IoT security strategy from those who use connected devices - Network World

2 years ago 101

Reducing threats from endeavor IoT devices requires monitoring tools, bundle vulnerability testing, and web information measures including web segmentation.

iot conception  connection  web  representation   id1184826015 iStock

Freeman Health System has astir 8,000 connected aesculapian devices successful its 30 facilities successful Missouri, Oklahoma, and Kansas. Many of these devices person the imaginable to crook deadly astatine immoderate moment. "That’s the doomsday script that everyone is acrophobic of," says Skip Rollins, the infirmary chain's CIO and CISO.

Rollins would emotion to beryllium capable to scan the devices for vulnerabilities and instal information bundle connected them to guarantee that they aren't being hacked. But helium can't.

"The vendors successful this abstraction are precise uncooperative," helium says. "They each person proprietary operating systems and proprietary tools. We can't scan these devices. We can't enactment information bundle connected these devices. We can't spot thing they're doing. And the vendors intentionally present them that way."

The vendors assertion that their systems are unhackable, helium says. "And we say, ‘Let's enactment that successful the contract.’ And they won't."

That's astir apt due to the fact that the devices could beryllium rife with vulnerabilities. According to a report released earlier this year by healthcare cybersecurity steadfast Cynerio, 53% of aesculapian devices person astatine slightest 1 captious vulnerability. For example, devices often travel with default passwords and settings that attackers tin easy find online, oregon are moving old, unsupported versions of Windows.

And attackers aren't sleeping. According to Ponemon probe released past fall, attacks connected IoT oregon aesculapian devices accounted for 21% of each healthcare breaches – the aforesaid percent arsenic phishing attacks.

Like different wellness attraction providers, Freeman Health Systems is trying to get instrumentality vendors to instrumentality information much seriously, but, truthful far, it hasn't been successful. "Our vendors won't enactment with america to lick the problem," Rollins says. "It's their proprietary concern model."

As a result, determination are devices sitting successful areas accessible to the public, immoderate with accessible USB ports, connected to networks, and with nary mode to straight code the information issues.

With budgets tight, hospitals can't endanger vendors that they'll get escaped of their aged devices and regenerate them with caller ones, adjacent if determination are newer, much unafraid alternatives available. So, instead, Freeman Health uses network-based mitigation strategies and different workarounds to assistance trim the risks.

"We show the postulation going successful and out," says Rollins, utilizing a traffic-monitoring instrumentality from Ordr. Communications with suspicious locations tin beryllium blocked by firewalls, and lateral question to different infirmary systems is constricted by web segmentation.

"But that doesn't mean that the instrumentality couldn't beryllium compromised arsenic it's taking attraction of the patient," helium says.

To complicate matters further, blocking these devices from communicating with, say, different countries, tin support captious updates from being installed.

"It's not antithetic astatine each for devices to beryllium reaching retired to China, South Korea, oregon adjacent Russia due to the fact that components are made successful each those areas of the world," helium says.

Rollins says that he's not alert of attempts to physically harm radical by hacking their aesculapian devices successful existent life. "At slightest today, astir hackers are looking for a payday, not to wounded people," helium says. But a nation-state onslaught akin to the SolarWinds cyberattack that targets aesculapian devices instead, has the imaginable to bash untold amounts of damage.

"Most aesculapian devices are connected backmost to a cardinal device, successful a hub-and-spoke benignant of network," helium says. "If they compromised those networks, it would compromise the tools that we usage to instrumentality attraction of our patients. That’s a existent threat."

IoT visibility struggle

The archetypal situation of IoT information is identifying what devices are contiguous successful the endeavor environment. But devices are often installed by idiosyncratic concern units oregon employees, and they autumn nether the purview of operations, buildings and maintenance, and different departments.

Many companies don't person a azygous entity liable for securing IoT devices. Appointing idiosyncratic is the archetypal measurement to getting the occupation nether control, says Doug Clifton, who leads OT and IT efforts for the Americas astatine Ernst & Young.

The 2nd measurement is to really find the devices.

According to Forrester expert Paddy Harrington, respective vendors connection web scans to assistance companies bash that. Gear from Checkpoint, Palo Alto, and others tin continuously tally passive scans, and erstwhile caller devices are detected, automatically use information policies to them. "It won't lick everything," helium says, "But it's a measurement successful the close direction."

Still, immoderate devices don't autumn neatly into known categories and are hard to direct. "There's an 80-20 rule," says Clifton. "Eighty percent of devices tin beryllium collected by technology. For the different 20%, determination needs to beryllium immoderate investigative work."

Companies that don't yet person an IoT scanning instrumentality should commencement retired by talking to the information vendors they're already moving with, Harrington says. "See if they person an offering. It whitethorn not beryllium champion of breed, but it volition assistance span the gap, and you won't person to person a ton of caller infrastructure."

Enterprises typically usage spreadsheets to support way of IoT devices, says May Wang, Palo Alto's CTO for IOT security. Each country of the concern mightiness person its ain list. "When we spell to a hospital, we get a spreadsheet from the IT department, the facilities department, and the biomed devices section – and each 3 spreadsheets are antithetic and amusement antithetic devices," she says.

And erstwhile Palo Alto runs a scan of the environments, these lists typically autumn abbreviated – sometimes by much than an bid of magnitude. Many are older devices, Wang says, installed successful the days earlier IoT devices were recognized arsenic information threats. "Traditional web information doesn't spot these devices," she says. "And accepted approaches to protecting these devices don't work."

But companies can't use endpoint information oregon vulnerability-management policies to devices until they are each identified. Palo Alto present includes machine-learning-powered IoT instrumentality detection integrated successful its next-generation firewall.

"We tin archer you what benignant of devices you have, what benignant of hardware, software, operating systems, what protocols you're using," Wang says. The Palo Alto systems can't observe and get afloat accusation connected each azygous device. "For immoderate of them, it whitethorn not beryllium arsenic detailed, but we tin get astir accusation for astir devices. That provides visibility for instrumentality discovery."

Depending connected however the exertion is deployed, Palo Alto tin besides prime up devices based connected their internal, lateral communications, and either suggest oregon automatically instrumentality information policies for recently discovered devices.

When IoT devices usage cellular communications, this creates a bigger problem. "Lots of IoT devices are 5G, and it's going to go an adjacent bigger issue," she says. "We person a part moving connected 5G security. It decidedly provides much challenges."

Peering wrong the IoT

Once IoT devices are reliably discovered and inventoried, they request to beryllium managed and secured with the aforesaid rigor arsenic different web devices. That requires configuration management, vulnerability scanning, postulation monitoring, and different capabilities.

Even a instrumentality that's not connected to an outer web tin go an intermediate staging constituent oregon a hiding spot for a determined attacker moving laterally done the company.

Marcos Marrero, CISO astatine H.I.G. Capital, faced conscionable this dilemma a twelvemonth ago.

H.I.G. is simply a planetary concern steadfast with implicit $50 cardinal of equity superior nether absorption and 26 offices connected 4 continents. The steadfast has hundreds of devices connected its networks, specified arsenic cameras, carnal information devices, and sensors that show temperature, humidity, and powerfulness wrong its machine rooms. IoT instrumentality information "is a immense problem," says Marrero. "And it's perpetually evolving and getting larger."

As a fiscal firm, H.I.G. is highly information conscious, with the information squad having oversight of each instrumentality that's installed connected its networks. "Knock connected wood, we haven't travel crossed immoderate rogue IoT successful our environment," says Marrero.

But being capable to find devices is conscionable the commencement of the journey. "Then there's the visibility into vulnerabilities and configurations," helium says.

About a twelvemonth ago, Marrero ran a vulnerability scan connected 1 of the country alert devices and recovered unfastened ports requiring nary authentication. The steadfast contacted the shaper and was capable to get instructions connected however to harden the device. "But we had to inquire for it – it wasn't accusation that was fixed to america close disconnected the bat," helium says.

And the vulnerability scan the institution ran lone looked astatine the instrumentality from the outside, helium says, uncovering unfastened ports and benignant of operating system, but small else. "There are a full big of vulnerabilities successful the open-source bundle utilized successful these devices," helium says.

To code the problem, H.I.G. turned to a firmware scanning instrumentality from Netrise.

"We did a impervious of conception and uploaded 1 of the firmware images, and it gave backmost each this vulnerability information and different information," helium says. "That is what sealed it for us."

Uploading the images was a manual process that took a mates of minutes per image. Since determination were galore duplicate devices of the aforesaid type, the institution had to upload less than 20 images successful total. As a effect of the scans, the firm's inventory of vulnerabilities accrued by 28%.

"We had nary thought they existed successful our environment," helium says. "Yes, our vulnerability trending had a spike, but fractional the conflict is adjacent knowing you had those vulnerabilities successful the archetypal place."

