IoT Security by Design
Adnan RajaAdnan Raja
More and more, we're filling out homes with “smart” / connected devices beyond old school computers, from thermostats to security systems to kitchen appliances. Enterprises are bringing a whole range of processes, objects and spaces online to amplify human potential as well. The Internet of Things (IoT) has enormous potential, but connecting everything has a side effect: increased vulnerability.
We must consider the fundamentals of IoT cybersecurity to protect ourselves personally and professionally. Top concerns are best practices, the concept of "security by design" and device security certification programs.
Key steps to securing IoT devices include the following best practices:
Beyond knowing a few steps you can take with devices, it helps to choose a manufacturer that follows security by design. Security by design is a set of principles within hardware and software development focused on securing the system and reducing the risk of a compromise. Following these principles allows a manufacturer to know that they are protecting users and complying with the European Union's General Data Protection Regulation (GDPR). Systems built using this method incorporate elements such as abiding by coding best practices, implementing authentication protections and deploying continuous testing.
The key reason that secure by design is so important is that software is typically considered first and foremost in terms of its function. Security becomes a secondary concern, and the developers must address security holes and vulnerabilities as an ongoing concern rather than building it with optimized security. With secure by design, you can be certain that the manufacturer is fixing security issues effectively and rapidly.
Security by design incorporates the following principles:
Privacy by design, a concept within the GDPR, is similar to security by design. The two core elements of privacy by design are:
While the principles of secure by design are helpful in understanding what to expect from device manufacturers, everything becomes simpler when you can just look for certifications that those principles are followed. ThingsCon and Mozilla came up with the Trustable Technology Mark, centered specifically on security and privacy. The analysts at ThingsCon use five chief criteria to gauge products:
Another certification project, the Cybersecurity Certification Program, comes from Ericsson and AT&T. That system gathers information on IoT threats and sends it to device manufacturers, allowing those companies and their developers to quickly adapt and fix any vulnerabilities.
By 2025, the Internet of Things will have an economic impact of $3.9 trillion to $11.1 trillion per year, per McKinsey. However, that huge reward is linked to a huge risk. By considering the above best practices, and by understanding security by design and certification programs, you can better know how to move forward securely with IoT projects and device purchases.
The Most Comprehensive IoT Newsletter for Enterprises
Showcasing the highest-quality content, resources, news, and insights from the world of the Internet of Things. Subscribe to remain informed and up-to-date.
New Podcast Episode
Recent Articles