https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/footer-logo.png
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Architecture
  • Engineering/Development
  • Security
ioti.com

Security


Getty Images

IoT security

Zero-Trust Security for IoT: Establishing Rigorous Device Defenses

IoT security pros can benefit from zero-trust security to authenticate rogue devices that try to connect to a network. Zero trust should be the hallmark of your IoT strategy.
  • Written by Brien Posey
  • 8th March 2021

Zero trust is a key security trend today, and for good reason. Zero-trust security provides a level of access control that cannot be matched by more conventional security models.

Zero-trust security is a concept that centers on the belief that organizations should not automatically trust anything inside or outside their perimeters and must verify any user or device that tries to connect to its systems before granting access.

As popular as zero-trust security might be however, it’s challenging to implement. After all, zero-trust security is a model — it isn’t a product that you can buy, or a security setting that you can turn on. Zero trust is a desired end result it’s And each organization has to identify how best to achieve that result.

Because of this, zero trust can mean different things depending on the context. Consider the difference between applying zero trust to users as opposed to device-level zero trust. Even at that, organizations may have differing ideas about what is needed for a user or device to prove its trustworthiness. In other words, there is no universal standard that defines what it means for an organization to use zero-trust security. Additionally, it is almost certain that of the principles of zero-trust security will evolve over time.

As organizations work to implement zero-trust security for their IT resources, they will inevitably have to consider how best to create a zero-trust model for their IoT devices. However, adopting zero-trust security for IoT devices can be an extraordinarily difficult challenge. Most IoT devices offer relatively few configurable security settings, and the IT community has not yet created a lot of prescriptive guidance for those who need to implement zero trust for IoT devices.

Thankfully, bringing zero trust to your IoT devices is not an impossible endeavor, but it does require a bit of creativity.

Strategies to Bring Zzero Trust to IoT – MAC Device Identity

As previously noted, the key to implementing zero trust is defining what it is that you hope to achieve and what it means for a particular device to operate in a zero -trust configuration. When it comes to IoT devices, you have to consider the device types and the security options that exist for those devices. Remember though, zero trust is less about configuring a device’s security settings than it is about proving the device’s trustworthiness. From an IoT prospective, you may be able to achieve zero trust by focusing your efforts on proving a device’s identity before allowing it to participate on a network.

There are a few different ways to establish proof of identity for IoT devices, and the method you use comes down to device capabilities. At the most basic level however, you may be able to enforce device identity based on the device’s MAC address.

Using a MAC address to positively identify a device isn’t a fool-proof method because MAC addresses can be spoofed — even so, it is far more effective than doing nothing.

Most wireless access points allow you to create a whitelist of devices that are allowed to participate on a wireless network. This whitelist is usually based on device MAC addresses. Some access points even allow you to assign a text label to a particular device, so as to make it easier to identify. Such a label might,for example, assign the label Front Door Security Camera to MAC address 00-40-96-AA-DF-6C-D2-AB.

Whitelisting Legitimate IoT devices to Block Rogue Devices

Of course, MAC address whitelisting is more than just a tool for making it easier for humans to figure out which devices are connected to a network. Whitelists can be used to bar an unauthorized device from participating on the network.

Imagine that your organization makes extensive use of a particular type of IoT device, and that all of those devices are connected to a wireless network. Now suppose that a user wants to attach a rogue device of the same type to the same network.

Just to make things interesting, let’s also assume that the rogue has figured out the network’s SSID and WPA key. Under normal circumstances, the user would have no trouble attaching the rogue device to the network. The device would likely go undiscovered for quite some time because it would blend in with the other devices that the organization uses.

If, on the other hand, an administrator took the time to whitelist the legitimate devices, then the rogue device would be unable to connect to the network in spite of knowing the SSID and WPA key. The rogue device would not appear on the access point’s whitelist; hence the device would be denied access to the network. This is a form of zero trust – the rogue device would not able to connect to the network in spite of having the correct credentials, because it is unable to prove its identity to the network.

Proving IoT Device User Identities

As previously noted, access point whitelisting is only one way of positively identifying IoT devices. I discussed this option because it can be done regardless of the devices you use. Some devices, however, may be able to use certificates or other mechanisms to prove their identities.

Every organization will take a different approach to implementing zero trust for IoT devices, and that’s OK. In the quest for IoT zero trust, admins should focus on what they can do to prove or disprove the identities of the IoT devices on their networks.

Tags: Hardware-based security Security Technologies

Related


  • 3d rendering of human brain on technology background
    AI Ups the Ante for IoT Cybersecurity
    Security providers in IT and OT have implemented AI, ML and other advanced technologies to make systems smarter than malicious attackers.
  • IoT security
    Protecting Your Network Against Ripple20 Vulnerabilities
    Early this year, Ripple20 wrought havoc on numerous IoT devices, given vulnerable third-party code. Here are ways to prevent your organization from the fallout.
  • IoT security
    IoT Security Trends, 2021: COVID-19 Casts Long Shadow
    While some IoT security trends in 2021 will continue trends from 2019 and 2020, COVID-19 has brought some new threats to the fore.
  • IoT security
    IoT Device Security: Risk Assessment, Hygiene Are Key
    As devices and data proliferate at the edge of the network, IT pros have encountered new challenges in securing enterprise IT systems.

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Content

  • COVID-19 Driving Data Integration Projects in IoT
  • Intro to LynxSecure
  • Can Privacy-Preserving Machine Learning Overcome Data-Sharing Worries?
  • Cybersecurity Crisis Management During the Coronavirus Pandemic

News

View all

Webex Collaboration Banks on Hybrid Workplace Model at Cisco Live 2021

2nd April 2021

Cisco Enlists Networking Automation, CX Cloud in COVID-19 Response

31st March 2021

White Papers

View all

Telehealth and COVID Infographic

30th March 2021

Medical Supply Chain Management with Smart Devices and Sensors

30th March 2021

Special Reports

View all

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

Webinars

View all

Weber’s Journey: How a Top Grill Maker Serves Up Connected Cooking

25th February 2021

From Insights to Action: Best Practices for Implementing Connected Device Security

15th December 2020

Galleries

View all

Top IoT Trends to Watch in 2020

26th January 2020

Five of the Most Promising Digital Health Technologies

14th January 2020

Industry Perspectives

View all

IoT Spending Holds Firm — Tempered by Dose of ‘IoT Pragmatism’

1st December 2020

The Great IoT Connectivity Lockdown

11th May 2020

Events

View all

Embedded IoT World 2021

28th April 2021 - 29th April 2021

The Virtual Industrial AI Summit

29th June 2021 - 30th June 2021

IoT World 2021

2nd November 2021 - 4th November 2021

Twitter

IoTWorldToday, IoTWorldSeries

IoT Enterprise Deployments Continue Apace, Despite COVID-19 dlvr.it/RxWwsS https://t.co/BSkxdf17vs

12th April 2021
IoTWorldToday, IoTWorldSeries

🥳Happy #IoTDay! How are you celebrating? We're giving $50 off All Access Passes to join our upcoming virtual event,… twitter.com/i/web/status/1…

9th April 2021
IoTWorldToday, IoTWorldSeries

🎉 Announcing #EIOTWORLD sponsor, @InnoPhaseinc — a fabless wireless semiconductor platform company specializing in… twitter.com/i/web/status/1…

8th April 2021
IoTWorldToday, IoTWorldSeries

Digital Health Infrastructure Benefits From Cloud-to-Edge Architecture dlvr.it/RxBwQ4 https://t.co/AILVdUVWDA

7th April 2021
IoTWorldToday, IoTWorldSeries

Meet the #EIOTWORLD keynote lineup: Google, Facebook, Linux Foundation, STMicroelectronics, Antmicro, OpenHW Group,… twitter.com/i/web/status/1…

6th April 2021
IoTWorldToday, IoTWorldSeries

Network Data Analytics Supports Back-to-Work Health and Safety dlvr.it/Rx5xlL https://t.co/VvxxpdUMJ3

6th April 2021

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X