IoT cannot rely solely upon security practices designed for conventional devices.
Experts at the National Institute of Standards and Technology (NIST) have kicked off an initiative to support the development and application of standards, guidelines, and related tools to improve the cybersecurity of connected devices and the environments in which they are deployed. NIST’s Cybersecurity for the Internet of Things (IoT) and Privacy Engineering Programs drafted a report titled NIST Internal Report (NISTIR) 8228: Considerations for Managing IoT Cybersecurity and Privacy Risks that is now available for public comment.
The report is an introductory document to help organizations better understand and manage the security risks throughout the lifecycle of their IoT devices. The document identifies three high-level considerations that may affect the management of cybersecurity and privacy risks for IoT devices compared to conventional information technology (IT) devices:
Heterogeneous capabilities of IoT devices vs. conventional IT devices
Conventional IT devices tend to have largely homogeneous capabilities. For example, most laptops have similar data storage, processing, and transferring capabilities. Because the capabilities are so similar across all laptops, their cybersecurity and privacy risks tend to be similar as well. This is in contrast to IoT devices, which offer an incredible heterogeneous range of capabilities and combinations of those capabilities.
For examples, one IoT device may have just a few basic capabilities, such as sensing data and transmitting that data to a server for processing and storage with no human user interfaces or centralized management capabilities. Conversely, another IoT device may include multiple sensors and actuators, use local and remote data storage and processing capabilities, and be connected to several internal and external networks at once. This variability in capabilities causes similar variability in the cybersecurity and privacy risks involving each IoT device.
Lack of device access, management, and monitoring features
IoT devices typically have a small memory and a rudimentary operating system with no real user interface. This presents a challenge, as those devices have limited power and computing capabilities available for risk-mitigating functionality. Also, there is extensive variety in the software and firmware used by IoT devices. This significantly complicates software management throughout the IoT device lifecycle, affecting areas such as device configuration, certificates and patch management. In contrast, conventional IT devices usually provide authorized people, processes, and devices with hardware and software access, management, and monitoring features.
Control availability, efficiency, and effectiveness
Many IoT devices do not or cannot support the range of controls typically built into conventional IT products. For example, a simple sensing IoT device may not have the processing capability to support the use of strong encryption and mutual authentication without unacceptable delays. Sophisticated network-based intrusion prevention systems, antimalware servers, and firewalls, may not be as effective at protecting IoT devices as they are at protecting conventional IT. IoT devices often use protocols that conventional IT controls cannot understand and analyze.
Given the variety of IoT device capabilities and the issues with accessing, managing, and monitoring these devices, there is a clear need to follow basic guidelines to build a practical security solution for IoT devices. The following principles can serve as a foundation to enable stronger IoT security:
Bottom line
As more IoT devices are deployed to deliver unique experiences, the degree of vulnerability to cybersecurity threats will inevitably increase. IoT security must be a priority from the initial stages of IoT deployments. IoT asset owners must understand the security and privacy implications of IoT and ensure that the various hardware, network, and software elements are sufficiently secure and properly certified. The NIST guidelines address a number of important areas, including the improvement of cybersecurity for IoT products and basic principles that all products should meet. Now it is up to the IoT OEMs and device manufacturers to play ball.
Leave a Reply