• About
  • Subscribe
  • Contact
Thursday, May 8, 2025
    Login
FutureIOT
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
No Result
View All Result
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
No Result
View All Result
FutureIOT
No Result
View All Result
Home Technology Security

Securing IoT devices demands applying zero trust principles

Paddy Harrington by Paddy Harrington
July 19, 2024
Photo by cottonbro studio from Pexels: https://www.pexels.com/photo/hand-holding-a-key-with-a-usb-flash-drive-5474298/

Photo by cottonbro studio from Pexels: https://www.pexels.com/photo/hand-holding-a-key-with-a-usb-flash-drive-5474298/

Two recent sets of vulnerabilities discovered in medical IoT devices, one in lab testing gear and one in a temperature sensor (the latter of which brings back memories of the infamous fish tank sensor hack in Las Vegas), highlight the need for implementing Zero Trust principles when deploying IoT devices.

When one thinks about Zero Trust in relation to securing IoT devices, network segmentation comes to mind as the easiest way to control access to these devices and, if the device is compromised, restrict access to other apps and data so that patient data may not be accessed, or an attack can pivot to other devices on the network.

The challenge is that these devices may need that access because these smaller devices are often part of larger solution deployments to do blood testing or control the temperature of samples or pharmaceuticals, so simply implementing these segmentation policies will still allow for access to apps, data, and other devices with which these components communicate.

Access control needs to go deeper, and you need to define exactly what these devices have access to on other devices, application servers, or internet hosts.

IoT device deployments, like many modern networks, tended to grow organically and not always as planned. Devices slowly got added to the network to fill a need, such as printing, video monitoring, or package tracking, and by the time enterprises realised what happened, thousands of devices had become part of the corporate network, with no plans on how to manage them, how access would be controlled, or how they would be monitored.

This means that as problems were discovered, teams pivoted to resolve the problem without any thought or ability to redesign the deployment so that these requirements were properly addressed. Since the proliferation of these devices isn’t slowing down, problems like this continue to rise, meaning the time to act is now.

IoT security has been identified as one of our top 10 emerging technologies for 2024, which reflects the growing concern about securing these devices. In response to these concerns, a lot of solutions have emerged to address IoT devices, device inventory, vulnerability management, identity and access management, network control and security, and endpoint security. These solutions can only assist once security leaders determine that they’re going to implement Zero Trust principles to IoT device deployments. This means:

  • Recognising what’s wrong right now.
  • Analysing the needed level of access to these IoT devices.
  • Understanding the data to which the devices need access.
  • Determining how these devices are going to be monitored.

Forrester clients interested in assessing these requirements and gaining direction on their IoT security roadmaps should submit an inquiry or guidance session request with me. If you don’t know how you’re going to use this technology, it’s going to be shelfware.

First published on Forrester

Related:  C-suite must discern between cybersecurity and cyber resilience
Tags: ForresterIoT securityzero trust
Paddy Harrington

Paddy Harrington

Paddy Harrington is a senior analyst at Forrester advising security and risk professionals. He focuses on endpoint security on platforms ranging from desktop PCs to internet-of-things (IoT) devices. His research includes the endpoint’s impact on the security of business applications and data in light of the recent proliferation of edge devices and the evolving work environment. Previous work experience Harrington has 27 years of high-tech experience. Prior to coming to Forrester, Harrington developed learning and enablement solutions for the worldwide sales engineering teams at Citrix Systems, covering the entire portfolio of Citrix solutions. Earlier at Citrix, he led a sales engineering team targeting midmarket to enterprise organisations with focuses on healthcare and finance. His team helped customers achieve the secure delivery of their applications. Previously, as the CIO of a consulting services company, Harrington was instrumental in the firm’s growth into a larger provider of networking, application delivery, and application security solutions. Education Harrington received his Private Pilot License (PPL) from Embry-Riddle Aeronautical University.

No Result
View All Result

Recent Posts

  • AI to fuel the rise of zero touch networks
  • Surge in ambient IoT to pave the way for sustainable tech
  • Imbibing AI skills into Singapore’s future workforce today
  • Asia Pacific's AI ambitions hinge on next-generation networks
  • Gartner urges supply chain leaders to adopt cost-to-serve model

Categories

  • Agriculture
  • AI and Machine Learning
  • Application
  • Application and Middleware
  • Automotive
  • Banking and Financial Services
  • Big Data and Analytics
  • Blockchain
  • Case Studies
  • Change Healthcare
  • CHRO
  • Cloud and Platforms
  • Commercial
  • Construction
  • Consumer
  • Customer Engagement
  • Devices
  • ESG
  • Future Workplace
  • FutureCOO
  • Governance, Standards and Regulations
  • Government, Healthcare and Education
  • Hospitality and Tourism
  • Industrial
  • Industry
  • IT-OT integration
  • Manufacturing
  • Networking
  • Operations
  • Research and Development
  • Retail and E-commerce
  • Security
  • Sensors and Instrumentation
  • Smart Cities
  • smart contracts
  • Smart Home
  • Start-ups
  • Supply chain
  • Technology
  • Telecommunications
  • TIBCO
  • Transportation and Logistics
  • Videos
  • Whitepapers

About FutureIoT

Asia’s ONLY dedicated IoT publication

The race to harness the power of Internet of Things (IoT) is here. FutureIoT is dedicated to individuals, as well as public and private organizations looking to tap the potential of IoT to transform the way we live, work and do business. FutureIoT is the dedicated media that provides the single source of truth about IoT, the technology, its application and regulation, originating from Asia. << Read more >>

Quick Links

  • Subscribe
  • Contact
  • Privacy Policy
  • Cookie Policy
  • Terms of Use

Categories

Recent News

Photo by Polina Tankilevitch: https://www.pexels.com/photo/hand-of-a-woman-showing-palm-with-a-word-no-4830656/

AI to fuel the rise of zero touch networks

May 8, 2025
Photo by John Tekeridis: https://www.pexels.com/photo/round-grey-speaker-on-brown-board-1072851/

Surge in ambient IoT to pave the way for sustainable tech

May 7, 2025
  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe