Jasper is now part of Cisco

Learn More

Privacy Statement has been updated. Read statement

About Cisco

Jasper is now part of Cisco

Learn More

About Cisco

Privacy Statement has been updated. Read statement

IoT Security Checklist

Security-Series-5-Desktop-Listing
Security-Series-5-Mobile-Main
Security-Series-5-Mobile-Listing
March 14, 2017

by

Sanjay Khatri

The promise of IoT is astronomical – enabling companies across every industry to become a connected service business. But to achieve meaningful results, enterprises need to follow a clear checklist to ensure that all the components in their IoT infrastructure are secure.

preview

Throughout our series on IoT Security, we’ve explored key risk factors and best practices for security at the various layers of the IoT ecosystem, from devices to networks and data transport to cloud applications. Here we’ll hit the highlights with a practical checklist you can put to work:

  • Take a holistic approach
    Make sure you understand all the players in the complex ecosystem of IoT security. Look at everything from device manufacturers and network providers to connectivity management platforms and industry standards. It will help you plan and implement a more solid IoT strategy, one that ensures each area has the appropriate security for your specific business. For more details, check out part 1 in this series.
  • Evaluate security end-to-end
    Track all the various layers in the IoT service to ensure strict identification, encryption and authentication protocols are in place to protect both your customers and your business. As an example, you’ll want to verify endpoint devices with cryptographically-generated digital signatures and ensure any user access to those devices is properly secured. Also safeguard data in transit with proper encryption and the use of secure private networks. And on the application level, make sure you have granular security controls such as role-based access so only the appropriate employees can access the parts of the application relevant to their work. Learn more in part 2, part 3, and part 4 of this series.
  • Choose the right connectivity
    Make sure your choice of connectivity reflects the level of security you require. Cellular connectivity uses global standards such as ciphering keys and encryption algorithms on the SIM itself to securely transmit and receive data. Cellular also allows you to parse out device data into secure private networks to isolate it from other network traffic, like the Internet. For a deeper dive on network and data security, see part 3.
  • Utilize an IoT connectivity management platform
    A connectivity management cloud platform such as Cisco Jasper Control Center helps ensure you can deliver secure, reliable IoT services at the lowest cost, anywhere in the world. To safeguard your business, the platform constantly monitors all connected devices, and you can establish rules-based security policies that automatically take corrective action if anomalous behavior is detected.
  • Comply with standards
    Be prepared by understanding and implementing recommendations and requirements from national and international councils for protecting consumer personal and financial data as well as regulated data. Make sure data is transmitted, stored and used according to local privacy and data protection legislation.

As we often say, delivering secure IoT services takes a village. Understanding the IoT ecosystem can help businesses prepare for the complexities, and implement the appropriate security measures for their IoT use cases.

Coming soon: Our IoT Security blog series will be available as a downloadable guide on our website. Stay current with our latest updates– subscribe to our blog. 

Post a comment

Post a Comment:

Subscribe

By email

Follow Us