Securing IoT, step by step

March 2019 Infrastructure, Information Security

In collaboration with other members of the Industrial Internet Consortium (IIC), Kaspersky Lab experts have formulated the Security Maturity Model (SMM) Practitioner’s Guide. This helps IoT operators define the level of security maturity they need to achieve based on their security goals and objectives, as well their appetite for risk.

The SMM builds on concepts identified in the ‘IIC Industrial Internet Security Framework’ published in 2016. The SMM is the first of its kind, discussing the newly established security maturity approach for IoT. The model identifies a security framework for IoT stakeholders based on their security levels and assesses the maturity of an organisation’s IoT systems by looking at governance, technology, and system management. Other models may address a particular industry, such as IoT but not security, or security but not IoT. The SMM covers all these aspects and highlights elements of existing models, where appropriate, to note existing work and avoid duplication.

The guidance has been made with variety of IoT stakeholders in mind. It is not only security experts who place great emphasis on enhancing the security of the infrastructure that connects information systems to physical objects, but also industrial facility operators, developers of special-purpose software, owners of relevant businesses, and regulatory authorities. Therefore, the IoT SMM, unlike usual regulator standards and requirements, takes into account the interests and security needs of all organisations and individuals involved in, and managing, IoT operations.

In addition, the practitioner’s guide contains three case studies that help IoT stakeholders to apply the Security Maturity Model. These include a smarter data-driven bottling line, an automotive gateway supporting OTA updates, and security cameras used in residential settings.

The guide helps IoT operators understand their now-state, their goal-state, and what steps they need to take to get to their goal. After assessing these, and over time, organisations may improve their security state by continuing to make assessments of their IoT system, and by making improvements based on the 36 listed parameters, up to their required level.

“The prioritisation of security measures, goal setting, and the development of a strategy for making a system “secure enough” is an objective that affects organisations’ long-term economic planning, along with investment, the choice of insurance program, or any other task with conflicting stimuli. The modern approach to such tasks includes the use of the so-called ‘nudge’ — the creation of a choice architecture that supports efficient decision-making in a certain area. The IoT SMM is a framework for such a choice architecture (nudge) in the field of IoT information security. It enables actors to take the first step (and then the second, the third, etc.) on the path toward a secure system, be it a large-scale manufacturing facility or a fitness bracelet,” says Ekaterina Rudina, senior system analyst at Kaspersky Lab ICS CERT.

The group of experts has been working on the project for almost two years: at the beginning of 2017, the Security Applicability team that focuses on the use of security practices in real-life IoT applications within the IIC started exploring a maturity model. The SMM Practitioner’s Guide is a companion piece to the ‘IoT SMM: Description and Intended Use White Paper’, which was issued earlier in 2018.

The full Security Maturity Model (SMM) Practitioner’s Guide can be found here.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.

Read more...
Western Digital reveals new solutions
Products & Solutions News & Events Infrastructure
Western Digital unveiled new solutions and technology demonstrations at the Future of Memory and Storage Conference 2024. The innovations cater to diverse market segments, from hyperscale cloud to automotive and consumer storage.

Read more...
Fortinet establishes new point-of-presence in South Africa
News & Events Information Security
Fortinet has announced the launch of a new dedicated point-of-presence (POP) in Isando, Johannesburg, to expand the reach and availability of Fortinet Unified SASE for customers across South Africa and southern African countries.

Read more...
New tools for investigation and robust infrastructure security
News & Events Information Security
Cybereason continues to enhance its security platform, with recent updates introducing improvements in file search operations, investigation query results, and cloud workload protection, providing more granular data and faster key artefact identification.

Read more...
The Duxbury Services Gateway revolutionises the Edge
Products & Solutions Infrastructure
Duxbury Networking has announced the launch of the Duxbury Services Gateway (DSG) range. These cost-effective edge compute appliances are designed to meet the diverse needs of South African businesses including SD-WAN, Firewall, and IP PBX applications.

Read more...
Navigating the evolving tech landscape in 2024 and beyond
Residential Estate (Industry) Infrastructure
Progress in the fields of AI, VR and social media is to be expected, but what is not, is our fundamental relationship with how we deploy solutions in our business and how it integrates with greater organisational strategies and goals.

Read more...
Eight terabyte desktop SSD
Products & Solutions Infrastructure
Western Digital has expanded its SanDisk portfolio with the new 8 TB SanDisk Desk Drive, its highest capacity yet on an external desktop solid state drive (SSD), also available with 4 TB

Read more...
78% of organisations highly concerned about cloud security
Information Security Infrastructure
As organisations develop and deploy more cloud applications, security becomes more complicated. Many organisations are adopting a hybrid or multi-cloud approach, which has expanded the attack surface and increased complexity.

Read more...