How Secure Are IoT Solutions, Really? Better ways to overcome IoT security challenges may not be for off. But businesses can lead the effort by baking security into their approach to innovation. Stanislas Walden MentorMate Alumni The Internet of Things is growing. The installed base of connected devices is set to expand at a rate of 15-20% every year through 2020. But one thing may remain unchanged. IoT security challenges are at the top of people’s concerns when it comes to implementing the Internet of Things in business settings. Those waiting to open their wallets to IoT likely have events from late 2016 fresh in their memory. That October, the Mirai botnet enacted a distributed denial of service (DDoS) attack, infecting computers with malware that crashed websites across Europe and the US through high levels of artificially generated web traffic. This botnet was unique because it lived amongst devices connected by the Internet of Things. It’s likely the first of its kind, living in everything from DVRs to DSLRs. The attack was carried out across 100,000 malicious endpoints which explains the widespread ramifications of the attack. It’s estimated that the resulting economic damage was about $110 million. How the Benefits of IoT Are Accompanied by Risk The Mirai attack did not involve a network breach. Rather, weaknesses in security were discovered by software programmed to target devices that were secured only by their factory default passwords. Everyday, objects with new smart, connective capabilities — from lamps to kitchen appliances and watches — are available to more people who don’t think twice about resetting passwords for everyday items in their homes. The unprecedented connectivity of IoT means that the task of maintaining secure digital infrastructures to overcome IoT security challenges is only becoming more complex. Entire economies are put at risk as opportunities for attack expand at the same rate as applications of IoT become more pervasive in business environments and in consumers’ homes. Businesses are drawn to the Internet of Things as an effective tool for gathering data that spurs innovation. But the inherent unprecedented connectivity promised by IoT makes standardization and regulation of privacy and data security more important to protecting for businesses and consumers alike going forward. From hardware to network security, companies that leverage IoT in internal or client-facing software solutions need to devote the resources necessary to ensure a uniformd and end-to-end approach to accounting for IoT security challenges in their digital environments. What it Takes to Overcome IoT Security Challenges Simply following security best practices is actually an effective way to create a cohesive strategy to overcome IoT security challenges and can scale alongside a growing IoT solution. Constant security monitoring should involve analysis of code quality on individual devices and the network portals that connect them, delineate user authentications and ownership of endpoints, as well as the protocols used to secure the data they generate. It’s not necessary to reinvent the wheel when securing IoT solutions. In fact, responding to IoT security challenges is not unlike strategies already familiar to IT teams. Security in IoT demands a doubling down on common security protocols, a commitment to riding the wave of evolving industry standards, and the proper bandwidth to work with third parties services to verify that the systems in place work. Comply with Regulatory Standards PCI DSS ISO 270001 SOC 2 HIPAA Leverage Existing Protocols HTTPS MQTT Control Access Mutual Authentication Multi-factor authentication Companies May Need to Pave the Way to Better Security Standards IoT From connected parking lots to car washes, novel uses of IoT mean that security standards can be immature, or in some cases, absent. Understandably, many business leaders are not comfortable with the risk entailed or capital required in paving the way towards standardizing methods that address and overcome IoT security challenges specific to their industries. But putting security at the forefront of IoT projects can differentiate businesses in positive ways. An IoT product of system that wins the security game represents a competitive advantage for the company responsible for the solution. Security is a service for which people will increasingly be eager to pay. Amazon dominates 40% of the IaaS and PaaS market, and there’s little doubt that its security-first approach has something to do with it. Tips to Choosing a Cloud Architecture How does cloud development control expenses and reliably scale application delivery? As long as standards for security and privacy are conceived of as nascent, businesses and service providers can distinguish themselves by developing IoT solutions within highly regulated verticals. Will Businesses Share the Burden of Solving IoT Security Challenges? But formal efforts are being made to address the new challenge posed by securing expansive and intricate IoT solutions. Less than a year since the attack, new legislation seeks to bring regulation up to speed with security gaps created in the wake of rapidly evolving technologies. In late summer 2017, a bill was introduced in the California Senate that would task manufacturers of IoT devices with implementing stronger security features during the device’s design phase. Security features would no longer be offered in post-production as “patch,” but rather baked into cutting-edge technologies. The promise of a baseline of required security features would benefit businesses and users in the future, but that reality could be years away. Even when that day does come, the requirements may not suit every industry or business. Businesses that lead efforts in creating rigorous and more formal security methodologies for evolving applications of IoT may themselves set the standards that are eventually adapted and reinforced elsewhere. How Careful Data Collection Can Ease IoT Security Challenges Smarter data collection can bolster overall a business’s strategy for securing its solutions despite IoT security challenges. Business leaders should weigh the business needs with its goals, determining the data that’s necessary for growth, and then collect all relevant data — and nothing more. This prevents privacy breaches and ensures that data collection is never passive, but an active commitment to informing solutions to business challenges. Privacy is an important element of security in the context of IoT. Companies need to demonstrate that they collect sensitive data with an eye to transparency, describing what they are collecting, who has access to it, and how access to it is controlled. For example, a worker at a hospital may need to access aspects of patients’ medical records in order to compile statistics for stakeholders. Medical details relating to any illnesses are not necessarily relevant to the task at hand. The software she uses to source this data should support a nuanced user authentication capability and comply with privacy regulations so that only relevant data is accessible to her. A central framework that backs a strategic and refined approach to data collection makes for a streamlined implementation of privacy standards down the road and a more secure data landscape overall. Why You’ll Fail Without a Software Maintenance Plan Plan for maintenance with these 13 tactics. The Ongoing Cost of Responding to IoT Security Challenges Since ongoing end-to-end system maintenance is the only way to ensure that an organization aligns its hardware, firmware, and software to respond properly to IoT Security Challenges, engaging a third party consultant who assesses IoT security architecture quarterly, on top of the business’s internal IT teams’ ongoing efforts, helps to ensure proper function and security. However they choose to maintain and test the security of components in IoT solutions, business leaders should anticipate the bearing the ongoing cost of maintaining any compliancy. Services providers cannot be expected to accept the onus of security and compliancy. Businesses must bake security into their approach to innovation,whether that means sourcing third-party risk management auditors to increasing the IT team’s budget to seek and maintain a more secure digital environment. Image Source: Unsplash, Samuel Zeller Tags IoTDevelopmentSystems ArchitectureSecurity Share Share on Facebook Share on LinkedIn Share on Twitter Cloud Computing How does cloud development control expenses and reliably scale application delivery? Download Share Share on Facebook Share on LinkedIn Share on Twitter Sign up for our monthly newsletter. Sign up for our monthly newsletter.