https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/footer-logo.png
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Architecture
  • Engineering/Development
  • Security
ioti.com

Security


Getty Images

Image shows a digital background depicting innovative technologies in security systems,

Securing IoT Devices With Zero Trust Requires Mindset Shift

Zero-trust approaches require a shift in mindset to ensure IoT devices have rigorous security policies applied — and the work is never done, say IT pros.
  • Written by Linda Rosencrance
  • 7th December 2020

As data grows more integral to the enterprise, policies to protect it have to get more rigorous, especially those for IoT devices, which need a trust-but-verify approach. Zero-trust strategies are particularly important in a world of proliferating Internet of Things (IoT) devices. Many of these devices can access the network but also be easily compromised given lax or outdated security patches and the like on these devices. But companies often have to wrestle with a shift in mindset to adopt a zero-trust philosophy, as it often breaks from existing practices.

A zero-trust security strategy centers on the belief that companies shouldn’t just trust users – whether users are humans, devices or packets – inside or outside their perimeters and give them access to IT systems and data until they’ve been inspected and authenticated.

Under the zero-trust framework, only authenticated and authorized users and devices can access applications and data.

“Zero trust is really a mindset, or maybe an organizational culture, where anything you don’t know, you can’t trust and you have to verify,” said Gonda Lamberink, senior business development manager, UL.

[Take part in IoT Security Summit this December.]

That means organizations have to verify the identity of anyone or anything who accesses networks as part of an access control management strategy, she said.

Southern Methodist University (SMU) has embraced this zero-trust philosophy, said George Finney, the university’s chief security officer.

“It’s that mindset of habits,” Finney said. “You have to get into the mode of thinking skeptically about the technology you use and the ways you interact with it.”

Companies have to ensure that active devices – and users –meet certain requirements, Lamberink said.

Zero trust starts with having visibility into which IoT devices are running on a network and what these devices’ entail so an organization can apply the appropriate controls to isolate them, said Chase Cunningham, vice president and principal analyst, Forrester Inc.

“I can’t apply controls to a battlefield where I don’t even know what’s on my battlefield,” he said. “So I start by looking at the IoT space and saying, ‘This is what’s going on. This is what’s active, and this is what I need to start isolating because there may not be a business justification for [certain devices].”

Enterprises can use the strategic concept of zero trust to remove overt areas of compromise on IoT devices and stop them from being threats, he said.

“What we’ve seen go wrong with IoT devices is that a lot of these vulnerabilities relate to weak access control or access management,” Lamberink said. “So we focus on identity and access management, including strong authentication mechanisms and we build from there.”

Zero trust involves developing a cybersecurity policy at the individual user and device level, said Chris Williams, cybersolution architect at Capgemini. 

“That means companies are going to add security controls at a couple of different layers,” he said. “First is at the network layer, and that basically involves making your network smart about what is plugged into it.”

Network access control technology can scan devices that are plugged into the network, profile those devices based on various properties to try to figure out what they are and give the devices appropriate access based on the organization’s security posture, Williams said.

“Then once I’ve allowed that device to connect to my network, I’m going to query and authenticate based on the user,” he said. 

And IoT is one of those opportunities for companies to rethink devices given the challenges surrounding IoT Internet of Things is devices, Finney said. 

“So if you’ve got a [connected] printer or a thermostat or whatever other device you have, often those devices aren’t getting patched regularly, like your computers are,” he said. “They don’t have two-factor authentication enabled. So you’ve got to protect them as though you didn’t trust them, like they were the parts of your network that made you nervous the most.”

For SMU that means first asking if a particular device needed to be on the network at all, Finney said. And if the answer is yes, does it need to have internet access?

“We asked, ‘Can we block it from talking to the internet?'” he said. “Then there was the conversation about if you block it from the internet, you can’t get patches. But if you know you’re never going to patch it, then maybe you should lock it down.”

SMU’s zero-trust culture involves micro-segmentation, which entails separating networks into groups to make them smaller and smaller. So instead of having 254 computers on a network, maybe an organization would only have five or 10, he said. 

“We like to group them together into really small compact groups,” Finney said “So if one of those devices is compromised, we have to assume that all of them will be. But at least we’re containing that outbreak into a much smaller segment. And those segments have specific allowed rules of talking to other things on the network. So we can limit the impact of a potential issue on an IoT network.”

