小程序
传感搜
传感圈

Why Now is the Time to Harden Your IoT Network Security

2023-01-31
关注

Why Now is the Time to Harden Your IoT Network Security
Illustration: © IoT For All

Until a few years ago, organizations lacked real-time data insights about the status of their people, places, and processes. Now this information, if not indispensable, is increasingly desirable to well-managed organizations. With IoT deployment topping 300 billion units worldwide, organizations have gained an effective and productive way to manage areas such as energy, logistics, physical security, health, and the environment.

These changes became possible with the mass deployment of communicating sensors, which enable organizations to predict and quicken responses to issues impacting food and pharmaceutical safety, supply chain efficiency, environmental and climate hazards, and property protection.

Connectivity breakthroughs, including narrow-band IoT (NB-IoT) and low-power wide area networks (LP-WAN), coupled with messaging protocols like lightweight M2M (LWM2M), have slashed the costs of transmitting data and offered low-cost hardware options while extending the life of batteries and other components.

Since the term “Internet of Things” was coined by Kevin Ashton back in 1999, enterprises have learned that, while inexpensive, low-power sensors are essential building blocks, and the network that safely transports the data is the most under-appreciated aspect of a successful deployment. In 2023, we expect to see deeper investments by carriers and enterprise customers in security prevention — a set of make-or-break actions that help enterprises avoid unwelcome headlines.

“In 2023, we expect to see deeper investments by carriers and enterprise customers in security prevention — a set of make-or-break actions that help enterprises avoid unwelcome headlines.”

-Vodafone

Secure By Design

A well-planned IoT security strategy enables organizations to prepare for and manage both known and unknown threats. Today security professionals express growing interest in a Zero Trust strategy known as Secure Access Service Edge (SASE), which provides secure cloud-based access to systems from anywhere. Gartner projects that by 2024, at least 40 percent of organizations will have an official SASE adoption strategy.

SASE principles inform a “secure by design” network framework, heightening security prevention and reducing the risk of data loss. In practice, a core network should include high-resilience web application firewall (WAF) solutions such as GTP Firewalls to ensure that all traffic comes from verified sources.

Secure by design also includes active and intelligent monitoring. Typically, a Security Operations Center (SOC) team will proactively monitor and scan IoT networks in real-time to quell operational threats. A strong security prevention program also includes an Information Security Management System (ISMS), a programmatic way of establishing a cybersecurity baseline and physical controls to protect operational information. For example, many firms deploy end-to-end identity management capabilities such as multi-factor authentication with renewable credentials to manage user access.

Hardening IoT Devices

Hardening IoT devices requires a series of steps and investments that can significantly improve data transmission and security. First, IoT analytics are increasingly deployed to preemptively identify issues picked up by IoT sensors in the field. Machine Learning yields insights about the device’s behavior and health and enables operational teams to discover potential anomalies and improve their real-time decision-making.

Second, authentication methods such as SIM Trust, or Digital Asset Broker (DAB), enable firms to implement a Zero Trust approach to IoT device management. For example, with DAB, an IoT device is assigned a unique digital identity to communicate and transact securely with other devices. This technique can apply to wallet and payment technology secured by the mobile SIM. These methods form a root of trust for even the smallest, lightweight IoT devices.

Third, integrated SIM, better known as iSIM, simplifies deployment and reduces the cost of connecting devices in the field. Until recently, an iSIM deployment included a baseband radio and a processor with a SIM to authenticate to a secured network. Today, a system on a chip, called a SOC, performs all of these functions in a deployment-friendly package. In fact, iSIMs can be deployed on smart labels for tracking valuable shipments.

Fourth, Over-the-air (OTA) hardening is an efficient, wireless way to distribute an application, configuration, or firmware update to IoT devices. Firms that update IoT devices with USB sticks know that this process won’t scale. Given the explosive growth of IoT, manual updates and patches must be automated whenever possible.

Next Steps

In an age of explosive growth in IoT, AI, and automation technologies, network security practices must scale to meet complex and evolving challenges. Zero Trust risk mitigation policies dictate that every IoT device must be authenticated, no matter where it is located—or where it is going. Firms know that while there are endless ways to deploy IoT devices, an improperly secured IoT deployment is a surefire way to undermine all promising business benefits.

Establishing a secure-by-design IoT network requires firms to deepen their commitment to security prevention, adopt robust security principles and standards, and bake privacy controls into the network’s inception and design. Companies can confidently make these investments knowing that a secure-by-design IoT network can sustain key business processes and deliver exceptional business outcomes.

Tweet

Share

Share

Email

  • Remote Management
  • Security
  • iSIM
  • IT and Security
  • Network and Protocols

  • Remote Management
  • Security
  • iSIM
  • IT and Security
  • Network and Protocols

参考译文
为什么现在是时候加强您的物联网网络安全
直到几年前,组织还缺乏关于人员、地点和流程状态的实时数据洞察。现在,这些信息,即使不是不可或缺的,也越来越为管理良好的组织所需要。随着全球物联网部署超过3000亿台,企业已经获得了一种有效和富有成效的方式来管理能源、物流、物理安全、健康和环境等领域。随着通信传感器的大规模部署,这些变化成为可能,它使组织能够预测并加快对影响食品和药品安全、供应链效率、环境和气候危害以及财产保护的问题的响应。包括窄带物联网(NB-IoT)和低功耗广域网(LP-WAN)在内的连接突破,再加上轻量级M2M (LWM2M)等消息协议,大幅降低了数据传输成本,并提供了低成本硬件选项,同时延长了电池和其他组件的寿命。自1999年凯文·阿什顿(Kevin Ashton)创造了“物联网”一词以来,企业已经认识到,虽然廉价、低功耗的传感器是必不可少的构建模块,但安全传输数据的网络是成功部署中最不被重视的方面。2023年,我们预计运营商和企业客户将在安全预防方面进行更深入的投资——一系列成败攸关的行动,帮助企业避免不受欢迎的头条新闻。“到2023年,我们预计运营商和企业客户将在安全预防方面进行更深入的投资——一系列成败攸关的行动,帮助企业避免不受欢迎的头条新闻。”计划良好的物联网安全策略使组织能够准备和管理已知和未知的威胁。如今,安全专业人员对称为安全访问服务边缘(Secure Access Service Edge, SASE)的零信任策略表现出越来越大的兴趣,该策略提供了从任何地方对系统的基于云的安全访问。Gartner预计,到2024年,至少40%的组织将拥有官方的SASE采用战略。SASE原则提供了一个“设计安全”的网络框架,加强了安全预防,降低了数据丢失的风险。在实践中,核心网络应该包括高弹性web应用防火墙(WAF)解决方案,如GTP防火墙,以确保所有流量都来自经过验证的来源。安全的设计还包括主动和智能监控。通常,安全运营中心(SOC)团队将主动监控和实时扫描物联网网络,以消除操作威胁。强大的安全预防计划还包括信息安全管理系统(ISMS),这是一种建立网络安全基线和物理控制以保护运营信息的程序性方式。例如,许多公司部署端到端身份管理功能,例如使用可更新凭证的多因素身份验证来管理用户访问。加固物联网设备需要一系列步骤和投资,可以显著改善数据传输和安全性。首先,物联网分析越来越多地用于先发制人地识别现场物联网传感器发现的问题。机器学习可以深入了解设备的行为和健康状况,使运营团队能够发现潜在的异常情况,并改善实时决策。其次,SIM Trust或数字资产经纪人(DAB)等身份验证方法使企业能够实现零信任方法来管理物联网设备。例如,通过DAB,物联网设备被分配一个唯一的数字身份,以便与其他设备安全地通信和交易。该技术可以应用于移动SIM卡保护的钱包和支付技术。这些方法形成了信任的根源,即使是最小的、轻量级的物联网设备。 第三,集成SIM(更广为人知的是iSIM)简化了部署并降低了现场连接设备的成本。直到最近,一个iSIM部署还包括一个基带无线电和一个带有SIM卡的处理器,用于向安全网络进行身份验证。今天,一个称为SOC的芯片系统在一个部署友好的包中执行所有这些功能。事实上,isim可以部署在智能标签上,用于跟踪有价值的货物。第四,无线(OTA)加固是一种高效的无线方式,可以将应用程序、配置或固件更新分发到物联网设备。使用u盘更新物联网设备的公司知道,这个过程无法扩展。鉴于物联网的爆炸式增长,人工更新和补丁必须尽可能自动化。在物联网、人工智能和自动化技术爆炸式增长的时代,网络安全实践必须扩大规模,以应对复杂和不断变化的挑战。零信任风险缓解策略规定,每个物联网设备都必须经过身份验证,无论其位于何处或将要前往何处。企业知道,虽然部署物联网设备的方法有无穷无尽,但安全不佳的物联网部署肯定会破坏所有有希望的商业利益。建立一个设计安全的物联网网络需要企业深化对安全预防的承诺,采用强大的安全原则和标准,并将隐私控制纳入网络的初始和设计。企业可以自信地进行这些投资,因为设计安全的物联网网络可以维持关键业务流程,并提供出色的业务成果。
您觉得本篇内容如何
评分

评论

您需要登录才可以回复|注册

提交评论

iotforall

这家伙很懒,什么描述也没留下

关注

点击进入下一篇

人工智能磁悬浮列车:磁悬浮汽车的灵感来源

提取码
复制提取码
点击跳转至百度网盘