Welcome to the official website of ESTL!
Follow WeChat
Current location: Home > News > Certification news > Technical information
Service Hotline
+86 13925582920Phone: +86-0769-85075888 to 6617
Fax: +86-0769-85075898
Mailbox: net03@gtggroup.com
Address: 2st floor, B Area, Jinbaisheng Industrial Park, Headquarters 2 Road, Songshan Lake Hi-tech Industrial Development Zone, Dongguan City, Guangdong Pr., China.
Editor:ESTL Category:Technical information Release time:2026-04-29 Click volume:5
If you have read our previous two articles about JC-STAR, you may feel this way:You roughly understand what JC-STAR is for, yet still feel confused about its specific evaluation rules.
This confusion is common. The most confusing part of JC-STAR lies in its overall structural logic.This article fully clarifies the complete framework of JC-STAR in one simple breakdown.
Simply put:JC-STAR = Star Rating System + Evaluation Scope + Core Security Dimensions
It is a three-dimensional evaluation system, not a simple scoring checklist.If you only regard JC-STAR as a score-based exam, you will struggle to understand its compliance logic.
JC-STAR adopts tiered star labeling for IoT security grading, with two core rules:
Star levels represent complete security capability sets, not fractional scoresThere is no “60 points pass” or “80 points excellent”.To obtain a specific star grade, products must satisfy all mandatory requirements of that tier.Missing any single item will directly block star upgrading, instead of simple point deduction.
Star levels are progressive and cumulativeHigher-star compliance must fully meet all requirements of lower tiers.Security controls are stacked layer by layer.This explains why many seemingly secure products remain stuck at medium or low star levels.
Most manufacturers underestimate this core rule.JC-STAR never assesses hardware devices in isolation.
The full evaluation scope covers:
Clear reminder:If your IoT product relies on cloud connection or mobile control, these components will definitely be included in the assessment.Independent hardware-only testing is almost impossible.
Beyond evaluated assets, JC-STAR focuses on systematic security capabilities rather than isolated technical points.
Key assessment categories:
Identity & AuthenticationDefault password management, mandatory initialization, device pairing and binding logic.Core focus: Identity verification and trusted interaction mechanisms.
Communication SecurityTransmission encryption, complete certificate verification, anti-interception and anti-tampering design.Improper encryption without effective verification is a common failure point in lab tests.
Credential & Key ManagementHard-coded keys, universal shared credentials, key update and rotation mechanisms.Key management must cover the full product lifecycle.
Firmware & Lifecycle SecuritySecure OTA updates, anti-rollback protection, long-term vulnerability response mechanisms.Lifecycle security carries high weight in Japanese market evaluation.
User-Oriented Security DesignOut-of-box secure status, clear risk notification, and non-weakened security settings.This dimension is often ignored by R&D teams.
The easiest way to understand JC-STAR is with a structural diagram:
This framework directly exposes missing designs and unassigned security responsibilities.
Most compliance failures stem from unreasonable early-stage design frameworks, rather than technical difficulties.
With this full JC-STAR panorama, we will further unpack detailed rules one by one:Why default passwords are a red-line violationStandard-compliant device pairing designKey inspection items for communication securityHigh-risk failure points of firmware upgrade mechanisms
Label: IoT APP cloud security assessment JC-STAR evaluation dimensions JC-STAR compliance framework Japan IoT security rating JC-STAR star level rule JC-STAR structure
Focus on Wechat
Public Number