Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

7/31/2019
02:00 PM
Jon Green
Jon Green
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

Why the Network Is Central to IoT Security

Is there something strange about your network activity? Better make sure all of your IoT devices are under control.

In a large school district, there was a digital sign for a snack area that no one had thought about for months. Eventually, the snack area was removed, yet the sign was still plugged into the district's network. For months, it turns out, the sign had been compromised by attackers and was communicating with 100 different countries.   

The case highlights the problematic nature of the Internet of Things (IoT) and the ingenious ways bad actors are taking advantage of the fast-growing attack surface created by IoT. It also shows that security must adapt to this new reality if enterprise networks and sensitive data are to remain protected.

The challenge around IoT security will only grow. Worldwide spending on IoT is expected to hit $745 billion this year and blow past $1 trillion in 2022. For enterprises deploying IoT devices, security remains the top technical issue as those looking to compromise the devices are often sophisticated nation-states or organized crime organizations.

The myriad IoT devices come with an almost equal number of challenges:

  • There is a wide variety of innate security within them. Some are intended for enterprises while others are consumer-focused, but both types tend to come with much less in terms of security testing than a laptop, an iPad, or other device that might be purchased by an IT department.
  • They're not well-monitored, as was the case with the fish tank. As long as the devices are working with reasonable performance, most enterprises won't notice if something goes wrong, as opposed to a laptop that has antivirus protection and other ways to detect attacks.
  • In enterprise environments, people connect these devices without always involving anyone from IT. They see an open port and connect a device into it. As a result, enterprises often don't know everything that's on their networks.

There is a lack of visibility and security into the devices in what is an increasingly distributed enterprise IT environment. Often the devices are deployed on the interior of the network, and while some may be talking externally to a public cloud or other Internet-based systems, many communicate internally to other systems on the network.

Security deployed at the network's perimeter will be blind to such communications unless the enterprise is watching the internal network, which many aren't. If those devices are compromised, they become a launching pad into other parts of the network. The school district's digital sign is proof-positive here.

The network is now the focal point for IoT security. The devices connect into the network, the network touches all data and workloads, and this is how hackers can move laterally to compromise whatever systems and data are on the network. Through the network, users and devices can be authenticated, policies and rules put in place to control access and behavior, and visibility can be increased to detect anomalies.

The top IoT issue is that you shouldn't rely on physical security to keep things off a network. There are many places in the wired network that are wide open and there is little network access control. There's more control and authentication on the wireless side, but even there, devices that are authenticated often get dropped into an internal VLAN and from there are uncontrolled.

Key steps that can be taken to better protect an enterprise network:

  1. Outlaw anonymous connections. Enterprises must know every device that is connected, whether a laptop or a sprinkler controller.
  2. Determine what the "thing" should be allowed to do on the network. IoT devices are  static in nature; they do the same thing repeatedly and talk only a single protocol or two. Determine what "good" looks like for these devices.
  3. Use the network to enforce those rules. Many people don't take this last step, but without enforcement, polices mean little. If the cameras need to talk only to the network DVR, then use the network to allow only that behavior.
  4. Monitor for abnormal behavior. If an enterprise sees a device operating outside of what's normal, something is probably wrong. Fortunately, because you followed step 1, you know what's on the network, so tracking down a misbehaving device should be easy.

Central to the issue of IoT security moving forward is the growing need for security and networking folks to communicate. Getting this to happen is sometimes easier said than done. In some ways, the two groups are often adversarial. Network operators are happy if all the network packets are flowing quickly with high availability and low latency — even if all those packets are carrying malicious traffic. The security group would probably be happiest if nothing flowed through the network at all.

The network plays a critical role in two areas: detecting when an attack is taking place and responding to the attack by shutting down the device, limiting it, or slowing it down. There is much you can do with the network infrastructure. People will look to firewalls for solving network security problems, but don't tend to use a firewall for every single switch port. The security capabilities must be built into the network itself.

That will mean cooperation between network and security groups. Because this is a cultural issue, it will need to start with high-level executives. That doesn't necessarily mean both sides will report into the same structure. However, the security pros will have to determine what needs to be protected and the network folks will have to decide how to make it happen, all the way at the network edge where the devices connect.

Bringing these two groups together will be a challenge, but it's necessary. Without it, there will be more data breaches coming from a wider variety of things rather than end-user systems. HVAC controllers, TV screens, smart fish tanks, and other IoT devices will continue to be used by hackers seeking ways into critical parts of the network. And the IoT devices won't be getting better from a security perspective anytime soon because many of the makers of these things aren't focusing on that.

Related Content:

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Jon Green is responsible for providing technology guidance and leadership for all security solutions, including authentication and network access control, UEBA, encryption, firewall, and VPN. He also manages Aruba's Product Security Incident Response Team (PSIRT) and Aruba ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
johnadao
50%
50%
johnadao,
User Rank: Apprentice
8/1/2019 | 4:29:54 AM
Thank you somuch
Thank you somuch
US Turning Up the Heat on North Korea's Cyber Threat Operations
Jai Vijayan, Contributing Writer,  9/16/2019
MITRE Releases 2019 List of Top 25 Software Weaknesses
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "He's too shy to invite me out face to face!"
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16680
PUBLISHED: 2019-09-21
An issue was discovered in GNOME file-roller before 3.29.91. It allows a single ./../ path traversal via a filename contained in a TAR archive, possibly overwriting a file during extraction.
CVE-2019-16681
PUBLISHED: 2019-09-21
The Traveloka application 3.14.0 for Android exports com.traveloka.android.activity.common.WebViewActivity, leading to file disclosure and XSS.
CVE-2019-16677
PUBLISHED: 2019-09-21
An issue was discovered in idreamsoft iCMS V7.0. admincp.php?app=members&do=del allows CSRF.
CVE-2019-16678
PUBLISHED: 2019-09-21
admin/urlrule/add.html in YzmCMS 5.3 allows CSRF with a resultant denial of service by adding a superseding route.
CVE-2019-16679
PUBLISHED: 2019-09-21
Gila CMS before 1.11.1 allows admin/fm/?f=../ directory traversal, leading to Local File Inclusion.