The Internet of Things continues to expand and bring enormous benefits across many industries. Ensuring IoT security comes with some serious challenges, but being aware that web security is a critical piece of the IoT puzzle can go a long way towards minimizing risk.
Key takeaways
The Internet of Things (IoT) delivers a growing array of benefits for businesses and consumers. It connects people and objects in powerful ways, whether automating industrial systems, enabling traceability across supply chains, or making it possible to switch on lights or unlock doors with voice commands.
But there’s also a major concern with the IoT: the technology was not designed with cybersecurity in mind, and many device manufacturers treat security as an afterthought. Making matters worse is the lack of industrywide, IoT-specific security standards for devices, operating systems, authentication methods, and communication protocols.
As organizations look to build multilayered protections into an IoT framework, web application security is a key piece of the overall puzzle. That is because the IoT relies on the same Internet communications protocols that web applications use.
The ever-growing number of connected devices makes IoT security especially difficult. According to Statista, more than 15 billion devices will be in use worldwide this year; by 2030, that number will nearly double. Security is further complicated by the vast array of devices – sensors, phones, wearables, and industrial machinery, to name a few – and their use in fields as varied as agriculture, manufacturing, engineering, energy, transportation, smart cities, and home automation. For bad actors, the huge variety of device types and use cases means multiple vectors for attack.
What makes IoT devices so vulnerable? A common problem is the lack of security protections on IoT devices themselves. Even when an organization applies IoT security controls across a group of its devices, the associated security risks don’t completely disappear. Because the IoT relies on IP communications just like the rest of the Internet, these risks have the potential to touch almost every corner of an enterprise – from cloud workloads and servers to databases, endpoints, or even software code repositories.
In addition, attacks on IoT are becoming more common and costly, to the tune of an average of $330k per incident, according to one industry study. Both cybersecurity researchers and cybergangs have been able to penetrate industrial systems, video networks, vehicles, and numerous consumer devices. In one well-known example, criminals hacked a web-connected thermometer at an aquarium at a casino and then gained access to the corporate network.
Most IoT security risks fall into one of the following areas, which often overlap:
IoT security addresses five core areas: authentication, encryption, port protection, and device management.
Because connected IoT devices commonly communicate over HTTP and frequently interact with web applications and connected databases, any web security strategy must address IoT and web apps holistically. Scanning RESTful APIs while deploying other security protections – including strong authentication, encryption, and port restrictions – greatly reduces the exposure surface for IoT systems.
Like other areas of cybersecurity, locking down the IoT requires a focused strategy, the right tools, and the right technologies. It’s essential to build a framework that approaches protection in a holistic and persistent way. As organizations adopt a multilayered approach and use ongoing security reviews along with a focus on inserting protections earlier in the development cycle, the odds of a breach or denial of service diminish. Only at that point is it possible to tilt the equation toward maximizing the benefits of the Internet of Things.
IoT security cannot be an afterthought – it must be integrated into an overall enterprise security strategy. As automation and smart systems become the norm, it’s essential to develop a framework for managing a hyperconnected world. A focus on authentication, encryption, port management, and device management tames the potential chaos and helps keep systems and data secure.