Smart homes, connected cars, and smart watches: these are examples of consumer-focused devices in the Internet of Things (IoT). But the Internet of Things extends beyond consumer use as new technologies are implemented in industrial settings and critical infrastructure.
With the continuing development of the Internet of Things come new attack surfaces and cybersecurity risk directly related to the IoT.
The Internet of Things refers to the system of connected devices that share data across networks. These devices offer convenience to the everyday user and efficiency optimization in commercial or industrial applications. As such, many individuals and organizations seek the functionality offered by IoT technology.
IoT technology includes both consumer-oriented devices and applications, as well as industrial Internet of Things tools. Examples of IoT devices include the following:
Some infrastructure deploys edge computing in the IoT for faster response times and increased operational efficiency. In many circumstances, IoT devices can be managed through endpoints available on mobile devices, though some practitioners opt for dedicated IoT routers. These technologies are still developing and novel uses for the IoT may soon be ubiquitous among households.
As these technologies develop, so do the regulatory requirements that protect against potential risks.
Like any extended network infrastructure, the Internet of Things introduces new attack vectors and security risks. To accommodate this shifting risk landscape, governments and lawmakers around the globe have developed new regulations to establish standards and set expectations around the use of IoT devices.
Though legal standards and compliance regulations for the Internet of Things are still developing, some existing guidelines include the following:
Guidelines specific to the United States include:
While each law or recommendation differs in its exact guidance, overall these regulations intend to improve cyber resilience among IoT networking and protect personal information associated with IoT devices. IoT-based security measures help your organization prevent vulnerabilities and other security issues that could disrupt operations.
The threat landscape for your IoT system may vary, depending on your industry, security policies, and connected devices. Cyber threats that lead to IoT attacks are likewise dependent on attack vectors unique to your profile.
Common security issues and cyber risks include the following:
Preventing IoT security threats necessitates thoughtful application of security features and control measures.
Whether you need to strengthen your network due to regulatory changes or simply because you want to prevent reconnaissance by potential attackers, you can take action for a more secure IoT network with the following security measures.
Adding new hardware and software to your network requires an awareness of potential risks that could be introduced. In a business environment, procurement personnel can partner with the security team to ensure any new devices and software entering your supply chain receive a thorough risk assessment. This initial review and any subsequent assessments negotiated as part of a third-party IoT service provider's contract should follow best practices outlined in your Third-Party Risk Management policy.
Related: How to Perform a Cybersecurity Risk Assessment
Maintain a network map of your IoT connected devices, particularly if your organization uses those devices to share data for predictive maintenance. Visibility and device management systems ensure that no IoT devices are unmonitored or untracked, thus helping you maintain awareness over your entire attack surface.
When you know each device in the network and how they communicate with each other, you can keep track of the data packets and any atypical behavior. For industrial IoT ecosystems, abnormalities in any data or energy consumption should be evaluated immediately.
Consider implementing network segmentation for your IoT devices. Creating a separate network for IoT technology ensures you can track behavior across connected devices and contain any threats introduced through your IoT toolchain. Separating your IoT connected devices can also improve data privacy and overall functionality across your networks, as you can allocate only the required resources and permissions to the IoT network.
Related: Top recommended practices for network segmentation
Once segmented, set access control measures for the IoT network. Access management protocols mean that hackers cannot achieve unauthorized access of the network, ensuring device security across your IoT surface and secure data storage for information that your IoT devices share. Network access controls determine who has access to data, as well as what validation measures are required to connect to the network.
Related: What is Privileged Access Management?
With real-time alerting across your networks, you remain informed about any unexpected behavior. If you separate your IoT network from the rest of your infrastructure, you can also set up specific alert triggers for just that IoT network. There are a variety of automation tools available to notify your organization, as well as various integration options to ensure that information flows directly to your communication channels. A continuous monitoring security solution tracks behavior and security issues so that your notification system can triage alerts.
With UpGuard, you can perform continuous monitoring for your external attack surface with Breach Risk and for your third-party vendor ecosystem with Vendor Risk. UpGuard scanning includes techniques that use standardized and publicly accessible network-based protocols to query hosts across a variety of categories. UpGuard's scanning process identifies the following IoT ports that should be reviewed:
The Advanced Message Queuing Protocol (AMQP) is sometimes used for IoT hubs to direct communications. AMQP is widely compatible with many clients, though it is not deployed for IoT as frequently as MQTT. AMQP typically uses port [.rt-script]5671[.rt-script], which should be closed if not in use by your organization. If you use AMQP for your IoT hub, access to the service should be restricted behind a firewall or virtual private network (VPN) to ensure it cannot be accessed publicly.
The Constrained Application Protocol (CoAP) supports machine-to-machine communication for resource-constrained devices, such as those used in the Internet of Things. CoAP provides efficient integration with the web for IoT devices with low memory or power supply. Built on the User Datagram Protocol (UDP), CoAP uses small byte payloads. By default, CoAP uses port [.rt-script]5683[.rt-script], though it can also be used for [.rt-script]coaps[.rt-script] on port [.rt-script]5684[.rt-script]. The latter includes Datagram Transport Layer Security (DTLS), which adapts the Transport Layer Security (TLS) protocol for privacy in UDP communications. CoAP does not offer encryption or authentication, so using [.rt-script]coaps[.rt-script] with DTLS ensures any CoAP data will be encrypted. If you are not using CoAP for device communications, close the port.
MQTT, originally known as the Message Queue Telemetry Transport, offers a lightweight machine-to-machine messaging protocol. The MQTT broker provides bi-directional message routing and stores information about client devices. MQTT uses port [.rt-script]1883[.rt-script] by default and port [.rt-script]8883[.rt-script] for encryption. If you do not use MQTT for device communications, close the port. If it is explicitly required, access should be restricted to authorized IP addresses and authenticated with a secure VPN.
The OPC UA (Open Platform Communications Unified Architecture) provides machine-to-machine communication for automation and the Internet of Things (IoT). The OPC UA uses port [.rt-script]4840[.rt-script] by default, which should be closed to the internet.
Current UpGuard users can access their Risk Profile in Breach Risk to assess whether any of the database findings referenced in this article are impacting their organization. For more information about other services UpGuard identifies through port scanning, see our support article on What services does UpGuard identify with port scanning.