1. Purpose of This Guide
IoT devices (CCTV cameras, door sensors, smart TVs, Wi-Fi printers, IP speakers, etc.) often come with convenience features that can accidentally become security weaknesses. This artefact demonstrates that your organisation has configured business-critical IoT devices securely and kept them separate from networks that handle work data.
This requires evidence showing that you have taken practical steps to protect your IoT fleet, such as:
-
Placing IoT devices on a separate network or VLAN
-
Disabling risky features like auto-discovery and Universal Plug and Play (UPnP)
-
Using IoT products with Singapore’s Cybersecurity Labelling Scheme (CLS) where available
Your evidence proves that your IoT environment isn’t left open like an unlocked castle gate.
2. What You Will Submit
You may upload one or more screenshots showing any of the following:
-
IoT devices connected to a separate Wi-Fi network or VLAN
e.g., “IoT-Network”, “Guest IoT”, “CCTV Network” -
Router or firewall configuration showing:
-
Network segmentation
-
Device isolation
-
IoT VLAN setup
-
Blocking IoT devices from accessing corporate networks
-
-
Device settings pages showing that:
-
UPnP is disabled
-
Auto-discovery is disabled (e.g., mDNS, DLNA, auto-pairing)
-
Default passwords have been changed (optional but good to show)
-
-
Evidence of cybersecurity-labelled IoT devices, e.g.
-
Photo of the CLS label on the device box
-
Product page showing CLS Level 1/2/3
-
Auditors do not expect you to submit all of these — just whatever applies in your environment.
3. How to Collect / Obtain / Generate This Evidence
Choose the method that matches your setup. Below are the most common scenarios.
A. Network Segregation Evidence (Recommended)
Home/SMB routers (Asus, TP-Link, Linksys, D-Link)
-
Log in to your router admin page (often
192.168.1.1). -
Open Wireless Settings or Network.
-
Show the IoT Wi-Fi network (e.g., “IoT”, “CCTV”) separate from your work network.
-
Screenshot:
-
SSID name
-
VLAN ID (if applicable)
-
Guest network isolation switch (if used)
-
Business Firewalls (Fortinet, SonicWall, UniFi, Meraki)
-
Open Network → VLANs or Networks.
-
Show IoT VLAN configuration.
-
Show firewall rule preventing IoT → Corporate network access.
-
Take a screenshot of the configuration page.
B. IoT Device Configuration Screenshots
Choose any IoT device in use (e.g. CCTV, NAS device, Smart TV, Door Access Controller).
Screenshots should show:
1. UPnP Disabled
Typical locations:
-
Settings → Network → Advanced → UPnP
-
Admin → Security → UPnP
2. Auto-Discovery Disabled
E.g.:
-
“Discovery Mode: Off”
-
“Auto-pairing: Disabled”
-
“DLNA: Off”
-
“Bonjour/mDNS: Off”
3. Device on IoT Network
Show Wi-Fi settings indicating it is connected to the IoT SSID.
C. Cybersecurity Labelling Scheme (CLS) Evidence
If your IoT device is CLS-labelled:
-
Take a photo of the packaging showing the CLS rating (Level 1–4).
-
Or screenshot the official product listing with the CLS badge.
This is optional but strengthens your compliance.
4. Evidence Format
Accepted File Types:
-
PNG
-
JPG
-
PDF
Suggested Naming Convention:
YourCompanyName_IoT_SecureConfiguration_YYYY-MM-DD
Example:
AcmeClinic_IoT_SecureConfig_2025-03-15.png
5. What “Good” Looks Like
A strong submission includes:
-
Clear indication that IoT devices are isolated
(“IoT VLAN”, “Guest IoT Network”, firewall rule screenshot) -
Security features disabled
Especially:-
UPnP
-
Auto-discovery
-
Peer-to-peer discovery features
-
-
Some form of IoT hardening
(firmware up to date, admin password not default) -
Readable screenshots
Device name, setting names, and ON/OFF toggles should be visible. -
Optional but excellent
Proof that the devices carry a Cybersecurity Labelling Scheme badge.
This shows the auditor that your IoT devices can’t freely wander into your corporate network or turn themselves into tiny digital spies.
6. Tips
-
Redact IP addresses if they expose your internal structure.
-
If your company has NO business-supporting IoT devices, mark this artefact “Not Applicable” — the clause allows it.
-
If IoT devices exist but are unmanaged (e.g., landlord CCTV)
Show documentation stating they are not part of your corporate environment.