SHARE
Facebook X Pinterest WhatsApp

Security Needs to Get Better with the Internet of Things

When moving to the Internet of Things (IoT), enterprises need to have renewed security plans in place. RTInsights expert blogger David Linthicum explains why.

Jun 18, 2015

When moving to the Internet of Things (IoT), enterprises need to have renewed security plans in place. RTInsights expert blogger David Linthicum explains why.

A growing number of connected devices will add to an enterprise’s “attack surface” according to RAND Corporation in its latest study on cybersecurity, “The Defender’s Dilemma: Charting a Course Toward Cybersecurity.” With the growth of the Internet of Things (IoT), we’re going to get crazy with the number and types of devices that we connect to our networks—and typically talk to our data storage systems as well.

At issue are the ways in which hackers can gain access to internal systems. The number has gone way up, with connected factory robots, thermostats, MRIs and other sensors that are set up to gather data. If any one of those sensors is vulnerable to attack, they could allow access to other network-connected resources that could compromise sensitive data or take systems down.

When moving to the IoT, enterprises need to have renewed security plans in place. This means looking at all aspects of application, data and network security to ensure that added sensors and devices are working and playing well with the current security approaches and technologies. In many cases, the addition of these devices and sensors do not take into account overall security policies—and they actually make the enterprise less secure.

Ensuring Security in Devices and Sensors

Identity and Access Management (IAM), also known as Identity Management (IdM), is not new but is a preferred approach to securing IoT devices and sensors. With the emerging use of the IoT, I think IAM is clearly the best security model and best practice. Indeed, many cloud providers (including Amazon Web Services), provide IAM as a service right out of the cloud. Others (including Ping Identity) require you to select and deploy third-party IAM systems.

The concept is simple: provide a security approach and technology that enables the right individuals to access the right resources at the right times for the right reasons. The concept follows the principles that everything and everyone gets an identity—including humans, servers, sensors, devices, application programming interfaces (APIs), applications and data. Once verification occurs, it’s just a matter of defining which identities can access other identities and creating policies that define the limits of that relationship.

An example would be to define and store the identity of a set of device-based APIs that are only to be leveraged by a single set of smart phones that run a certain application. The APIs each have an identity as do the smart phones, the application and the humans using the smart phones. They have to authenticate each other’s identity before they are granted access, or grant access, using an IAM. Each checks with the IAM each time they interact with another resource (such as in the example of an application running on a smart phone, linking to and invoking a device API).

Security should be systemic to your IoT strategy. You need to include IoT as you consider security models and technology. IAM is a good place to start, but the reality is, each solution needs to be crafted to your exact requirements. Start your planning now.


Want more? Check out our most-read content:

Frontiers in Artificial Intelligence for the IoT: White Paper
Research from Gartner: Real-Time Analytics with the Internet of Things
How Real-Time Railroad Data Keeps Trains Running
Operational Analytics: Five Tips for Better Decisions
Why Gateways and Controllers Are Critical for IoT Architecture

Liked this article? Share it with your colleagues!

thumbnail
David Linthicum

With more than 13 books on computing and 3,000 published articles, David has shown businesses how to use resources more productively and innovate constantly (full bio). Reach him on twitter @DavidLinthicum.

Recommended for you...

Moments From My So-Called Real-Time Life
Joe McKendrick
Nov 8, 2018
Why Data Is the Future of Live Events
Bill Bosak
Feb 14, 2017
Why Companies Need Data Validation
Michael Ludwig
Nov 10, 2015
A Sales Automation Architecture for the IoT Era
Giles House
Nov 6, 2015

Featured Resources from Cloud Data Insights

The Difficult Reality of Implementing Zero Trust Networking
Misbah Rehman
Jan 6, 2026
Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.