New York Tech Media
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
New York Tech Media
No Result
View All Result
Home Cybersecurity

5 steps that simplify IoT security for OEMs

New York Tech Editorial Team by New York Tech Editorial Team
March 8, 2022
in Cybersecurity
0
5 steps that simplify IoT security for OEMs
Share on FacebookShare on Twitter

As digital transformation materializes, businesses are becoming more reliant on devices that support valuable IoT services. As the reliance on these devices grows, so does the number of cyberattacks on connected solutions. Each breach not only impacts corporate reputation, but also bottom-line profitability and has legal ramifications. To limit these damaging consequences, the manufacturers (and suppliers) of IoT devices must move quickly to stay ahead of the threat.

OEMs IoT security

In some countries, governments and industry bodies are trying to safeguard their citizens with legislation, standards and baseline requirements that force or encourage device makers to implement appropriate protection. Customers are also becoming more aware of the threats to their devices and to corporate or personal data. Recent surveys show many people are not buying smart home products such as locks and cameras because they have concerns about their security.

Original equipment manufacturers (OEMs) must build customers’ confidence in these products and in the data they generate if they want to capitalize on the opportunities created by digital transformation. The only way to do that is by designing security in and embedding it in every layer of a connected device.

IoT security challenges

Not all OEMs have the time, resources, or specialist expertise to invest in security. Securing an IoT device is complex. It requires an understanding of hardware, software, operating systems, and application security. It also takes time to identify and assess different security solutions, which can increase time-to-market. Implementing protection adds to the cost per unit and the bill of materials as well, and more than half of respondents to our 2021 survey of technology industry leaders said the extra cost of security was one of the top barriers to implementation. So, is that a good enough reason to skip it?

To answer that, consider the potential impact of a security breach on your customers, whether they are individuals or organizations. A vulnerability in a single product can bring down an entire network, which could have significant implications if it’s, for example, part of the health, water, or energy infrastructure. The financial costs of a successful cyberattack could also be high, and you may be putting your reputation at risk if you do not follow best practice.

Fortunately, there are five key steps OEMs can take to reduce the complexity of security and the time and cost involved in building the right protection into their device(s), from the ground up. They are:

Step 1: Follow a framework

IoT security frameworks democratize security. They make it quicker, easier and more cost-effective to build a secure product, even if you do not have a team of security experts. They also standardize security, so the ecosystem approaches design and implementation in the same way.

In many cases, the frameworks have been designed by world leading firms, and they include a suite of free resources to help you adopt best practice and meet basic security requirements. It may be useful to choose a framework that aligns with legislation, standards and baseline requirements, such as the global standard ETSI EN 303 645, NIST 8259A in the USA, or other industry schemes. This is particularly valuable if you operate in several markets.

Step 2: Complete a threat model and security analysis

A threat model and security analysis (TMSA) is the next step on your security journey and it helps you establish your audit trail of best practice. By carrying out a TMSA, you will be able to identify the threats to your device and the action you must take to keep it – and the data it generates – secure.

A TMSA helps you avoid under- or over-investing in security at the outset and means that costly changes later in development are less likely. It will also help you embed security into every layer of your device.

Look for frameworks that provide examples you can adapt for your use case if you want to make the process even easier.

Step 3: Implement a Root of Trust

According to the National Institute of Standards and Technology (NIST), a Root of Trust (RoT) is: “Highly reliable hardware, firmware, and software components that perform specific, critical security functions.” Those functions may include cryptography, attestation, trusted boot and secure storage.

A RoT is built into the silicon. It puts fundamental security features at the heart of the device, and it gives application developers a secure foundation to build on. It is recognized by several industry schemes and some cyber insurers. As Tim Davy, Cyber Senior Security Specialist, Munich Re, explained: “Having components that are built on a Root of Trust within an organization or system helps insurers to compartmentalize risk and reduce the cost of inaction. With more trusted components comes greater business resiliency and more understanding of supply chains that keeps the cost of failure to a minimum.”

If you choose components that have a RoT you will know security has been built in, which takes the hard work out of securing your device.

Step 4: Seek third-party evaluation and certification

However, you will also want to showcase your investment in security so customers know your products can be trusted. Third-party evaluation and certification will offer customers and the wider ecosystem peace of mind – and that assurance is what will enable you to scale deployment.

To become certified, independent security experts will assess your implementation against best practice, and your alignment with legislation, standards, and baseline requirements. The certification will be awarded if appropriate measures have been taken.

Step 5: Increase collaboration

If you leverage the expertise of the ecosystem, you can break down the barriers to security highlighted above and ensure you do not face these security challenges alone. There is already widespread support for a more collaborative approach. Most of the technology industry decision makers (85%) that responded to the PSA Certified 2021 security survey said they were interested in sharing knowledge of IoT security.

So, how do you do that? One option is choosing components that have already been assessed as being secure, which enables you to benefit from the knowledge of industry leaders. In some cases, you could even capitalize on their investment in security by re-using their certification to support your own journey.

