Site icon Check Point Blog

While IoT security standards lag, IoT security companies innovate – Overview of trends in IoT cyber security

By Gil Yankovitch, Firmware Technology Lead and Ram Yonish, Firmware Security Evangelist (former co-founders of Cymplify Security, acquired by Check Point)

While IoT and OT devices proliferate, IoT security standards and regulations are few and far between. Unsurprisingly, this puts individuals, enterprises and states at major risk. In this post, we present some of the leading IoT cyber security solutions that have emerged in the last few years, as well as some of the drivers motivating device manufacturers to build better-secured devices.

From IP cameras and elevators, to medical devices and industrial controllers, IoT devices are inherently vulnerable and easy to hack. Many of these devices run on unpatched software, are misconfigured, or use unsecured communication protocols. Furthermore, organizations own extensive and diverse device inventories of multiple vendors, models and functionalities, with many shadow unmanaged devices connected to the network without anyone’s knowledge. And while IoT environments have become increasingly complex, IT security solutions have remained far behind, with limited visibility and control over IoT devices and their associated risks. This security gap increases the risk of a successful cyber-attack where critical devices can be shut down, damaged, manipulated, or used to infect other systems on the network.

Kaspersky H1 2019 report for IoT attacks:
Kaspersky detected 105 million attacks on IoT devices coming from 276,000 unique IP addresses in the first six months of 2019. This figure is around nine times more than the number found in H1 2018. The majority of the attacks stemmed from the Mirai (39%) and Nyadrop (also 39%) malware families.

Join the webinar: Preventing Cyber Attacks on Enterprise Networks and IoT Devices

Register: AMER | EMEA

Network-based IoT Security

IoT network-based solutions are mostly suitable for organizations looking to protect the many different types of IoT devices connected to their network. According to a research study by Dimensional Data, “90% report their companies have some shadow IOT devices, 44% mentioning at least half are connect without CISO knowledge.”

Figure 1: Source: Why Security Consolidation Matters, by Dimensional Data (download here)

Most of the solutions in this area offer an agentless method of auto-discovering managed and unmanaged connected IoT devices and OT assets, tagging them based on their attributes (e.g., device type, manufacturer, model, firmware version, and MAC address), analyzing their behavior in real-time to detect anomalies and also offer mitigation steps.

These activities can be done manually or automatically, to isolate a compromised device or stop the attack by enforcing IoT-related security rules within an organization’s security controls, including NAC, security gateways and network switches.

These solutions mainly focus on identifying the asset on the protected network, analyzing the ongoing traffic stream passively (e.g. by port-mirroring the organization’s network) and learning what constitutes normal network activity and protocols in order to detect anomalies.

Security vendors in this space focus on different industry verticals, learning and modeling their threat analysis and anomaly engines according to each industry’s standard protocols. That way, each vendor brings industry-specific domain-expertise, and applies their knowledge to best define what a secure network should look like, across every device in every field.

The main advantage of using these solutions is that they are relatively easy to deploy, are cloud based, with minimal impact on protected assets and devices, or the organizational network.

Leading IoT discovery vendors in this list include companies like Armis, Ordr, Claroty, Tenable.OT (formerly Indegy), Medigate, CyberMDX and ScadaFence. Check Point also offers a network-based IoT security solution by providing its management and enforcement capabilities seamlessly integrated with the above IoT discovery engines.

On-device protection

On-device IoT security solutions are the latest generation of IoT cyber protection. These solutions require a deep understanding of the device’s behavior, offering protection from new and different attack vectors than network based solutions. To name some examples:

Why should device manufacturers invest more in building IoT security into their devices?

While there are no standards and regulations yet, it is clear that more secured devices are of essence to us all; consumers as well as enterprises and nations. New cyber security regulations for IoT will come into effect in the next 1-3 years but more importantly, the need for secure devices is a growing need posed by the customers themselves.

One study showed that customers are worried by IoT security and would be willing to pay 22% more, and buy 70% more of secured IoT devices.

Why 5G architecture is a major catalyst for more secure devices

As we enter the 5G generation, IoT devices will be able to interact with different devices directly or through small networks, not necessarily routing traffic through a telco’s secure gateway. As 5G networks are rolled out, the need to find a better solution to protect these devices is quickly hitting home. And the most reasonable and affordable method of protection today one is built-in on-device security.

To quote one research study, 5G requires new approaches to cybersecurity, as ““The network has moved away from centralized, hardware-based switching to distributed, software-defined digital routing. Previous networks were hub-and-spoke designs in which everything came to hardware choke points where cyber hygiene could be practiced. In the 5G software defined network, however, that activity is pushed outward to a web of digital routers throughout the network, thus denying the potential for chokepoint inspection and control”

What should customers do to get more security into their devices?

In order to get more security into consumer devices such as smart TVs, printers, smart locks and IP cameras, as well as secure smart city assets like smart transportation, smart traffic-lights and smart meters, in industry 4.0 devices like PLCs, robots and smart machinery, we all have to push manufacturers to build more security into their devices.

As consumers, we can:

As enterprises and large-scale deployers, we can:

As IoT and OT manufacturers, we can:

As governments, we should:

Learn more about IoT and firmware security

To get started with device-level IoT and OT security, sign up for a free firmware risk assessment today and uncover your firmware’s security flaws within an hour, or learn more about on-device runtime protection by downloading the IoT Protect Firmware solution brief.

To explore network-level IoT and OT security, learn more about Check Point IoT Protect.

Exit mobile version