Top Ten IoT Security Tips

There are many reasons why IoT defense is challenging and there are enough failed examples of IoT security: From the famous Mirai Botnet with 1.1Tbps DDoS capability to universal plug and play flaws caused 100.000 infected routers.

Blog Series about Security in Public Clouds

This blog is part of a blog series about security in public clouds. If you are interested in the topic more deeply have a look at the introductory blog where all related articles are listed and linked.

 

 

Broken IoT security is causing the business a great deal. We have listed ten IoT security tips to help when you design and build your IoT solution.

On the edge, regardless of the hardware. Use a trusted platform module or physically unclonable function to physically protect the device from tampering. Strong local authentication to avoid brute-force of the device. Software by nature will have bugs, therefore Over-The-Air upgrade or any sort of patch management is essential.

On communication, we need to guarantee the encryption for the data at rest and the data in transit. Working with digital certificates is a must. Use additional defense method on the network layer to detect unusual traffics. By doing lean data on edge, data will be difficult for the unlawful third party to interpret in a meaningful way. Enrich the data once arrives in the cloud.

In the cloud, we need to gather all security-related events from the edge devices and build up a warning system as a detective control. A proper IoT Device Inventory with Identity Lifecycle will help us to avoid the device fall into the wrong hands. Least privilege for each device and user allowed to do is critical to avoid any configuration error. Last but least, a continues well-architected review with IoT Lens of the whole system is always valuable and necessary to discover & measure and improve the overall IoT security and performance.

By 2024, 25% percent of the data we generate will be real-time, this means we have to get security right from the very beginning. This is a challenging task to apply across all business units. By following the security best practices and our top ten IoT security tips will help inform the overall IoT cybersecurity strategy and allow us to implement security measures across the business. No matter how extended it becomes!

Further resources

Swisscom has published whitepapers on cloud security in which security issues are dealt with in detail. These can be obtained as follows:

If you want to learn more about Swisscom’s IoT portfolio and services on public cloud get in touch with us using the following links: