-IoT-Security-Best-Practices-Document
-IoT-Security-Best-Practices-Document
-IoT-Security-Best-Practices-Document
BEST PRACTICES
Table of Contents
IoT S E C U R I T Y 02
The Internet of Things (IoT) is a network of interconnected computing
devices, mechanical and digital tools, products, animals, or humans
with unique IDs and has the capacity to transfer data without needing
human-to-human or human-to-computer contact. As these devices
range in complexity from common household items to sophisticated
industrial instruments, experts have predicted that by 2025, there will
be 22 billion linked IoT devices, up from more than 10 billion currently.
With the help of the Internet of things, people may lead smarter lives,
make better decisions, and exert total control over their surroundings.
IoT is critical to business in addition to providing connected devices
to automate homes. It gives firms a real-time view of how their
systems work, providing insights into everything from machine
performance to supply chain and logistic support operations.
IoT S E C U R I T Y 03
IoT security encompasses both physical device and network security,
and it affects the mechanisms, technological advances, and
measures required to protect IoT systems and sensors. It includes
WHAT IS I oT SECURITY? industrial equipment, intelligent utility layouts, building automation
systems, media devices, and other devices that aren't always built for
network security.
IoT S E C U R I T Y 04
There are sectors where IoT security is critical. Because of the
extended attack surface of dangers that have already plagued
Threats involved:
Vulnerabilities
Vulnerabilities regularly confront consumers and companies with
significant challenges. Several significant reasons IoT applications
are insecure is that they lack the processing power necessary for
security. Another factor contributing to widespread vulnerabilities is a
restricted budget for designing and testing safe firmware, determined
by device prices and development cycles.
Malware
Malware can infect IoT devices despite their minimal computer
capacity. This has been a popular tactic among cyber criminals in
recent years. And they're both flexible and beneficial for hackers; IoT
botnet malware is one of the most commonly seen kinds.
Connected devices
Connected devices like all the rest involving the internet, it enhances
the likelihood of online exposure. These gadgets may unwittingly store
and target sensitive technology and confidential/personal
information.
Weak Authentication
Weak Authentication IoT equipment (like home routers) is frequently
released with simply discoverable credentials, that both suppliers and
end users are free to leave in place. Such appliances are easy
targets for attackers using automated scripts for mass exploitation
when left accessible to remote access.
IoT S E C U R I T Y 05
Lack of awareness
Individuals are often more aware of the importance of virus scans, as well as the
importance of avoiding reading spam emails. However, because the Internet of Things
is a relatively new technology, many people are confused about its principles and
capabilities. As a result, IoT devices can represent major security concerns to
manufacturers, users, and businesses. Hackers attack both people and devices. Some
people have just rudimentary knowledge of electronics.
Weak Interfaces
Weak Interfaces data is processed and sent by every IoT device. Applications,
resources, and standards are required for communication, and unsecured interfaces
are the source of many IoT security updates. Weak device validation and weak or no
encryption are two of the most common interface issues.
Untrustworthy connection
Many IoT devices communicate with the network without encryption. Currently, it is one
of the most severe IoT security issues that exists.
Connected Cars
Connected cars in addition to house invasion the IoT also poses a threat to your
automobile. With the aid of linked IoT devices, smart automobiles are on their way to
becoming a reality. However, because of its IoT connection, it has a greater danger of
auto theft.
At the same time, there have been several instances of IoT systems being hacked due
to cybercriminals successfully searching for IoT security weaknesses. Industrial robots,
as well as the equipment attached to them, have been hacked in some cases. This is
because hackers can change control-loop settings, interfere with production
algorithms, and change the machine's status, among other things. This is why it is
critical to secure IoT devices to avoid being a victim of cybercrime.
IoT S E C U R I T Y 06
The OWASP Internet of Things Project was started in 2014 as a way to
OWASP I oT SECURITY PROJECT help Developers, Consumers, Manufacturers, and Enterprises to make
better decisions regarding the creation and use of IoT systems. IoT
Top 10 represents the top ten things to avoid when building,
deploying, or managing IoT systems in terms of security. This is a
unified list that captures the top things to avoid when dealing with IoT
Security instead of separate lists for risks vs. threats vs. vulnerabilities
—or developers vs. enterprises vs. consumers.
OWASP published its Top 10 List in 2018, and below are the
top 10 Vulnerabilities identified.
IoT S E C U R I T Y 07
7. Insecure Data Transfer and Storage
Inadequate encryption or access control for sensitive data anywhere in the ecosystem,
including one at rest, in transit, and during processing.
Ability to continue
Administrative Interface
sending
Account Device Web Interface
authentication
Lockout Cloud Interface
attempts after 3 - 5
Mobile Application
failed login attempts.
IoT S E C U R I T Y 08
Vulnerability Attack Surface Summary
Network services are
not properly encrypted
Unencrypted to prevent
Device Network Services
Services eavesdropping or
tampering by
attackers.
Lack of two-factor
Administrative Interface authentication
Two-factor
Cloud Web Interface mechanisms such as
Authentication
Mobile Application a security token or
fingerprint scanner.
Encryption is
implemented
Poorly however it is
Implemented Device Network Services improperly configured
Encryption or is not being
properly updated, e.g.
using SSL v2.
Updates are
Update Sent transmitted over the
Without Update Mechanism network without using
Encryption TLS or encrypting the
update file itself.
Service can be
attacked in a way
Denial of
Device Network Services that denies service to
Service
that service or the
entire device.
Ability to physically
Removal of
Device Physical Interfaces remove the storage
Storage Media
media from the device.
IoT S E C U R I T Y 09
Vulnerability Attack Surface Summary
No ability to manually
No Manual
force an update check for
Update Update Mechanism
the device.
Mechanism
IoT S E C U R I T Y 10
Vulnerability Attack Surface Summary
Source: https://wiki.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Vulnerabilities
IoT S E C U R I T Y 11
A successful IoT security plan must include the security controls that
NEED FOR BEST PRACTICES AND BEST must be installed, as well as how they will be monitored and revised
over time. To guarantee that the overall premises are safe against IoT
threats, it must also provide in-depth insight into the organization's IT
infrastructure and endpoints.
PRACTICES FOR SECURING IoT
Best practices for IoT security include:
IoT Endpoint Protection
IoT Gateway Security
Security Cloud API
Developing Secure Network
Up-to-date Data Encryption
Protected Data Storage
Update to Identity-level protocol
Implement Patching and Remediation
IoT S E C U R I T Y 12
5.1.2 Store credentials and security-sensitive data securely
Any credentials that are saved within services must be kept safe. Credentials that are
hard-coded in software are not allowed.
IoT S E C U R I T Y 13
5.1.9 Ensure the protection of personal data
When services or devices process personal data, they must comply with applicable
data protection legislation, such as the General Data Protection Regulation (GDPR)
and the Data Protection Act 2018. For each device and service, device makers and IoT
service providers must offer users open and unambiguous information about how their
data is utilized, by whom, and for what objectives. This includes any other parties that
could be involved. When personal data is handled with consumers' consent, it must be
collected in a legal and authorized manner, with those consumers having the right to
withdraw their consent at any time. Suppose a mechanism like Blockchain is used for
data collection, where it is not possible to erase the data permanently due to the
inherent nature of the design of such systems. In that case, the consumers must be
made aware of the situation before getting their permission so that they are well
informed about the consequences of their data on external systems.
IoT S E C U R I T Y 14
5.2 Industrial IoT Security Best Practices
IoT S E C U R I T Y 15
5.2.5 Have an emergency response team in place
Establishing an emergency response agency, formulating an emergency response
strategy, and establishing human resource measures such as an expert resource pool
and a supporting manufacturer's resource pool are all things that businesses must do.
Similarly, emergency drills must be conducted regularly so that all key partners know
what to do in the case of an emergency.
The best IoT security results are embedded in cloud security. Integrating cloud security
in IoT provides a foundation for managing security provisions and offers intrinsic
security practices.
Following are the best practices for ensuring IoT Cloud security:
To access a network shared by office PCs and IIoT equipment, the attacker can use
phishing emails or malware to deceive employees. A possible concern is that
attackers might use other devices on the network to obtain access to industrial
settings. In the network, IIoT systems must be properly isolated. As a result, devices and
sensors that control pumps, valves, or any other SCADA system component should
always be connected to a separate network from the rest of the IT infrastructure.
IoT S E C U R I T Y 16
5.3.2 Updating passwords on Cloud-based devices at regular
intervals
There is a high chance of attackers accessing the intelligent devices stored on the
cloud and retrieving the password. Henceforth, the best idea is to not only secure the
password by changing it often but also set up a two-factor authentication mechanism
as an extra line of defence strategy. This can be done by combining the secret
key(password) with a one-time code transferred via a secondary mode of channel
line (mobile text message) or via any token generator application.
References:
You can consult the IoT Security Guidelines book, produced by CCoE, for further details on various security elements,
guidelines, and their security standards.
IoT S E C U R I T Y 17