Securing IoT, step by step

March 2019 Infrastructure, Information Security

In collaboration with other members of the Industrial Internet Consortium (IIC), Kaspersky Lab experts have formulated the Security Maturity Model (SMM) Practitioner’s Guide. This helps IoT operators define the level of security maturity they need to achieve based on their security goals and objectives, as well their appetite for risk.

The SMM builds on concepts identified in the ‘IIC Industrial Internet Security Framework’ published in 2016. The SMM is the first of its kind, discussing the newly established security maturity approach for IoT. The model identifies a security framework for IoT stakeholders based on their security levels and assesses the maturity of an organisation’s IoT systems by looking at governance, technology, and system management. Other models may address a particular industry, such as IoT but not security, or security but not IoT. The SMM covers all these aspects and highlights elements of existing models, where appropriate, to note existing work and avoid duplication.

The guidance has been made with variety of IoT stakeholders in mind. It is not only security experts who place great emphasis on enhancing the security of the infrastructure that connects information systems to physical objects, but also industrial facility operators, developers of special-purpose software, owners of relevant businesses, and regulatory authorities. Therefore, the IoT SMM, unlike usual regulator standards and requirements, takes into account the interests and security needs of all organisations and individuals involved in, and managing, IoT operations.

In addition, the practitioner’s guide contains three case studies that help IoT stakeholders to apply the Security Maturity Model. These include a smarter data-driven bottling line, an automotive gateway supporting OTA updates, and security cameras used in residential settings.

The guide helps IoT operators understand their now-state, their goal-state, and what steps they need to take to get to their goal. After assessing these, and over time, organisations may improve their security state by continuing to make assessments of their IoT system, and by making improvements based on the 36 listed parameters, up to their required level.

“The prioritisation of security measures, goal setting, and the development of a strategy for making a system “secure enough” is an objective that affects organisations’ long-term economic planning, along with investment, the choice of insurance program, or any other task with conflicting stimuli. The modern approach to such tasks includes the use of the so-called ‘nudge’ — the creation of a choice architecture that supports efficient decision-making in a certain area. The IoT SMM is a framework for such a choice architecture (nudge) in the field of IoT information security. It enables actors to take the first step (and then the second, the third, etc.) on the path toward a secure system, be it a large-scale manufacturing facility or a fitness bracelet,” says Ekaterina Rudina, senior system analyst at Kaspersky Lab ICS CERT.

The group of experts has been working on the project for almost two years: at the beginning of 2017, the Security Applicability team that focuses on the use of security practices in real-life IoT applications within the IIC started exploring a maturity model. The SMM Practitioner’s Guide is a companion piece to the ‘IoT SMM: Description and Intended Use White Paper’, which was issued earlier in 2018.

The full Security Maturity Model (SMM) Practitioner’s Guide can be found here.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Five tech trends shaping business in 2025
Information Security Infrastructure
From runaway IT costs to the urgent need for comprehensive AI strategies that drive sustainable business impact, executives must be prepared to navigate a complex and evolving technology environment to extract maximum value from their investments.

Read more...
Threats, opportunities and the need for post-quantum cryptography
AI & Data Analytics Infrastructure
The opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. The evolution of quantum computing jeopardises the security of any data available in the digital space.

Read more...
Navigating today’s cloud security challenges
Information Security Infrastructure
While the cloud certainly enables enterprises to quickly adapt to today’s evolving demands, it also introduces unique challenges that security teams must recognise and manage. Vincent Hwang offers insights from the 2025 State of Cloud Security Report.

Read more...
Identity is a cyber issue
Access Control & Identity Management Information Security
Identity and access management telemetry has emerged as the most common source of early threat detection, responsible for seven of the top 10 indicators of compromise leading to security investigations.

Read more...
The rise of autonomous data recovery
Information Security Infrastructure
Escalating cyberthreats and attacks constantly put businesses under pressure, increasingly prompting organisations to shift their mindsets towards ensuring continuous operations and thus avoiding downtime and revenue loss.

Read more...
Identity and authentication
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security Security Services & Risk Management
Identity authentication is a crucial aspect of both physical security and cybersecurity. SMART Security Solutions obtained insights into the topic and the latest developments from three companies.

Read more...
Can we really fight AI cybersecurity threats with more AI?
Information Security Infrastructure
In a world where artificial intelligence (AI) is increasingly being weaponised by cybercriminals, the question of whether we can effectively combat AI threats with more AI is not just a technical inquiry but a pressing global concern

Read more...
Partnership delivers 40% storage savings for surveillance
Surveillance Infrastructure
Large-scale video surveillance users and applications demanding extended storage periods will benefit from up to 40% savings on video storage hardware stacks thanks to a new partnership between IDIS and Secure Logiq.

Read more...
How smart video is transforming storage at the edge
Infrastructure Surveillance
As these technologies come together, they are impacting the architecture of the edge and what we require from data storage. More specifically, they are driving a demand for specialised storage.

Read more...
VPS hosting set to dominate in 2025
Infrastructure
SME market growth and the increasing need for a digital footprint are pushing VPS growth in South Africa, especially since it is now perceived as a viable business tool, scalable by nature, with improved performance.

Read more...