After the vulnerabilities were discovered, H.I.G. contacted instrumentality vendors and took different mitigation steps. "It could beryllium taking the instrumentality down if it's excessively unsafe and poses excessively overmuch of a hazard to our environment," helium says, "or layering further controls astir it."

For example, immoderate devices were segmented disconnected connected the network, with entree power lists to bounds what different systems and users could entree that device. "For example, a information camera tin lone speech to exertion assets that enactment that device," helium says. "That limits the hazard of immoderate antagonistic exploitation."

Then, immoderate aboriginal firmware updates are tally done the Netrise instrumentality earlier they're deployed, successful lawsuit the shaper introduced caller vulnerabilities.

Other IoT absorption policies the institution has successful spot see information screening during the archetypal acquisition decisions.

"Before we procure immoderate caller assets, we guarantee they person immoderate level of logging that we tin nonstop to our centralized logging environment," helium says, referring to the company's information accusation and lawsuit absorption (SIEM) system. "What our SIEM does is instrumentality each the antithetic logs we nonstop to it and correlate them to trim the level of mendacious alerts."

Occasionally, the institution comes crossed devices that person precise immature levels of logging, helium says. "And I've had to say, 'We're not buying that.'"

Monitoring and oversight

Once each the devices are identified, categorized by risk, and, to the grade possible, patched and updated, the adjacent measurement is to make a monitoring model astir the ones with the imaginable to bash the astir harm to the company.

In immoderate cases, companies whitethorn beryllium capable to instal endpoint extortion bundle connected the IoT devices themselves to support them against malicious attacks, to show configuration settings, to guarantee that they are afloat patched, and to show for antithetic activity. That whitethorn not beryllium imaginable for immoderate older devices oregon proprietary devices specified arsenic aesculapian equipment.

When devices link to an endeavor network, those communications tin beryllium monitored for suspicious activity.

For once, enterprises are catching a interruption successful this facet of IoT security. According to Palo Alto, 98% of IoT postulation is unencrypted. Plus, IoT devices typically bash the aforesaid happening implicit and implicit again.

"Take a thermostat, for example," says Palo Alto's Wang. "It's lone expected to nonstop the somesthesia and that's it. It's not expected to speech to different servers. That's a bully happening – it makes it easier for the AI models to physique up a baseline of behavior."

IoT and the zero-trust future

As companies determination to zero-trust architectures, it's important not to hide the connected devices.

Zero-trust principles and security-by-design should beryllium utilized to harden devices and associated applications. That starts with extortion controls, specified arsenic instrumentality recognition and authentication, arsenic good arsenic trusted instrumentality updates with proviso concatenation tamper-resistance, says Srinivas Kumar, vice president of IoT solutions astatine information vendor DigiCert. Communications request to beryllium unafraid arsenic well, helium adds.

One of the manufacture organizations moving connected securing IoT devices by creating authentication and encryption standards is WI-SUN, founded astir 10 years agone to specifically absorption connected devices utilized by utilities, astute cities, and agriculture.

The information measures built into the WI-SUN standards see certificates for authenticating devices arsenic they link to a network, encryption to guarantee that each messages are private, and a connection integrity cheque to forestall man-in-the-middle attacks.

Rising geopolitical tensions mean that securing these meters – and different devices cardinal to captious infrastructure operations – is much and much urgent. "If you person structural-integrity cheque sensors connected a span oregon railroad way and idiosyncratic comes on and jams each the sensors, you'd person to unopen the metropolis down, and it would origin a immense magnitude of mayhem," says WI-SUN president and CEO Phil Beecher.

And that's conscionable the start, says David Nosibor, level solutions pb and caput of the SafeCyber task astatine UL Solutions, formerly Underwriters Laboratories. "From disruptions of proviso chains to nonaccomplishment of food, water, oregon power, these impacts tin widen good beyond the impacted organizations," helium says.

Meanwhile, attackers are getting progressively sophisticated, helium says, and there's a shortage of cybersecurity expertise successful the workforce. Plus, connected apical of each this, there's a question of regulations coming arsenic legislators aftermath up to the risks.

"These challenges are interconnected," Nosibor says. "And galore organizations, unfortunately, conflict to support gait with the complexity."

Maria Korolov has been covering emerging exertion and emerging markets for the past 20 years.

Copyright © 2022 IDG Communications, Inc.

Read Entire Article