Ciberseguridad IoT Industrial - 1550147684
Ciberseguridad IoT Industrial - 1550147684
Ciberseguridad IoT Industrial - 1550147684
Industrial IoT
By Ray Bernard
1
Sustainable Cybersecurity for IoT
The first IoT devices had important but limited capabilities. As embedded computing and networking
technologies advanced, many tech trends – such as low power, miniaturization, massive increases in
computer and memory chip density, digitalization, virtualization, and network capacity growth – turned
small simple devices into intelligent high-powered networked computers. A perfect example is the
rotary-dial analog telephone vs. the smartphone you carry with you.
Thus, today’s intelligent industrial IoT devices are high-value hacker targets. Cybersecurity was not built
into most of these devices, and many that did have security controls were still found to be vulnerable to
certain kinds of cyberattacks. Many IoT devices were originally analog devices that were converted for
Ethernet network use before the Internet or in its early days. There were no cybersecurity concerns at
that time about industrial devices. Over time, IoT devices were enhanced as computing technology and
networking advanced, before today’s cybersecurity threat evolved to their current levels.
In recent years both industry and customer thinking about these devices has not kept pace with their
technology advances and increasing vulnerabilities. That thinking must change significantly for these
devices to be used safely without a high potential for catastrophic consequences to owners of the IoT
devices.
The use of IoT technologies have undergone explosive growth in recent years. Estimates now place the
number of connected IoT devices at more than 23 billion, three times the number of people on Earth. 1
Thus, it should be no surprise that the past two years have seen an unprecedented increase in the number,
scale and type of cyberattacks against these devices. Not only is there a rise in the number of cyberattacks
– the sophistication of the attacks is also increasing.
Many intelligent industrial IoT devices can be weaponized by malware and used to attack other targets.
Because IoT devices operate on their own without continual user interface, they can be hijacked without
their owners knowing about it. Any network-connected device is a potential target for outsider or insider
threats and must have appropriate cybersecurity measures put into place.
1
Sam Lucero, “IoT Platforms: enabling the Internet of Things.” IHS Technology Whitepaper. IHS Markit, March
2016, https://cdn.ihs.com/www/pdf/enabling-IOT.pdf.
2
Sustainable Cybersecurity for IoT
Although industrial IoT devices are hard to secure for many reasons,
their cyber risks can be significantly reduced through proper tools, Successful practices in IT
attention and action. This should be a very high priority for owners infrastructure protection
of industrial IoT devices and systems, not just something that’s given
can and must be applied
lip service. The way that industrial IoT devices are deployed and
managed must change to follow the practices that have proven to industrial IoT devices.
successful for the cybersecurity protection of IT infrastructure.
Traditional computers, such as servers, workstations, desktop computers and laptops can be managed
and protected using existing IT security practices and tools. This is also true for the standard networks
that IP-addressable IoT devices communicate on.
Most companies who own and use industrial IoT devices aren’t aware that they must be managed much
differently than other industrial devices in order to achieve effective cybersecurity. Securing device
networks alone is insufficient.
No one in IT or corporate management would think it okay to put hundreds or even just dozens of server
computers around a building campus and network them together, placing some in lobbies, meeting
rooms, and even outside the buildings, and not keep their firmware updated or closely manage their
passwords. Yet this is common practice with network security cameras. In 2016, camera and recorder
cybersecurity vulnerabilities allowed 1.5 million connected cameras and recorders (DVRs, NVRs and
recording servers) to be hijacked to create the world’s largest Mirai botnet.2 The malware took full control
of IoT devices’ underlying Linux operating systems.
2
Lorenzo Fenceschi-Biccheria, “How 1.5 Million Connected Cameras Were Hijacked to Make an Unprecedented
Botnet.” Motherboard.com, 29 September 2016, https://motherboard.vice.com/en_us/article/8q8dab/15-million-
connected-cameras-ddos-botnet-brian-krebs
3
Sustainable Cybersecurity for IoT
From a legal perspective, these types of government actions, combined with media coverage of major
cybersecurity incidents, are establishing a de facto standard of care regarding security for the deployment
of both consumer and industrial IoT devices. More is said regarding the impacts of cyber risks on insurance
in the section titled, Compliance-Based Device Management, which starts page 11.