Reducing the complexity of IoT security

The five steps set out above reduce the complexity of security and minimize the time and cost involved in securing an IoT device. They also help scale digital transformation across industries, building more secure products, that generate data people can trust, and that can be used to create new services.

To summarize:

1. Frameworks make it quicker and easier to implement security and reduce the time and cost involved in protecting an IoT product.

2. A threat model and security analysis will help you determine the right level of security for your device, and the steps you must take to secure it.

3. Implementing a RoT enables you to build your device on a foundation of security.

4. Third-party evaluation and certification help assure customers that you have designed products in line with best practice.

5. Finally, by working closely with the ecosystem you can simplify and speed-up security implementations, helping instill confidence in the IoT.

Credit: Source link

Previous Post

ICS vulnerability disclosures surge 110% over the last four years

Next Post

Increasing security for single page applications (SPAs)

New York Tech Editorial Team

New York Tech Editorial Team

New York Tech Media is a leading news publication that aims to provide the latest tech news, fintech, AI & robotics, cybersecurity, startups & leaders, venture capital, and much more!

Next Post
Increasing security for single page applications (SPAs)

Increasing security for single page applications (SPAs)

  • Trending
  • Comments
  • Latest
Meet the Top 10 K-Pop Artists Taking Over 2024

Meet the Top 10 K-Pop Artists Taking Over 2024

March 17, 2024
Panther for AWS allows security teams to monitor their AWS infrastructure in real-time

Many businesses lack a formal ransomware plan

March 29, 2022
Zach Mulcahey, 25 | Cover Story | Style Weekly

Zach Mulcahey, 25 | Cover Story | Style Weekly

March 29, 2022
10 Raunchy Movies on Netflix You Won’t Regret Watching

10 Raunchy Movies on Netflix You Won’t Regret Watching

May 20, 2024
How To Pitch The Investor: Ronen Menipaz, Founder of M51

How To Pitch The Investor: Ronen Menipaz, Founder of M51

March 29, 2022
Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

March 29, 2022
Startups On Demand: renovai is the Netflix of Online Shopping

Startups On Demand: renovai is the Netflix of Online Shopping

2
Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

1
Menashe Shani Accessibility High Tech on the low

Revolutionizing Accessibility: The Story of Purple Lens

1

Netgear announces a $1,500 Wi-Fi 6E mesh router

0
These apps let you customize Windows 11 to bring the taskbar back to life

These apps let you customize Windows 11 to bring the taskbar back to life

0
This bipedal robot uses propeller arms to slackline and skateboard

This bipedal robot uses propeller arms to slackline and skateboard

0
laptop on glass table

Automat-it Cuts Deployment Friction as Monce Scales AI Order Processing on AWS

April 13, 2026
Lee's Famous Recipe Chicken

Why Lee’s Famous Recipe Chicken Is Betting on Hi Auto to Quietly Rewire the Drive-Thru

April 9, 2026
computer generated image of letters

San Francisco Tribune Lists 11 HumanX Startups Moving AI Closer to the Operating Core

April 8, 2026
Impala CEO and Highrise AI CEO

The Industrialization of AI Infrastructure: What Impala and Highrise AI Reveal About the Next Scaling Frontier

April 7, 2026
Employee Time Tracking

What is an Employee Time Tracking Solution? A Definite Guide for 2026

March 31, 2026
Voltify founders

Voltify Raises $30 Million Seed Round as It Challenges $1 Trillion Rail Electrification Model

March 31, 2026

Recommended

laptop on glass table

Automat-it Cuts Deployment Friction as Monce Scales AI Order Processing on AWS

April 13, 2026
Lee's Famous Recipe Chicken

Why Lee’s Famous Recipe Chicken Is Betting on Hi Auto to Quietly Rewire the Drive-Thru

April 9, 2026
computer generated image of letters

San Francisco Tribune Lists 11 HumanX Startups Moving AI Closer to the Operating Core

April 8, 2026
Impala CEO and Highrise AI CEO

The Industrialization of AI Infrastructure: What Impala and Highrise AI Reveal About the Next Scaling Frontier

April 7, 2026

Categories

  • AI & Robotics
  • Benzinga
  • Cybersecurity
  • FinTech
  • New York Tech
  • News
  • Startups & Leaders
  • Venture Capital

Tags

AI AI QSRs Allseated Automat-it AWS B2B marketing Business CISO CISO Whisperer Collaborations Companies To Watch cryptocurrency Cybersecurity Entrepreneur Fetcherr Finance FINQ Fintech Funding Announcement hi-tech Hi Auto Impala Investing Investors investorsummit Israel israelitech Leaders LinkedIn Leaders Metaverse Mindset Minnesota omri hurwitz PointFive PR QSR Real Estate start- up startupnation Startups Startups On Demand Tech Tech leaders Unlimited Robotics VC
  • Contact Us
  • Privacy Policy
  • Terms and conditions

© 2024 All Rights Reserved - New York Tech Media

No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital

© 2024 All Rights Reserved - New York Tech Media