacy risks throughout the IoT device lifecycle. The framework outlines thirteen foundational security practices, including secure authentication, patching mechanisms, and privacy protections.

In operational settings, organizations implement the Code by assessing existing IoT solutions against the recommended security safeguards and integrating control measures such as secure credential management, vulnerability disclosure processes, and robust data protection practices.

Key Elements

Device Security Configuration

Specifies foundational requirements for default settings, password management, and device hardening measures.

Vulnerability Management Processes

Outlines mechanisms for identifying, reporting, and resolving security weaknesses in IoT products and services.

Data Protection Measures

Establishes safeguards for handling, storing, and transmitting sensitive user information within IoT environments.

Authentication and Access Controls

Describes protocols for verifying users and managing permissions for device and data access.

Privacy Governance Principles

Defines expectations for privacy management, consent, and responsible data use throughout the device lifecycle.

Supply Chain Risk Management

Details strategies for addressing third-party risks associated with IoT components and service providers.

Framework Scope

Australia IoT Code of Practice is adopted by manufacturers, service providers, and developers involved with consumer IoT devices and related systems in the Australian market.

Framework Objectives

Australia IoT Code of Practice provides practical measures for improving cybersecurity and privacy of consumer IoT devices.

Enhance cybersecurity risk management for connected devices and IoT ecosystems

Strengthen governance and oversight of IoT security controls and practices

Protect end-user data through improved privacy and data protection measures

Support regulatory compliance and alignment with international security standards

Safeguard devices and services against emerging cyber threats and vulnerabilities

Promote robust oversight and accountability throughout the IoT product lifecycle

Common Framework Mappings

Mapped frameworks include:

CIS Critical Security Controls

ETSI EN 303 645

IEC 62443

ISO/IEC 27001

ISO/IEC 27002

NIST Cybersecurity Framework

NISTIR 8259A

UK Code of Practice for Consumer IoT Security

At a Glance
Australia Voluntary Code of Practice for Securing the Internet of Things v1.0 (2020)
  • checklist
    Classicifation
    Category
    info
    Data Protection & Privacy
    Domain
    info
    Cybersecurity
    Framework Family
    info
    Other
  • info
    Regulatory Context
    Type
    info
    Framework
    Legal Instrument
    info
    Code
    Sector
    info
    Cross-Sector
    Industry
    info
    Cross-Industry
  • arrow_upload_ready
    Region / Publisher
    Region
    info
    Australia & New Zealand
    Region Detail
    info
    Australia
    Publisher
    info
    Office of the Australian Information Commissioner (OAIC)
  • published_with_changes
    Versioning
    Version
    info
    Voluntary Code of Practice for Securing the Internet of Things
    Effective Date
    info
    2019
    Issue Date
    info
    February 2020
  • graph_3
    Adoption
    Adoption Model
    info
    Security Baseline
    Implementation Complexity
    info
    Moderate
  • captive_portal
    Official Reference
License Information

License included / downloadable: Yes

The IoT Code of Practice is published by the Australian Government and is publicly available through official government cybersecurity resources.

Official Resources
IoT Code of Practice – Guidance for Manufacturers
Outlines practical implementation guidance for the 13 principles in Australia’s voluntary IoT security Code.
chevron_forward
Voluntary Code of Practice: Securing the Internet of Things for Consumers
Defines the thirteen foundational cybersecurity principles for consumer IoT devices in Australia.
chevron_forward
SMARTSUITE

How SmartSuite Supports Australia IoT Code

Manage Australia IoT Code of Practice by organizing device security controls, tracking implementation of recommended safeguards, and maintaining evidence supporting secure IoT design and deployment.

IoT Security Principles Framework

Structure the 13 IoT security principles with ownership and implementation tracking.

Secure Design and Development Governance

Track secure development practices, default configurations, and vulnerability disclosure processes.

Device Identity and Access Management

Manage authentication, credential handling, and secure access controls for IoT devices.

Firmware and Device Lifecycle Maintenance

Track firmware updates, vulnerability remediation, and device lifecycle maintenance.

IoT Data Collection and Transmission Safeguards

Manage data collection, storage, and transmission safeguards for IoT environments.