There are also privacy considerations that relate to information collected by IoT devices, and to any such
information disclosure breaches that result from unauthorized access to devices. The first GDPR fine
issued by Austria was to an entrepreneur who installed a security video camera whose field of view
included a substantial section of a sidewalk. The fine was 4,800 Euros (about $5,500).5
3
Department for Digital, Culture, Media & Sport, “Code of Practice for Consumer IoT Security.” GOV.UK,
14 October 2018, https://www.gov.uk/government/publications/secure-by-design
4
Katie Malfronte, “California Bans Default Passwords for All IoT Devices.” CampusSafetyMagazine.com,
11 October 2018, https://www.campussafetymagazine.com/technology/california-bans-default-passwords-iot-
devices/
5
Baker McKenzie, “Takeaways from the First GDPR Fines.” Globe Business Media Group, 18 December 2018,
https://www.lexology.com/library/detail.aspx?g=a91ba97a-eae9-408c-a53f-c47d1c6d62ea
4
Sustainable Cybersecurity for IoT
From several perspectives within the past few years, sustainable cybersecurity protection of IoT devices
has become critically important for industrial IoT device owners and service providers.
The key vulnerabilities of video cameras and other intelligent IoT devices fall primarily into two categories:
• Password vulnerabilities
• Firmware vulnerabilities
Addressing these two categories of vulnerabilities will stop most attacks from being successful, especially
automated malware attacks. It is not just networked security camera surveillance systems that are
impacted. Major cities are now using intelligent video cameras in automated traffic management systems.
These deployments are examples of non-security video applications whose cybersecurity is even more
critical than for video surveillance systems.
6
Ray Bernard, “Big Data and Privacy for Physical Security.” Security Industry Association, 14 November 2017,
https://www.securityindustry.org/2017/11/14/big-data-and-privacy-for-physical-security/
7
Christy Pettey, “The IoT Effect: Opportunities and Challenges.” Gartner, 28 March 2017,
https://www.gartner.com/smarterwithgartner/the-iot-effect-opportunities-and-challenges-2/
5
Sustainable Cybersecurity for IoT
and manual cyber-attacks succeed through the existence of factory-default passwords, easily-guessed
passwords, passwords discovered because they were transmitted in plain text, and weaknesses that allow
device and system access privileges to be escalated.
Intelligent IoT device password management can be complicated. Unlike PCs, smartphones and tablets, a
one-person to one-device owner relationship does not exist for industrial IoT devices. Industrial IoT
devices are typically part of a system with hundreds or thousands of connected devices. IoT devices are
typically in constant use by other devices, systems and software. Humans rarely access IoT devices
directly, such as for installation or service tasks.
The password situation is further complicated when personnel from the owning organization don’t
manage the IoT passwords themselves but delegate the management to service contractors. Since most
industrial systems have a lifecycle measured in years, such password knowledge becomes a risk when
service personnel change, some of whom may be disgruntled.
The password risk picture becomes even more complicated when contractor service personnel use their
own “favorite” device passwords on the devices of more than one customer. This means that the
personnel of a second customer of that same service provider – using the same type of IoT devices, may
then obtain knowledge of the first customer’s passwords. A competitor’s personnel can have the
passwords to an organization’s IoT devices.
Furthermore, a successful hack or malware infection of any of that service technician’s customers would
then give the attacker the device passwords of the technician’s other customers. It a worse scenario if a
technician habitually leaves default device passwords in place, as the devices of all customers will be
vulnerable to just about any malware or hacker that gains access to those customers’ networks.
Such tools don’t exist for most IoT devices. They are only now emerging for security video cameras, even
though for over a decade, large enterprises have had security camera deployments with camera counts
in the thousands. It is an industry shortcoming that is just now being remedied.
6
Sustainable Cybersecurity for IoT
control over password management and provide auditable records of conformance to password
management policies.
Managing firmware can be complicated due to version-dependencies of other device or system firmware
or software. This is very true for networked video cameras. Version compatibility must be maintained with
video management software’s server applications, video analytics applications running on the camera,
and video analytics software running on an analytics appliance or server. There are typically two or three
such dependencies involved per make and model of camera. Because cameras, as well as the applications
and systems that use them, are all evolving technologies these dependencies will remain for the
foreseeable future.
This means that camera owners, or their service providers, must establish and maintain a capability to
test device firmware before deploying it. Organizations with high-camera-count deployments typically
maintain a lab environment with systems and devices whose configurations match their deployed
7
Sustainable Cybersecurity for IoT
counterparts. Smaller organizations typically test selected deployed devices one at a time, which can
usually be done with security video systems. For cameras deployed in 24-hour production environments
where cameras are required for business reasons – such as a high-speed food or drug production line
where video records of each item and its label are critical for quality assurance and compliance reasons –
production-area cameras cannot be used for firmware compatibility testing.
Due to the large number of camera industry makes and models, video software manufacturers may not
be able to test the firmware for all customer cameras in a time frame that is acceptable to customers. This
is sometimes the case with infrared cameras or with cameras where the firmware update only relates to
a feature that doesn’t directly involve the software functionality, such as the camera’s low-light capability.
Sometimes the configuration of new firmware features requires a special video software development
cycle for that feature. Testing of the camera firmware compatibility may be scheduled for after the
software update is completed. Yet customers may want to perform an update sooner per their
cybersecurity policy. This is another reason to be prepared for in-house camera firmware testing.
As part of overall device lifecycle management, for each make and model of IoT device, firmware profiles
must be defined for each proven-successful combination of camera firmware and related product
firmware/software version dependencies. These form the basis of the overall update plan to be followed.
Example data to be collected include:
8
Sustainable Cybersecurity for IoT
How to best organize the data depends upon the type and amount of data to be collected. The update
plan – which can be as simple as a one-page outline – should specify which products, if any, must be
updated to which versions before the camera firmware updates can be performed.
According to service providers for large camera-count deployments, when such a procedure is followed,
1% to 2% of the cameras cannot be updated due to camera error conditions or firmware update failures.
However, if steps 4 and 5 are not followed, between 10% and 20% of camera firmware updates could
fail, depending upon the makes and models of cameras.
This procedure takes 10 to 15 minutes per camera by a skilled technician familiar with the devices and
applications involved, when performed nonstop as a single-focus day-long task, providing that the
camera inventory is complete and accurate, and that camera firmware profiles have been fully
established in advance. It starts out taking twice as long for sysadmin staff unfamiliar with the devices
and applications, but eventually the non-professional staff can sustainably perform the task in 15 to 20
minutes per camera non-stop if closely supervised.
9
Sustainable Cybersecurity for IoT
• Give IoT device owners full control over device passwords, with auditable delegation of limited
password responsibility to service providers
• Safely and automatically check for factory default and commonly-used passwords that can be
found exist on newly deployed and some updated cameras.
• Reduce the costs for cybersecurity implementation.
• Reduce the staff time involved in password and management by 95%, from many months to just
days.
• To make currently infeasible IoT device cybersecurity highly effective and easily sustainable.
For some insight into this picture, let’s examine the costs and staff time aspects of updating firmware for
2,000 cameras – well over a $1 million technology infrastructure investment. We’ll use the best-case
cost and performance figures in Figure 1 below.
Figure 1. Cost and Staff Time to Manually Update Firmware for 2,000 Cameras
Cost Factor Value
Number of Cameras 2,000
Task Hours Per Workday 6.5
Hourly Contractor Technician or Fully
$75
Burdened Employee Daily Labor Cost
Daily Contractor or Fully Burdened
$600
Employee Daily Labor Cost
Per-Camera Update Time 10 minutes
Cameras Updated per Hour 6
Cameras Updated per Workday 39
Labor Cost to Update Cameras Once $30,780
Per-Camera Labor Cost $15.38
51.3 Workdays in
Staff-Days to Update Cameras Once
2-1/2 Calendar Months
Add to the above labor cost the cost of supervision, and the cost to manually generate audit reports
from the camera update work record logs and inventory. The manual approach of course results in an
unverified audit, as there is no record of firmware update mistakes and no validation of the device
inventory used. Furthermore, the total cost to perform three update cycles and generate at least one
audit report would exceed $90,000 and take eight calendar months.
