• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Articles
  • News
  • Events
  • Advertize
  • Jobs
  • Courses
  • Contact
  • (0)
  • LoginRegister
    • Facebook
    • LinkedIn
    • RSS
      Articles
      News
      Events
      Job Posts
    • Twitter
Datafloq

Datafloq

Data and Technology Insights

  • Categories
    • Big Data
    • Blockchain
    • Cloud
    • Internet Of Things
    • Metaverse
    • Robotics
    • Cybersecurity
    • Startups
    • Strategy
    • Technical
  • Big Data
  • Blockchain
  • Cloud
  • Metaverse
  • Internet Of Things
  • Robotics
  • Cybersecurity
  • Startups
  • Strategy
  • Technical

7 Proven Keys to Securing Your IoT Integrated Environment

Ken Mafli / 5 min read.
January 20, 2017
Datafloq AI Score
×

Datafloq AI Score: 60

Datafloq enables anyone to contribute articles, but we value high-quality content. This means that we do not accept SEO link building content, spammy articles, clickbait, articles written by bots and especially not misinformation. Therefore, we have developed an AI, built using multiple built open-source and proprietary tools to instantly define whether an article is written by a human or a bot and determine the level of bias, objectivity, whether it is fact-based or not, sentiment and overall quality.

Articles published on Datafloq need to have a minimum AI score of 60% and we provide this graph to give more detailed information on how we rate this article. Please note that this is a work in progress and if you have any suggestions, feel free to contact us.

floq.to/jQwdR

In a recent study in 2016, Gartner estimates that 6.4 billion connected devices will be used by companies worldwide. By 2020, it will top 20 billion. The increasing use of IoT devices in our corporate networks brings the promise of unparalleled coordination and productivity. But it also brings the promise of multiplied threat vectors and vulnerabilities.

Companies must react to this changing environment. The old methods of data protection relied on defensible perimeters around large, corporate data centers. More companies, however, are adopting mobile, IoT, and cloud technologies that live outside the data center. The perimeter is now becoming a thing of the past.

Below are seven strategies to help equip the enterprise business meet the challenges of the current (and future) technology landscape. This, by no means, is exhaustive. Rather, they are stepping stones to create a defense-in-depth model as you secure your sensitive data.

The First Thing to Realize: There is No Perimeter

Back in 2014, Google laid the groundwork for looking at data protection in a whole new way with BeyondCorp, their internal data security initiative, co-authored by Rory Ward and Betsy Beyer. Here is part of their opening statement:

The perimeter security model works well enough when all employees work exclusively in buildings owned by an enterprise. However, with the advent of a mobile workforce, the surge in the variety of devices used by this workforce, and the growing use of cloud-based services, additional attack vectors have emerged that are stretching the traditional paradigm to the point of redundancy. … The perimeter is no longer just the physical location of the enterprise.

Here is the alarming reality: with every new device that becomes network enabled – a threat vector is added. And with every new threat vector, the tradition perimeter defense is weakened. The truth of the matter is, the perimeter was already porous. But with the advent of bring-your-own-device, IoT, and cloud infrastructure the perimeter has dissipated because, as BeyondCorp points out, either each device gets its own perimeter or you move to a model that acknowledges the new landscape.

Encryption as Your Cornerstone Defense

Encrypt all your sensitive data. Period. If we accept Googles premise that one should assume that an internal network is as fraught with danger as the public Internet and that allowing more devices access to the network only increases attack vectors, the logical conclusion is that the data must be rendered useless when compromised by fraud or attack.

Fortunately, strong encryption for data-at-rest that can withstand the best brute force attack has been readily available for years in the form of Advanced Encryption Standard (AES). In 2000 NIST formally adopted the AES encryption algorithm and published it as a federal standard under the designation FIPS-197. Since then, it has proven time and again to provide real-world protection from unwanted access to sensitive data.

Make Encryption Strong with Encryption Key Management

Hackers dont break your encryption, they steal your keys. That is why any encryption strategy that will defend the data against attack will include proper, centralized encryption key management. The first thing you must do is logically or physically separate the encryption keys from the sensitive data. This way, if the encrypted data is compromised, they will not be able to decipher it.


Interested in what the future will bring? Download our 2023 Technology Trends eBook for free.

Consent

But once you separate the keys from the encrypted data, you must manage user access to the keys to the least amount of personnel possible, create clear separation of duties, and manage the full lifecycle of the keys. Since the keys are the only reasonable way someone can decipher your encrypted data, it is of vital importance that you fully implement physical security, logical security, user access controls, and full lifecycle management. A more definitive guide to encryption key management has been created to better explain the core concepts of the items given above.

Manage All Devices

All devices, including IoT devices, connecting to the network should be appropriately authenticated and authorized to access the requisite enterprise applications, according to BeyondCorp. Piyush Jain of SIMpalm agrees, we can replicate the [Mobile Device Management] approach for IoT so that we can manage and monitor the devices, which are connected to the IoT network. Each device should be granted access to the network by a controlling database of all devices. And authentication should be able to be revoked at a moments notice, effectively ending a session if the device is being improperly used.

Manage All Users

Similarly, all users should be given user and group privileges to the network, based on job function. They should also be given authority to use individual devices or groups of devices (up to and including all devices) based off of job function. This way, if a hacker gains access to a users login credentials but is trying to access the network from the wrong device, they will be locked out.

Use Multi-Factor Authentication

Login credentials are not enough. Passwords are hard to manage and can be compromised with keyloggers, malware, or any other of a variety of attacks. You need an exterior verification process. You need Multi-Factor Authentication (MFA).

When configuring MFA, users should be required to use multi-factor authentication at one of these following levels:

  • Network Level – When they first access the network
  • System Level When they access a server or any system
  • Application Level Within your applications

Monitor All Threats in Real-Time

In a similar vein to BeyondCorp, Forrester is now promoting their concept of Zero Trust. In this model, there is no trusted internal network and an untrusted exterior. All users must not only be verified before logging into the network but it also calls for organizations to inspect all network traffic, from the outside and on the inside. This means all traffic must be inspected in real time.

The truth is, a large majority of data breaches occur on systems that have been compromised sometimes months before the data is lost. A recent Verizon Data Breach Investigations Report indicates that a full 84 percent of all breaches were detected in system logs. The indication, here, is that real-time log monitoring can be effective in searching out evidence of a security incident and stopping sensitive information being compromised before it is too late.

Final Thoughts

The landscape of our networks are changing. It is tempting to see the changes themselves as a threat to our sensitive information. The change is not the threat. The outdated model is the threat.

The truth is, this challenge gives us the opportunity to refashion our data security model and with it, the ability to open up a more dynamic and scalable networked environment. If we do away with the old model of the high wall with the trusted network inside, what we can build in its place is a network of users, devices, servers, and systems that are constantly authenticated, managed and monitored, bringing a higher degree of security.

Categories: Cybersecurity, Internet Of Things
Tags: Cloud, Data, IoT, mobile, security

About Ken Mafli

Ken Mafli is a Data Security Wonk at Townsend Security and their Demand Generation Manager. For the last four years he has helped enterprise level clients around the world secure their data with Townsend Security's encryption and key management systems. He regularly writes on the topics of data security trends, cryptography, and the changing landscape of the industry.

Primary Sidebar

E-mail Newsletter

Sign up to receive email updates daily and to hear what's going on with us!

Publish
AN Article
Submit
a press release
List
AN Event
Create
A Job Post

Related Articles

Webinar – How to expedite data analytics insights and reduce time-to-value with AWS & Rearc

March 31, 2023 By Datafloq Sponsored

12 Data Quality Metrics That ACTUALLY Matter

March 30, 2023 By Barr Moses

What is Enterprise Application Integration (EAI), and How Should Your Company Approach It?

March 29, 2023 By Terry Wilson

Related Jobs

  • Software Engineer | South Yorkshire, GB - February 07, 2023
  • Software Engineer with C# .net Investment House | London, GB - February 07, 2023
  • Senior Java Developer | London, GB - February 07, 2023
  • Software Engineer – Growing Digital Media Company | London, GB - February 07, 2023
  • LBG Returners – Senior Data Analyst | Chester Moor, GB - February 07, 2023
More Jobs

Tags

AI Amazon analysis analytics application applications Artificial Intelligence BI Big Data business China Cloud Companies company costs crypto Data design development digital engineer environment experience future Google+ government Group health information learning machine learning market mobile news public research security services share skills social social media software strategy technology

Related Events

  • 6th Middle East Banking AI & Analytics Summit 2023 | Riyadh, Saudi Arabia - May 10, 2023
  • Data Science Salon NYC: AI & Machine Learning in Finance & Technology | The Theater Center - December 7, 2022
  • Big Data LDN 2023 | Olympia London - September 20, 2023
More events

Related Online Courses

  • Webinar – How to expedite data analytics insights and reduce time-to-value with AWS & Rearc
  • Cybersecurity World Asia
  • Data Centre World Asia
More courses

Footer


Datafloq is the one-stop source for big data, blockchain and artificial intelligence. We offer information, insights and opportunities to drive innovation with emerging technologies.

  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Recent

  • Everything You Should Know About 3D Pose Estimation
  • 12 Data Quality Metrics That ACTUALLY Matter
  • How to Build Microservices with Node.js
  • How to Validate OpenAI GPT Model Performance with Text Summarization (Part 1)
  • What is Enterprise Application Integration (EAI), and How Should Your Company Approach It?

Search

Tags

AI Amazon analysis analytics application applications Artificial Intelligence BI Big Data business China Cloud Companies company costs crypto Data design development digital engineer environment experience future Google+ government Group health information learning machine learning market mobile news public research security services share skills social social media software strategy technology

Copyright © 2023 Datafloq
HTML Sitemap| Privacy| Terms| Cookies

  • Facebook
  • Twitter
  • LinkedIn
  • WhatsApp

In order to optimize the website and to continuously improve Datafloq, we use cookies. For more information click here.

settings

Dear visitor,
Thank you for visiting Datafloq. If you find our content interesting, please subscribe to our weekly newsletter:

Did you know that you can publish job posts for free on Datafloq? You can start immediately and find the best candidates for free! Click here to get started.

Not Now Subscribe

Thanks for visiting Datafloq
If you enjoyed our content on emerging technologies, why not subscribe to our weekly newsletter to receive the latest news straight into your mailbox?

Subscribe

No thanks

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.

Marketing cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.

Please enable Strictly Necessary Cookies first so that we can save your preferences!