The Internet of Things (IoT) age is here and thriving. It is a huge digital transformation for the enterprise—bigger than PC and mobile combined. The IoT era not only brings new opportunities, but also presents an expanded attack surface, already being exploited by cyber criminals.

“With the new IoT age, it is connectivity first – security second. This is true for manufacturers, consumers, and businesses alike. Whether this is an employee bringing in a device, or new connected devices being installed by operations or facilities, IT and security are often not aware or able to ask crucial architectural questions,” says Andre Kannemeyer, CTO at Duxbury Networking, distributor of Armis solutions in South Africa.

These new devices bring three challenges to businesses:

·        Designed to connect: IoT devices are designed to connect. In many cases, they are actively seeking connections, whether you want them to or not. Which means attackers can search, find, and attempt to connect to these devices anytime, without your knowledge.

·        Invisible to traditional security tools: Traditionally, users put an agent on an endpoint to protect and manage it. But IoT devices cannot accommodate security agents. So the IoT devices are unprotected and invisible to endpoint management systems.

·        The new attack vector: Hackers and cyber criminals prefer to target the weakest links, so they have turned their attacks toward IoT devices.

“The IoT security blind spot means cyber-criminals have an expanded attack surface. This creates a new landscape where the traditional methods of security do not suffice,” says Kannemeyer.

These are the challenges with the current approaches:

·        Endpoint protection – This will not work because most devices cannot host an agent.

·        Firmware updates – Many IoT devices do not have a simple method for automated firmware updates.

·        Network security or firewall – These types of security products typically only see traffic at the perimeter of the network. But IoT devices are almost always located at the access layer, so network security systems do not see the traffic or the behaviour of IoT devices.

·        Network Access Control – NAC systems are not designed to monitor the behaviour of IoT devices.

5 things an IoT security solution must do

To be effective, an IoT security solution needs to be able to find a device in question, understand its behaviour, and proactively take action to protect the organisation.

An IoT security solution needs:

1.  An agentless option: You cannot put an agent on most IoT devices. Smart TVs, watches, projectors, printers, HVAC and even medical devices were not designed for an agent. And you cannot put an agent on every smartphone, tablet or device coming into your organisation. An agentless solution is critical because it is the only way to protect against attacks targeted at these devices.

2.      See the devices: In Armis’ IoT Security Assessment, they found that organisations are not aware of 40% of the devices in their environment. Devices that are off the approved or managed networks, but connected to a rogue or shadow network, are invisible. This means these rogue networks are unstoppable via current network access controls. To be effective, an IoT security solution needs to see devices that may be ‘off’ the approved or managed network.

3.  Identify and track the devices: Businesses must have deep insight into the devices, (managed or unmanaged), in and around their environment. It is important to be able to:

·        Profile and fingerprint any device

·        Determine the state of that device:

o   Attack surface posture

o   PCI/HIPAA compliance

o   Jailbroken status

o   Vulnerability history

o   Number of wireless protocols

o   User authentication

o   Manufacturer reputation

·        Track the device behaviour and connections

·        Provide historical record of the device behaviour

·        Associate devices with approved users.

4.      Control the connections: When addressing an IoT security blind spot, visibility is critical. But visibility alone is not enough. Businesses need to take action, and disconnect questionable devices:

·        Stop corporate devices from connecting to unmanaged, unapproved, or rogue networks

·        Stop unmanaged or compromised devices from connecting to corporate or approved networks

·        Reduce security admin workload by setting up policies for notification for critical alerts.

You should be able to manually stop a device from connecting, as well as automatically disconnect devices and networks, in accordance with policies. Lastly, the solution should compile data and learn from devices and their interactions.

5.      Frictionless integration: No solution can help you if it is too complex or slow to deploy. So it is critical that an IoT security solution integrate in a fast and frictionless manner with your current infrastructure and environment. There are two components to consider:

·        It should integrate with and leverage your existing networking solutions. This brings extended visibility and control across your existing environment.

·        It should integrate with your existing security solutions; such as firewall solutions.

“Now is the time for businesses and security professionals to include IoT security as a part of their comprehensive cyber-security strategy. Compliance and internal audits are identifying IoT devices as a point of vulnerability. Businesses need to be able to see and control any IoT devices in their environment. The IoT age can deliver on the promise of efficiency and better insights – but only if it is safe. Chat to Duxbury about applying an agentless Armis solution that will address the new threat landscape,” says Kannemeyer.

Developing a Robust Understanding of Cyber Maturity
Over the past few years a pattern has emerged in the type of events that organisations were consistently more worried about or interested in terms of ...