Why Now is the Time to Harden Your IoT Network Security

2023-01-31 22:35:31
关注

Why Now is the Time to Harden Your IoT Network Security
Illustration: © IoT For All

Until a few years ago, organizations lacked real-time data insights about the status of their people, places, and processes. Now this information, if not indispensable, is increasingly desirable to well-managed organizations. With IoT deployment topping 300 billion units worldwide, organizations have gained an effective and productive way to manage areas such as energy, logistics, physical security, health, and the environment.

These changes became possible with the mass deployment of communicating sensors, which enable organizations to predict and quicken responses to issues impacting food and pharmaceutical safety, supply chain efficiency, environmental and climate hazards, and property protection.

Connectivity breakthroughs, including narrow-band IoT (NB-IoT) and low-power wide area networks (LP-WAN), coupled with messaging protocols like lightweight M2M (LWM2M), have slashed the costs of transmitting data and offered low-cost hardware options while extending the life of batteries and other components.

Since the term “Internet of Things” was coined by Kevin Ashton back in 1999, enterprises have learned that, while inexpensive, low-power sensors are essential building blocks, and the network that safely transports the data is the most under-appreciated aspect of a successful deployment. In 2023, we expect to see deeper investments by carriers and enterprise customers in security prevention — a set of make-or-break actions that help enterprises avoid unwelcome headlines.

“In 2023, we expect to see deeper investments by carriers and enterprise customers in security prevention — a set of make-or-break actions that help enterprises avoid unwelcome headlines.”

-Vodafone

Secure By Design

A well-planned IoT security strategy enables organizations to prepare for and manage both known and unknown threats. Today security professionals express growing interest in a Zero Trust strategy known as Secure Access Service Edge (SASE), which provides secure cloud-based access to systems from anywhere. Gartner projects that by 2024, at least 40 percent of organizations will have an official SASE adoption strategy.

SASE principles inform a “secure by design” network framework, heightening security prevention and reducing the risk of data loss. In practice, a core network should include high-resilience web application firewall (WAF) solutions such as GTP Firewalls to ensure that all traffic comes from verified sources.

Secure by design also includes active and intelligent monitoring. Typically, a Security Operations Center (SOC) team will proactively monitor and scan IoT networks in real-time to quell operational threats. A strong security prevention program also includes an Information Security Management System (ISMS), a programmatic way of establishing a cybersecurity baseline and physical controls to protect operational information. For example, many firms deploy end-to-end identity management capabilities such as multi-factor authentication with renewable credentials to manage user access.

Hardening IoT Devices

Hardening IoT devices requires a series of steps and investments that can significantly improve data transmission and security. First, IoT analytics are increasingly deployed to preemptively identify issues picked up by IoT sensors in the field. Machine Learning yields insights about the device’s behavior and health and enables operational teams to discover potential anomalies and improve their real-time decision-making.

Second, authentication methods such as SIM Trust, or Digital Asset Broker (DAB), enable firms to implement a Zero Trust approach to IoT device management. For example, with DAB, an IoT device is assigned a unique digital identity to communicate and transact securely with other devices. This technique can apply to wallet and payment technology secured by the mobile SIM. These methods form a root of trust for even the smallest, lightweight IoT devices.

Third, integrated SIM, better known as iSIM, simplifies deployment and reduces the cost of connecting devices in the field. Until recently, an iSIM deployment included a baseband radio and a processor with a SIM to authenticate to a secured network. Today, a system on a chip, called a SOC, performs all of these functions in a deployment-friendly package. In fact, iSIMs can be deployed on smart labels for tracking valuable shipments.

Fourth, Over-the-air (OTA) hardening is an efficient, wireless way to distribute an application, configuration, or firmware update to IoT devices. Firms that update IoT devices with USB sticks know that this process won’t scale. Given the explosive growth of IoT, manual updates and patches must be automated whenever possible.

Next Steps

In an age of explosive growth in IoT, AI, and automation technologies, network security practices must scale to meet complex and evolving challenges. Zero Trust risk mitigation policies dictate that every IoT device must be authenticated, no matter where it is located—or where it is going. Firms know that while there are endless ways to deploy IoT devices, an improperly secured IoT deployment is a surefire way to undermine all promising business benefits.

Establishing a secure-by-design IoT network requires firms to deepen their commitment to security prevention, adopt robust security principles and standards, and bake privacy controls into the network’s inception and design. Companies can confidently make these investments knowing that a secure-by-design IoT network can sustain key business processes and deliver exceptional business outcomes.

