Sponsored By

What You Need on Your IoT Security ChecklistWhat You Need on Your IoT Security Checklist

Locking down IoT takes more than just end-to-end encryption.

Gary Audin

May 4, 2018

3 Min Read
No Jitter logo in a gray background | No Jitter

For widespread deployment, Internet of Things (IoT) devices have to be relatively inexpensive -- and this, in turn, could mean some security shortcuts. Likewise, in the rush to deploy IoT devices, security can get overlooked. These are reasons why IT should be proactive and involved in IoT deployments, getting the business to consider possible risks associated with the introduction of IoT devices and heading off shadow IoT implementations.

IoT security requires both a macro and micro view. This view has to be global and holistic, including not only the devices themselves but the networks connecting them, the management platforms, and relevant compliance and regulatory standards.

A strong IoT security posture includes strict identification and authentication processes, whether you're using industrial or consumer IoT devices. Because your IoT data will likely traverse the Internet, you need to ensure your data is encrypted, and you need to make sure your management platform can support the IoT devices you expect to deploy.

If you decide to deploy edge computers at or near the IoT devices, investigate whether those edge computing devices provide the security control that the endpoint IoT devices may not contain. You may also want to implement applications in the edge computers. In other words, evaluate the edge computers against the attack surfaces and vulnerabilities as well as the endpoints.

Finally, you need to consider whether your business is meeting relevant compliance and other regulatory mandates for your industry relative to how it transmits and stores IoT.

Attack Surfaces and Vulnerabilities
The Open Web Application Security Project (OWASP) has compiled a long list of IoT attack surface vulnerabilities that should be useful if you're looking to deploy or implement IoT technologies. The list includes 17 attack surfaces, including hardware, storage, networks, interfaces, applications, APIs, authentication, and authorization, and specifies 131 vulnerabilities across them.

This vulnerability list can be a good starting point, but no checklist is exhaustive. We can always find something else based on experience. Here are some suggestions to follow when considering and deploying IoT devices:

  • Ensure your passwords, both local and remote, are strong and require multifactor authentication. Never use products that have hard-coded passwords, as attackers can easily use them. Govern permissions that you delegate for accessing these devices, and implement privileged access management.

  • Don't make assumptions about the security characteristics or privacy policies of the controlling applications. Avoid using devices that have poor security and privacy capabilities. Connect the IoT devices on a separate network that has its own monitoring capabilities and sits behind firewalls.

  • Turn off any capabilities on your IoT devices that you don't need. These extra capabilities could be mechanisms used to bypass controls and security processes. The physical access of the device should block intrusion -- meaning, you should eliminate buttons for resets or changing ports and passwords. Avoid automatic connections via wireless networks. You may want to implement network device isolation to prevent device infiltration.

  • If you aren't blocking incoming traffic, ensure that the software ports that allow remote control configuration are appropriately restricted. Employ encryption wherever you can. If encryption isn't available, don't allow that IoT device onto the network. Consider deploying a VPN.

  • If updating firmware or software requires a manual process or has to be done locally, don't buy those products.

  • Be sure to remove IoT devices when they reach end of life and are no longer updatable or secure. You also may have to turn them off when you have to replace power sources as well. Ensure the replacements meet your policies and processes.

Related articles:

About the Author

Gary Audin

Gary Audin is the President of Delphi, Inc. He has more than 40 years of computer, communications and security experience. He has planned, designed, specified, implemented and operated data, LAN and telephone networks. These have included local area, national and international networks as well as VoIP and IP convergent networks in the U.S., Canada, Europe, Australia, Asia and Caribbean. He has advised domestic and international venture capital and investment bankers in communications, VoIP, and microprocessor technologies.

For 30+ years, Gary has been an independent communications and security consultant. Beginning his career in the USAF as an R&D officer in military intelligence and data communications, Gary was decorated for his accomplishments in these areas.

Mr. Audin has been published extensively in the Business Communications Review, ACUTA Journal, Computer Weekly, Telecom Reseller, Data Communications Magazine, Infosystems, Computerworld, Computer Business News, Auerbach Publications and other magazines. He has been Keynote speaker at many user conferences and delivered many webcasts on VoIP and IP communications technologies from 2004 through 2009. He is a founder of the ANSI X.9 committee, a senior member of the IEEE, and is on the steering committee for the VoiceCon conference. Most of his articles can be found on www.webtorials.com and www.acuta.org. In addition to www.nojitter.com, he publishes technical tips at www.Searchvoip.com.