Skip to main content

How to write an RFP for IoT devices

Requirements, questions, and evaluation criteria specific to IoT devices procurement

8 min read

Securing IoT devices presents unique challenges due to their diverse nature, resource constraints, and integration with physical systems. A well-crafted RFP is critical for identifying vendors that can address the specific security needs of your IoT ecosystem and mitigate potential risks.

What makes IoT devices RFPs different

IoT security RFPs differ significantly from traditional IT security RFPs due to the unique characteristics of IoT devices. These devices often lack the processing power and memory required for traditional security agents, necessitating agentless solutions.

Furthermore, the integration of IoT devices with operational technology (OT) and industrial control systems (ICS) introduces complexities related to real-time performance, safety, and regulatory compliance.nnThe diversity of IoT devices, ranging from smart sensors to industrial controllers, requires a security solution that can support a wide range of protocols and communication standards.

Additionally, the distributed nature of IoT deployments necessitates robust remote management and monitoring capabilities. Finally, the potential for physical consequences resulting from successful attacks on IoT devices makes security a paramount concern.nnRegulatory scrutiny and compliance requirements further complicate IoT security procurement.

Organizations must consider mandates such as GDPR, CCPA, and the US IoT Cybersecurity Improvement Act, which impose strict penalties for data loss originating from unmonitored devices. Therefore, the RFP must explicitly address compliance requirements and ensure that vendors can provide the necessary documentation and support.

  • Agentless discovery and inventory capabilities to identify and classify all connected devices.
  • Continuous behavioral baselining to detect anomalies and deviations from normal device behavior.
  • Vulnerability prioritization based on exploitability in the current network configuration.
  • Integration with existing security information and event management (SIEM) and IT service management (ITSM) systems.

RFP vs RFI vs RFQ

Here's when to use each document type when procuring IoT devices software.

RFI

Request for Information

Use early in your search to understand what vendors offer and narrow your list. Gather general capabilities, company background, and high-level pricing ranges.

RFP

Request for Proposal

Use when you know your requirements and want detailed vendor solutions and pricing. This is your main evaluation document for shortlisted vendors.

RFQ

Request for Quote

Use when requirements are fixed and you just need final pricing. Often used after RFP when you're ready to negotiate with finalists.

When procuring IoT security solutions, an RFI is useful for initial market research and understanding vendor capabilities. An RFP is essential for detailed evaluation of technical features, security protocols, and compliance adherence. An RFQ is generally not suitable due to the complex and customized nature of IoT security deployments.

Technical requirements checklist

Use this checklist when defining your RFP scope.

Device Discovery and Inventory

  • Agentless device discovery and classification
  • Automatic identification of device manufacturer, model, and OS
  • Support for IT, OT, and IoMT devices
  • Detection of unmanaged or shadow IoT devices

Threat Detection and Prevention

  • Continuous behavioral baselining and anomaly detection
  • Vulnerability scanning and prioritization
  • Automated micro-segmentation and zero-trust policies
  • Threat intelligence integration

Security Management

  • Centralized security management console
  • Remote device management and configuration
  • Over-the-air (OTA) firmware update management
  • Incident response and remediation capabilities

Compliance and Reporting

  • Pre-built compliance templates for NIST, HIPAA, and IEC 62443
  • Automated compliance reporting
  • Software Bill of Materials (SBOM) analysis
  • Data privacy and security controls

Integration and Interoperability

  • SIEM integration (e.g., Splunk, Microsoft Sentinel)
  • ITSM integration (e.g., ServiceNow)
  • NAC integration (e.g., Cisco, Aruba)
  • CMDB integration

Questions to include in your RFP

Architecture & Deployment

  • Describe your platform's architecture and deployment options (cloud, on-premises, hybrid).
    Understanding the architecture helps determine scalability and deployment flexibility.
  • How does your solution support air-gapped industrial environments?
    Air-gapped environments require specific security considerations.
  • What are the hardware and software requirements for deploying your solution?
    This helps plan for infrastructure needs and potential compatibility issues.
  • How does your solution ensure data privacy and security in a multi-tenant environment?
    Data isolation is critical for maintaining confidentiality and compliance.

Device Discovery & Classification

  • Describe your agentless device discovery capabilities. How does your platform identify and classify devices without requiring agents?
    Agentless discovery is crucial for IoT devices that cannot support traditional security agents.
  • How does your solution handle devices running legacy protocols or unmanaged devices?
    Many IoT environments contain older devices that require specialized handling.
  • What methods do you use to identify the manufacturer, model, and operating system of discovered devices?
    Accurate device identification is essential for vulnerability management and risk assessment.
  • Can your platform detect and classify "Shadow AI" and "Shadow IoT" devices connected to the network?
    Unauthorized devices can introduce significant security risks.

Threat Detection & Response

  • Describe your behavioral baselining and anomaly detection capabilities. How does your platform learn normal device behavior and identify deviations?
    Behavioral analysis is essential for detecting zero-day attacks and insider threats.
  • How does your solution prioritize vulnerabilities based on exploitability and potential impact?
    Prioritization helps focus remediation efforts on the most critical risks.
  • Can your platform automatically quarantine a compromised device or trigger an incident response playbook?
    Automated response capabilities are essential for minimizing the impact of security incidents.
  • How does your solution integrate with threat intelligence feeds to identify and block known malicious actors?
    Threat intelligence provides valuable context for identifying and responding to emerging threats.

