August 01, 2018
Top 8 To-Dos for IoT Security
Written by
TrustedSec
IoT Security Assessment
Security Testing & Analysis
Let's say you run an operational environment and you've spent years figuring out how to keep your production processes and core, life-enabling systems running at high efficiency and efficacy. But now, your IT group wants to connect your production and control systems to outside networks as part of new “IoT” (Internet of Things) initiatives.
You certainly understand the upside of making the change: better process visibility, potential process downtime reduction, and cost savings on maintenance and field service. But does the IT group understand the challenges that IoT presents in terms of security, worker safety, and operational compliance? Now let’s say you’re in Information Security. What do you need to know about Operations Technology (OT) concerns?
3 Greatest Operations Concerns: Simplicity, Control and Shut Down
Most of the operations folks have been on the shop floor or patient care floor for a long time. They’re adept at maintaining and improving processes but are challenged with keeping up with IoT and digitization, let alone security. As it is with human nature, they are afraid of losing control—especially to the IT team and the “carpeted” part of the business. This is critical. They know change is coming because of the economics of IoT, but there is a great fear of having to report to the IT team. A breach shutting a facility down is a real possibility. There is no fine to pay to get you out of this one. Just a few year ago, for example, a German plant that was shut down in late 2014 is still out of service and may be closed permanently. Both IT and OT have their place leading the charge for aspects of organizational security. We need to address the challenges that Operations Management professionals already know are some of the most difficult aspects of delivering successful industrial IoT projects. Thus, our top 8 areas for addressing this new(ish) open frontier in security must account for these concerns.Top 8
- Assess risks to be in a defensible position and determine what you’re NOT going to do.
- Inventory assets and flow the data.
- Integrate with people: establish governance and policy.
- Stop “things” from going to malicious sites.
- Prepare for an event.
- Collaborate to align tasks and responsibility with your third parties.
- Segment.
- Deceive hackers.