SMU has also developed a granular architecture in terms of securing all the different areas. The university, for example, has separate networks for the Internet of Things, so devices such as cameras, printers and the heating, ventilation and air conditioning systems (or HVAC) are isolated, according to Finney.

Finney stressed, however, that zero trust is more of a philosophy that an architecture. Organizations always have to be reassessing and doing ongoing monitoring and analysis. 

“You’re never done; it’s definitely an ongoing approach,” he said.

Tags: Network security zero trust Security Other Content Features IoT Security Summit

Related


  • Five Principles in a Zero-Trust Security Approach to IoT
    IoT devices have created vulnerability for IT networks, but a zero-trust security approach can lock down attack vectors. Here are five key principles.
  • Smart Grid Security Will Get Boost from AI and 5G
    The energy grid is poised for major change through such technologies as AI and 5G. But with advancements come new cybersecurity challenges.
  • An Integrated Approach to IoT Security
    This e-book provides a comprehensive framework to help organizations reduce risk in IoT products and environments.
  • Securing IoT at the Edge Is Key to Safe IoT Operations
    With unsecured IoT devices at the edge, IoT environments are vulnerable to malicious threats that disrupt operations.

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Content

  • Can Privacy-Preserving Machine Learning Overcome Data-Sharing Worries?
  • Developing a Critical Infrastructure Cybersecurity Strategy
  • 4 Steps to IoT Security
  • Addressing IoT Security Challenges From the Cloud to the Edge 

News

View all

Private LTE Market Projected to Grow to $13 Billion

12th January 2021

IoT World Announces 2021 IoT World Advisory Board

9th December 2020

White Papers

View all

Smart and Flexible Automotive and Tire Production

20th December 2020

Unlock the Potential of Digital Transformation in Oil & Gas

15th December 2020

Special Reports

View all

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

Webinars

View all

From Insights to Action: Best Practices for Implementing Connected Device Security

15th December 2020

Real Cyber Threats and Best Practices Cyber Security Strategy and Solutions for Smart Manufacturing

1st December 2020

Galleries

View all

Top IoT Trends to Watch in 2020

26th January 2020

Five of the Most Promising Digital Health Technologies

14th January 2020

Industry Perspectives

View all

IoT Spending Holds Firm — Tempered by Dose of ‘IoT Pragmatism’

1st December 2020

The Great IoT Connectivity Lockdown

11th May 2020

Events

View all

IoT at the Edge

17th March 2021

Embedded IoT World 2021

28th April 2021 - 29th April 2021

IoT World 2021

2nd November 2021 - 4th November 2021

Twitter

IoTWorldToday, IoTWorldSeries

#IoTsecuritytrends in 2021 will feature new threats given #remotework, #digitalhealth and #edgecomputing.… twitter.com/i/web/status/1…

25th January 2021
IoTWorldToday, IoTWorldSeries

Protecting Your Network Against Ripple20 Vulnerabilities dlvr.it/RrJhpD https://t.co/Q2xe5hoy4U

25th January 2021
IoTWorldToday, IoTWorldSeries

The DOD turned to #kubernetes #containers for #IoTdevelopment to brace for rapid change. dlvr.it/RqzsLz https://t.co/t8W7coEdZN

20th January 2021
IoTWorldToday, IoTWorldSeries

Food for thought: Food and Beverage Industry eBook @ROKAutomation dlvr.it/Rqz00T https://t.co/Z3y18vuozF

20th January 2021
IoTWorldToday, IoTWorldSeries

Facility of the Future dlvr.it/Rqyzvm https://t.co/ytpsOUTtGP

20th January 2021
IoTWorldToday, IoTWorldSeries

A new day in automotive production #digitalmanufacturingsolutions @ROKAutomation dlvr.it/RqyrNS https://t.co/yxPFrBZGVg

20th January 2021
IoTWorldToday, IoTWorldSeries

Unlock the potential of digital transformation in Oil & Gas @ROKAutomation dlvr.it/RqyrBV https://t.co/kzHcGjf2OK

20th January 2021
IoTWorldToday, IoTWorldSeries

.@Airbus’s #datdriven #digitaltransformation focused on getting its existing data in order rather than just gatheri… twitter.com/i/web/status/1…

19th January 2021

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X