Tweet

Share

Share

Email

  • Remote Management
  • Security
  • iSIM
  • IT and Security
  • Network and Protocols

  • Remote Management
  • Security
  • iSIM
  • IT and Security
  • Network and Protocols

参考译文
为什么现在是时候加强您的物联网网络安全
插图:© IoT For All → 在几年前,企业缺乏对其人员、场所和流程状态的实时数据洞察。如今,这些信息虽非不可或缺,却日益受到管理良好的企业的重视。随着全球物联网设备部署数量突破300亿台,企业获得了一种高效且富有成效的方式,用于管理能源、物流、实体安全、健康和环境等领域。这种改变的实现得益于通信传感器的大规模部署,使企业能够预测并加快对影响食品和药品安全、供应链效率、环境和气候风险以及资产保护等问题的响应。连接技术的突破,包括窄带物联网(NB-IoT)和低功耗广域网(LP-WAN),以及诸如轻量级M2M(LWM2M)之类的消息传输协议,大幅降低了数据传输的成本,提供了低成本硬件选项,同时也延长了电池及其他组件的使用寿命。自1999年凯文·艾希顿(Kevin Ashton)首次提出“物联网”这一术语以来,企业已经认识到,虽然低成本、低功耗传感器是关键组成部分,但安全地传输数据的网络却是成功部署中最被忽视的方面。我们预计在2023年,运营商和企业客户将在安全防护方面进行更深入的投资——这些决定成败的举措有助于企业避免负面新闻的困扰。“我们预计在2023年,运营商和企业客户将在安全防护方面进行更深入的投资——这些决定成败的举措有助于企业避免负面新闻的困扰。”– Vodafone Secure By Design 一个周密的物联网安全策略使企业能够准备应对并管理已知和未知的威胁。如今,安全专家对一种称为“安全接入服务边缘”(SASE)的零信任安全策略表现出日益浓厚的兴趣,该策略能够从任何地方提供安全的云访问。Gartner预测,到2024年,至少40%的企业将拥有正式的SASE采用策略。SASE原则构成“设计即安全”网络框架的基础,提升了安全防护能力,降低了数据丢失的风险。在实践中,核心网络应包括高弹性网络应用防火墙(WAF)解决方案,如GTP防火墙,以确保所有流量均来自验证过的来源。“设计即安全”还包括主动智能监控。通常,一个安全运营中心(SOC)团队将主动实时监控和扫描物联网网络,以应对运营威胁。一个强有力的安全防护计划还包括信息安全管理体系(ISMS),这是一种建立网络安全基线和物理控制的程序化方法,以保护运营信息。例如,许多公司部署端到端的身份管理能力,如可再生凭证的多因素认证,以管理用户访问。 加固物联网设备 加固物联网设备需要一系列步骤和投资,可以显著提高数据传输和安全性。首先,物联网分析正被越来越多地用于主动识别物联网现场传感器发现的问题。机器学习能提供有关设备行为和健康状况的洞察,使运营团队能够发现潜在异常并改进实时决策。其次,诸如SIM Trust或数字资产代理(DAB)等认证方式,使企业能够实施物联网设备管理的零信任方法。例如,使用DAB,物联网设备将被分配一个唯一的数字身份,以安全地与其它设备通信和交易。该方法可用于通过移动SIM卡保护的钱包和支付技术。这些方法构成了即使是小型轻量级物联网设备的安全基础。第三,集成式SIM卡,即iSIM,简化了部署并降低了现场设备连接成本。直至最近,iSIM部署包括基带无线电和带SIM卡的处理器,以进行网络认证。如今,一种称为系统芯片(SOC)的单芯片系统以易于部署的封装方式实现了所有这些功能。实际上,iSIM可以部署在智能标签上,用于追踪高价值货物。第四,空中升级(OTA)加固是一种高效且无线的方式,用于向物联网设备分发应用程序、配置或固件更新。那些依赖U盘更新物联网设备的企业深知,这种方法无法扩展。鉴于物联网的爆炸式增长,手动更新和补丁必须尽可能自动化。 下一步 在物联网、人工智能和自动化技术迅猛发展的时代,网络安全实践必须扩展以应对日益复杂和不断演变的挑战。零信任风险缓解政策规定,无论物联网设备位于何处,或其将前往何地,每台设备都必须进行身份认证。企业深知,虽然物联网设备的部署方式多种多样,但部署不当的物联网系统无疑是损害所有潜在商业优势的关键因素。建立一个“设计即安全”的物联网网络要求企业加深对安全防护的承诺,采用坚实的安全原则和标准,并在网络的初始设计阶段就嵌入隐私控制。企业可以充满信心地进行这些投资,因为他们知道,“设计即安全”的物联网网络能够支持关键业务流程,并实现卓越的商业成果。 推文分享邮箱 远程管理 安全 iSIM 与安全 网络与协议 → 远程管理 安全 iSIM 与安全 网络与协议
您觉得本篇内容如何
评分

评论

您需要登录才可以回复|注册

提交评论

广告
提取码
复制提取码
点击跳转至百度网盘