This document describes typical IoT security use cases and provides guidance for applying TCG technology to those use cases.
Because IoT devices vary widely in their cost, usage, and capabilities, there is no one-size-fits-all solution to IoT security. The practical security requirements for different devices and systems will vary. Therefore, this list of solutions should be regarded as a menu from which the implementer can pick the options most suitable for their product or service.
Download here along with other resources for securing the IoT with trusted computing.