In reality the costs would be higher than in the above chart, as the chart represents an ideal non-stop
high work performance scenario doesn’t typically occur for boring human repetitive tasks, even when
closely supervised. Jobs of that type typically also have a high turnover rate, involving personnel
onboarding and training, further adding to the costs and calendar time for the work.
In contrast, using an automated tool would cost less and would provide 100% accurate audit reports
based on electronically verified device states. Most importantly, the staff time required would be five
workdays or less per update, not fifty days or more.
Automated and electronically verified processes and procedures are performed exactly as defined per
proscribed practices in full compliance with all requirements.
10
Sustainable Cybersecurity for IoT
The NIST Cybersecurity Framework and the CIS Controls are two popular and highly-effective self-
protection frameworks. Infrastructure asset management, strong password management, and using
automation to assure compliance to the selected cybersecurity policies and practices are elements of
both frameworks. Having these elements in place can be expected to help reduce the cost of
cybersecurity insurance premiums, which some companies negotiate annually.
IoT device infrastructure has been excluded from the scope of IT cybersecurity in the past because the
devices and systems were separate from corporate business networks considered to be unlikely targets
for attacks. Today, however, camera video systems are now connected to business networks because
the provide value to business and facility operations, with the most publicized business applications
being retail video analytics and point-of-sale security applications. Unprotected IoT devices and
networks are a high cybersecurity risk, and recent high-profile business cyber losses via IoT devices9
means they need to be managed in accordance with standard corporate IT infrastructure management
and security compliance programs.
Comprehensive IoT device firmware profiles as described on page 8 establish an auditable security
baseline that enables IT to include IoT systems and devices in its cybersecurity management and
reporting activities.
For details of how IT cybersecurity practices and frameworks such as the CIS Controls apply to intelligent
IoT device deployment, as well as how purpose-built monitoring and service assurance tools for IoT
devices and systems differ from standard IT tools, see the Viakoo online white paper titled, “Video
System Cyber and Performance Assurance”.
8
Cybersecurity and Infrastructure Security Agency (CISA), “Cybersecurity Insurance.” CISA, 26 November 2018,
https://www.dhs.gov/cisa/cybersecurity-insurance
9
Brian Krebs, “Target Hackers Boke in Via HVAC Company.” KrebsOnSecurity.com, 5 February 2014,
https://krebsonsecurity.com/2014/02/target-hackers-broke-in-via-hvac-company/
11
Sustainable Cybersecurity for IoT
Now that automated tools are emerging for intelligent IoT device management, organizations can finally
secure their industrial IoT infrastructure to the standards they have set for the rest of the organization’s
critical technology.
He is also the Convergence Editor for Security Technology Executive magazine, for which he writes the
monthly “Convergence Q&A” column as well as a highly-regarded articles about the Convergence of
Physical Security and IT. He is a regular contributor to Security Business magazine (formerly Security
Dealer & Integrator). He also writes the Real Words or Buzzwords? bi-weekly article series for
SecurityInfoWatch.com.
Ray was recently named as one of the IFSEC Top 50 Fire and Security Global Influencers for 2018, #12 in
the Security Thought Leadership category. Ray was named one of security’s Top 10 Movers and Shakers
of 2006 by Security Technology & Design magazine.
Ray has recently authored the book, Security Technology Convergence Insights, published by Elsevier
and available on Amazon and elsewhere. He is a contributing author to the Encyclopedia of Security
Management, Second Edition, covering the topics “The Convergence of Physical Security and IT”,
“Access Control Levels”, and “Authentication, Authorization and Cryptography.”
Ray is a Physical Security Professional (PSP) , a designation awarded by ASIS International, of which Ray
is an active member. Ray is a member of and participates in the educational committees of the Physical
Security Council, the IT Security Council, and the Security Applied Sciences Council.
12