Foundational Cybersecurity Activities for IoT Product Manufacturers
Summary
NIST revised its foundational guidance on cybersecurity activities for Internet of Things product manufacturers, updating recommendations for activities manufacturers should consider before products reach customers. The revision supersedes the May 2020 version of IR 8259 and is published as Final.
“This publication describes recommended activities related to cybersecurity that manufacturers should consider performing before their IoT products are sold to customers.”
What changed
NIST updated IR 8259 Rev. 1 with revised recommendations for cybersecurity activities IoT manufacturers should perform before products are sold. The document supersedes the May 2020 version and provides updated guidance on helping customers mitigate cybersecurity risks.
IoT product manufacturers should review the revised guidance to understand the updated recommendations for foundational cybersecurity activities. While non-binding, the guidance aligns with the Internet of Things Cybersecurity Improvement Act and Executive Order 13800, and may be used to demonstrate cybersecurity best practices in product development.
Archived snapshot
Apr 20, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
Official websites use .gov
A .gov website belongs to an official government
organization in the United States.
Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to
the .gov website. Share sensitive information only on official,
secure websites.
Information Technology Laboratory Computer Security Resource Center
- Publications
NIST IR 8259 Rev. 1
Foundational Cybersecurity Activities for IoT Product Manufacturers
Date Published: April 2026
Supersedes: IR 8259 (05/29/2020)
Author(s)
Michael Fagan (NIST), Katerina Megas (NIST), Barbara Cuthill (NIST), Jeffrey Marron (NIST), Brad Hoehn (HII)
Abstract
Internet of Things (IoT) products often lack product cybersecurity capabilities their customers—organizations and individuals—can use to help mitigate their cybersecurity risks. Manufacturers can help their customers by improving the securability of their IoT products by providing necessary cybersecurity functionality and by providing customers with the cybersecurity-related information they need. This publication describes recommended activities related to cybersecurity that manufacturers should consider performing before their IoT products are sold to customers. These foundational cybersecurity activities can help manufacturers lessen the cybersecurity-related efforts needed by customers, which in turn can reduce the prevalence and severity of compromises.
Internet of Things (IoT) products often lack product cybersecurity capabilities their customers—organizations and individuals—can use to help mitigate their cybersecurity risks. Manufacturers can help their customers by improving the securability of their IoT products by providing necessary...
Keywords
cybersecurity risk; Internet of Things (IoT); manufacturing; risk management; risk mitigation; securable computing devices; software development
Control Families
None selected
Documentation
Publication:
https://doi.org/10.6028/NIST.IR.8259r1
Download URL
Supplemental Material:
NIST Cybersecurity for IoT Program
Publication Parts:
IR 8259A
IR 8259B
Related NIST Publications:
SP 800-213
SP 800-213A
IR 8228
Document History:
05/13/25: IR 8259 Rev. 1 (Draft)
09/30/25: IR 8259 Rev. 1 (Draft)
04/20/26: IR 8259 Rev. 1 (Final)
Topics
Security and Privacy risk management
Applications cyber-physical systems, Internet of Things
Laws and Regulations Executive Order 13800, Internet of Things Cybersecurity Improvement Act
Sectors manufacturing
Related changes
Get daily alerts for NIST Publications
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from NIST.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when NIST Publications publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.