Label designs fall in three distinct categories [12,15]:
- Binary labels, such as the USDA organic label, are the most usable and simple as they indicate the presence of a property or quality.
- Graded labels, including the EnergyGuide label, offer greater shades of distinctions between products. However, research shows that products with lower grades may be penalized by customers and be given the boot in favor of unlabeled alternatives.
- Descriptive labels, such as the FDA nutrition facts label, offer the most amount of information to the consumer, but are more complex thus less usable. These labels may also be less effective at informing consumer behavior for products that are perceived as less risky.
It is likely that different labeling styles are needed for distinct IoT devices and deployment environments. Unfortunately, few studies have investigated the comparative effectiveness of different labeling styles in cybersecurity [12]. Each label requires additional design decisions that should be informed by empirical evidence. For binary labels, for example, a designer may choose an icon, such as a lock, keys or a shield, that leverages an effective, yet appropriate security mental model. Alternatively, the choice may be to employ a preexisting trustmark that indicates broader product quality [15]. Security can then be incorporated into the overall product quality certification and emphasized with additional text or visual clues to the existing label.
Enhanced labels, such as graded and descriptive labels, increase the number of design decisions. In the case of graded labels, designers must choose the grades’ framing. UL (Underwriters Laboratories), a global safety certification company, grades IoT security along five levels: 1) bronze, 2) silver, 3) gold, 4) platinum, and 5) diamond [24]. For descriptive labels designers must begin by choosing the specific information to include in the label [19]. Given the lack of empirical results on these design decisions, it is important to prioritize research in advance of policy interventions.
When making these design decisions, it is important to keep in mind how consumers interpret the cybersecurity label. The consumer’s technical literacy, their behavioral incentives driving the purchase, as well as their mental models of security must be accounted for to avoid conveying a false sense of security and safety that could spur unsafe user actions. Absent design research for non-expert users, one option may be to leverage more mature customers. For example, one proposal in the UK pushes the responsibility of verifying security labels to retailers, who can only sell IoT devices that meet certain security requirements [23].
The discussion as well as the adoption and uptake of cybersecurity labels is in an early stage. Yet it is helpful to learn from other risk domains [25], such as the food industry [1], to get clues to how the labeling regime may develop in the future. Yet these lessons must be appropriately contextualized to address the adversarial nature of cybersecurity as well as the breadth of IoT categories and products, corresponding deployment environments, and diversity of customers. Consider, for example, that the NYC health department certifies restaurants rather than individual dishes. Cybersecurity labels will, however, be certifying devices not vendors. Thus, it is important to focus on the outcome of labeling, which is to inform the determination of acceptable risk. The NYC health sanitation rating frames this in three essential outcomes:
- The grades determine how often a food establishment gets inspected. A lower grade results in more frequent inspections with the objective to provide guidance and improve the sanitary condition. Graded with a C, a restaurant will receive an inspector’s visit three to four times a year, whereas an A restaurant will be inspected once a year. Contextualizing this for cybersecurity, a lower rated device may be expected to have shorter security lifespan.
- If found to be in severe violation of food safety and creating a public health hazard that cannot be corrected, an inspector can close a restaurant immediately. In the cybersecurity context, if a vulnerability is reported, the labeling entity may require the vendor to fix the security flaw. Absent that the label may be withdrawn or, alternatively, retailers may no longer carry the product.
- The NYC health department ensures a consistent and repeatable baseline for all restaurants to demonstrate food safety to their customers. However, in food safety there is not an ongoing effort to poison the food in all restaurants that is dynamic and constantly changing. Cybersecurity, by contrast, is an adversarial domain and IoT products are significantly more diverse with distinct threat exposures. Thus, cybersecurity labels may require a decentralized approach perhaps driven by sector specific-stakeholders, rather than a top-down, agency-driven prescriptive approach.
Voluntary labeling may be an effective intervention to address information asymmetry in the cybersecurity market. However, any effective policy intervention must describe practical solutions, supported by institutional infrastructure, and a governance model that allows for stakeholder engagement. Given the diversity of IoT devices, innovative, customized solutions commensurate with the many domains of application are needed. These must emphasize and secure the sustainability of a labeling regime in the long term. The alternative is the creation of a lemons market for cybersecurity labels that undermines what it intends to enhance.