MUD-CCF
Manufacturer Usage Description (MUD), defined under IETF RFC 8520, enables IoT devices to declare their intended network communication behavior, allowing networks to automatically enforce least-privilege access policies.
The MUD Conformance Certification Framework (MUD-CCF), developed collaboratively by CNLABS and UNSW Sydney, provides a standardized testing and certification approach to verify IoT device compliance with the MUD specification through defined test requirements, structured methodologies, and an automated conformance test tool.
Core MUD-CCF Capabilities
- Standardized MUD conformance test specification
- Automated validation of MUD files and device behavior
- Structured certification levels (Bronze, Silver, Gold)
- Scalable testing for large IoT deployments
CNLABS and MUD-CCF
CNLABS is a co-developer of the MUD Conformance Certification Framework and provides the technical foundation for MUD compliance verification, including test specification development, automated conformance testing, and certification workflows to support secure-by-design IoT deployments.
ETSI EN 303 645
Developed by the European Telecommunications Standards Institute, ETSI EN 303 645 defines baseline cybersecurity requirements for consumer IoT products. It establishes mandatory security provisions covering authentication, software updates, data protection, secure communication, and vulnerability handling to improve the resilience of connected devices.
The Thirteen Pillars of IoT Security
ETSI EN 303 645 was designed to mitigate the most common attack vectors used against smart home devices. It outlines 13 provisions that serve as a practical checklist for cyber resilience.
- No Universal Default Passwords
- Vulnerability Disclosure Policy
- Keep Software Updated
- Secure Storage of Sensitive Data
- Secure Communication
- Minimize Exposed Attack Surfaces
- Ensure Software Integrity
- Ensure Personal Data is Secure
- Make Systems Resilient to Outages
- Examine System Telemetry Data
- Easy Deletion of Personal Data
- Easy Installation and Maintenance
- Validate Input Data
Why CNLABS for ETSI EN 303 645?
- ISO/IEC 17025:2017 accredited testing laboratory for ETSI EN 303 645
- Delivers fully accredited test reports mapped to standard requirements
- Supports IXIT preparation and validation prior to testing
- Provides structured findings aligned with conformity assessment needs
- Covers consumer IoT and connected product categories
The CNLABS Engagement Model
Assessment
Identifying security gaps, compliance needs, and critical risks.
Testing
Active simulations including VAPT and Red/Blue Team exercises.
Remediation
Providing technical guidance to resolve identified vulnerabilities.
Validation
Third-party attestation of your hardened security posture.
Ready to Strengthen Your Security Posture?
Whether you need a full security assessment or certification guidance, our team is ready to help.
Security Services
- Network & Service Protection
- Web Application Security
- Vulnerability & Threat Detection
- Application Security Testing
Independent Validation
- Device-specific test plan development based on requirements and risk profile
- Standards and regulatory compliance validation (NIST-aligned)
- Security control verification and effectiveness testing
- Functional conformance against defined requirements
- Resilience, misuse, and negative scenario testing
- Evidence-based reporting
Lifecycle Integration
- Continuous security and compliance validation across product phases
- Regulatory impact assessment for design changes and updates
- Re validation support for firmware, software, and configuration changes
- Ongoing risk assessment aligned to evolving regulatory requirements
Custom Programs
Custom security certification programs are designed around the regulatory ecosystem. The scope includes defining applicable certification schemes for IT/OT/IoT products, establishing security objectives and assurance levels, and executing certification-aligned security evaluations.