Compliance & Reporting

  • Does your platform provide pre-built compliance templates for relevant industry standards (e.g., NIST, HIPAA, IEC 62443)?
    Compliance templates streamline the audit process and ensure adherence to regulatory requirements.
  • Can your solution generate automated compliance reports for auditors?
    Automated reporting saves time and reduces the risk of errors.
  • Does your platform support Software Bill of Materials (SBOM) analysis to identify vulnerabilities in third-party libraries?
    SBOM analysis helps identify and mitigate supply chain risks.
  • How does your solution assist with meeting data privacy requirements related to IoT data collection and processing?
    Data privacy is a critical concern for IoT deployments.

Integration & Interoperability

  • Describe your integration capabilities with SIEM, ITSM, and NAC systems.
    Integration with existing security tools enhances visibility and streamlines workflows.
  • Do you provide out-of-the-box connectors for popular SIEM platforms like Splunk and Microsoft Sentinel?
    Pre-built connectors simplify integration and reduce implementation time.
  • Can your platform integrate with our existing CMDB to maintain an accurate inventory of physical assets?
    CMDB integration ensures that security policies are applied to all managed assets.
  • Does your solution support integration with 5G network slicing for isolating IoT traffic?
    5G integration enables enhanced security and performance for IoT deployments.

Pricing & Licensing

  • Describe your pricing model. Is it based on the number of devices, data volume, or other factors?
    Understanding the pricing model is crucial for budgeting and cost management.
  • Are there any additional costs for professional services, integration, or data volume?
    Hidden costs can significantly impact the total cost of ownership.
  • Can you provide a detailed breakdown of all costs associated with your solution?
    Transparency in pricing is essential for making informed decisions.
  • How do you define an "endpoint" for pricing purposes?
    Ensures clarity and avoids unexpected cost increases as more devices are discovered.

Compliance and security requirements

Depending on your industry, you may need to require proof of these certifications and standards.

NIST Cybersecurity Framework

Required for organizations seeking a comprehensive cybersecurity program. If applicable, request documentation demonstrating alignment with the NIST Cybersecurity Framework.

HIPAA

Required for organizations handling protected health information (phi) on iomt devices. If applicable, request a Business Associate Agreement (BAA) and documentation of HIPAA compliance measures.

IEC 62443

Required for organizations operating industrial control systems (ics) and ot environments. If applicable, request documentation demonstrating compliance with IEC 62443 standards.

GDPR

Required for organizations processing personal data of eu citizens. If applicable, request documentation of GDPR compliance measures, including data privacy and security controls.

CCPA

Required for organizations processing personal data of california residents. If applicable, request documentation of CCPA compliance measures, including data privacy and security controls.

US IoT Cybersecurity Improvement Act

Required for us government agencies and their contractors. If applicable, request documentation demonstrating compliance with the requirements of the US IoT Cybersecurity Improvement Act.

Evaluation criteria

Here is the suggested weighting for IoT devices RFPs.

Completeness of Solution Extent to which the solution covers all essential IoT security requirements.
25%
Technical Capabilities Effectiveness of agentless discovery, threat detection, and automated response capabilities.
25%
Integration & Interoperability Ease of integration with existing security infrastructure and IT systems.
15%
Total Cost of Ownership Overall cost of the solution, including licensing, implementation, and ongoing maintenance.
15%
Vendor Experience & Expertise Vendor's experience in providing IoT security solutions to similar organizations.
10%
Compliance Support Vendor's ability to support relevant industry compliance standards and regulations.
10%

Some weights were adjusted based on your priorities.

  • Increase if a single vendor solution is preferred over multiple point solutions.
  • Increase if dealing with a high-risk environment with critical infrastructure.
  • Increase if a complex integration landscape exists.
  • Increase if seeking a long-term partnership with a trusted vendor.
  • Increase if strict regulatory requirements apply.

Red flags to watch

  • Reliance on Active Scanning

    Active scanning can disrupt or crash legacy IoT devices, indicating a lack of understanding of the IoT environment.

  • Lack of Agentless Discovery Capabilities

    Solutions that require agents on devices are unsuitable for many IoT deployments due to resource constraints.

  • Inability to Detect Shadow IoT Devices

    Failure to identify unauthorized devices connected to the network indicates incomplete visibility and potential security gaps.

  • Limited Integration with Existing Security Tools

    Lack of integration can create silos and hinder effective incident response.

  • Vague or Unclear Pricing

    Unclear pricing models can lead to unexpected costs and budget overruns.

Key metrics to request

Ask vendors to provide benchmarks from similar customers.

Time to Detect a Threat (TTDT)

Measures the speed and effectiveness of threat detection capabilities.

Time to Respond to a Threat (TTRT)

Indicates the efficiency of incident response and remediation processes.

Reduction in False Positives

Demonstrates the accuracy of threat detection and reduces alert fatigue.

Number of Devices Discovered

Validates the completeness of device discovery and inventory capabilities.

Percentage of Vulnerabilities Remediated

Tracks the effectiveness of vulnerability management and patching efforts.