IoT Device Security Posture and Readiness Reporting

Provide dashboards showing control adoption, device risk posture, and security readiness.

Related frameworks

CIS Controls v8.1

CIS Controls v8.1 provides prioritized, practical security actions to help organizations mitigate common cyber threats and strengthen defenses.

Learn More
arrow_forward
ISO 27001:2022

ISO/IEC 27001:2022 is an international ISMS standard that helps organizations manage information security risks and protect data.

Learn More
arrow_forward
ISO 27002:2022

ISO/IEC 27002:2022 provides best-practice information security controls to help organizations select, implement, and manage protections for information assets.

Learn More
arrow_forward
ISO 27017

ISO/IEC 27017 provides cloud-specific security controls to help organizations protect data and manage cloud-related risks.

Learn More
arrow_forward
NIST CSF 2.0

NIST Cybersecurity Framework (CSF) v2.0 is a risk-based framework that helps organizations manage and reduce cybersecurity risks.

Learn More
arrow_forward
NIST 800-53 Rev.5

NIST SP 800-53 Rev. 5 provides a catalog of security and privacy controls to manage risks to information systems.

Learn More
arrow_forward
SOC 2

SOC 2 assesses and reports on a service organization's controls for security, availability, processing integrity, confidentiality, and privacy.

Learn More
arrow_forward
ONBOARDING FAQS

Frequently Asked Questions For Australia IoT Code of Practice (Voluntary Code of Practice for Securing the Internet of Things)

What is the Australia IoT Code of Practice used for?

The Australia IoT Code of Practice provides guidance to organizations on securing consumer Internet of Things (IoT) devices and services to protect against cyber threats and enhance data privacy. It establishes best-practice principles for risk management, secure device configuration, vulnerability handling, and privacy protection throughout the IoT device lifecycle.

Is compliance with the Australia IoT Code of Practice mandatory?

Compliance with the Australia IoT Code of Practice is voluntary and not legally mandated. However, adopting the Code can support organizations in meeting broader regulatory expectations, addressing emerging threats, and aligning with international IoT security standards.

Who does the Australia IoT Code of Practice apply to?

The Code is intended for manufacturers, developers, and service providers involved in the design, development, supply, or operation of consumer IoT devices sold in the Australian market. It encompasses a broad range of connected products, including smart home devices, wearables, and connected appliances.

What key concepts and requirements are outlined in the Australia IoT Code of Practice?

Key requirements include secure-by-design principles, strong default settings, vulnerability disclosure processes, secure patching, data protection, and user privacy governance. The Code encourages organizations to develop baseline security controls, implement supply chain risk mitigation, and document incident response protocols.

How is the Australia IoT Code of Practice implemented in practice?

Organizations integrate the Code’s principles into product development processes, conducting risk assessments for each IoT device, and embedding security requirements into vendor management and procurement. It also involves ongoing monitoring, vulnerability management, and periodic review of security controls across the device lifecycle.

How does the Australia IoT Code of Practice relate to other frameworks or standards?

The Code aligns with international IoT security and privacy standards, such as ETSI EN 303 645, and complements regulatory requirements like the Australian Privacy Principles. It offers outcomes-based guidance that can be mapped to internal controls and global best practices for broader compliance programs.

What are the ongoing compliance requirements for the Australia IoT Code of Practice?

Ongoing compliance involves regularly reviewing and updating security controls, maintaining vulnerability and risk registers, establishing incident response plans, and ensuring that supply chain and vendor processes remain aligned with the Code. Evidence of continuous improvement and monitoring is also expected.

How would SmartSuite support Australia IoT Code of Practice?

SmartSuite can help organizations operationalize the Australia IoT Code of Practice by providing tools for importing mapped control libraries, tracking device risks, and managing control implementation. It enables evidence collection, compliance status monitoring, and remediation workflows, as well as supporting audit readiness and reporting through dashboards and integrations.

NEXT STEP

Put CRI Profile into action with SmartSuite

Map controls, collect evidence, run assessments, manage remediation, and report readiness - all from a single connected system.

Explore in SmartSuite
chevron_forward
View all Frameworks
chevron_forward