The increasing importance of IoT security has enterprises searching for the best ways — often involving zero trust principles — to establish secure connections
On average, a ransomware attack in 2022 took 237 days to identify and 89 days to contain – 49 days longer than the average data breach. It's like discovering a hidden leak in your newly remodeled kitchen after your contractor was long gone. Just as the late detection of a kitchen leak can leave extensive water damage and a hefty repair bill, a delay in identifying ransomware breaches can wreak havoc on an enterprise's digital infrastructure and bottom line.
IoT devices, such as video surveillance cameras and ATMs, are to blame for many of these kinds of attacks. They not only expand a business' attack surface but can also act as entry points to the corporate network and be easily exploited. With an increasing reliance on IoT, enterprises need secure IoT tunneling that locks down communication and provides network access to only trusted users.
Let’s explore IoT tunneling — a vital upgrade in one’s digital security blueprint, ensuring vulnerabilities are spotted before they turn into digital floods.
Why do IoT devices pose more security risks?
Sometimes called “headless” devices, IoT devices are a prime target for security threats due to their basic hardware and communication protocols. They typically require a simple password for access, have one primary function, and don’t have the processing power to incorporate on-board security. Think of video surveillance cameras placed around a building, where the device’s sole purpose is to record video — security isn’t really its forte.
To put things into perspective, say a bad actor gains access to the network through an IoT device due to an exposed Internet Protocol (IP) address. Because they’ve compromised that device, they can now move laterally to other parts of the network. This can happen over the course of months, as hackers cautiously work to determine network topology. Eventually, they’ll find what they came for, putting the entire network at risk. A real-world example of this is the massive 2013 breach where a malicious actor gained access to payment data for millions of customers through a third-party managed HVAC system.
How does 5G play a role in cellular IoT connectivity?
Accessing a wired or fiber connection for a remote IoT device isn't always a straightforward task. Take, for instance, smart cities with abundant fiber connectivity. Often, that connectivity is allocated to enable essential infrastructure like traffic controllers. However, the process of digging trenches to lay fiber underground and running it up utility poles is costly and disruptive to traffic operations.
5G has made connecting IoT devices easy, fueling a surge in their adoption by enterprise businesses. IT teams can now quickly and seamlessly connect dispersed IoT devices in locations where fiber isn’t the best option. 5G delivers faster, more reliable, low-latency connectivity, enabling real-time data processing and applications that weren’t possible with older technologies.
What factors should an enterprise consider when improving the security of IoT devices?
Because of the inherent security risk IoT devices bring, it’s important for enterprises to take the right steps to secure their connections. A few factors to keep in mind:
Hidden IP addresses
Enterprises are more vulnerable to data and resource loss when their IP addresses are publicly exposed, and securing traffic over the WAN via encryption is imperative for those utilizing a public cellular network. While a traditional Virtual Private Network (VPN) can establish secure, encrypted connections over public networks, it falls short in protecting IP addresses. Using a solution based on zero trust principles conceals these IP addresses to prevent network topology discovery and lateral movement.
Denial by default with zero trust
A zero trust security model challenges the traditional notion of trust within a network. Instead of assuming that everything inside a network is trusted by default, it operates on the principle that no user is trusted and must be continually verified, regardless of the location of the user or device. Zero trust IoT protection ensures IoT devices don’t have any more access than is absolutely necessary and can only communicate with authorized hosts.
What sets IoT apart from standard user access is its inherent simplicity. A video camera may primarily communicate with a video management system (VMS) while transmitting a live feed to a real-time monitoring station. The camera's communication needs are limited, and zero trust tunnels help secure this by restricting communication to only those essential applications, ensuring that the camera interacts with nothing else.
Secure third-party access
Enterprise IoT security risks are further amplified when third-party contractors and suppliers enter the picture. Often, they need access to the network for set up, troubleshooting, management, and operation of these IoT devices, so securing IoT remote access is critical.
With a ZTNA solution, businesses can manage user-to-IoT connections and provide simple and safe access to only the systems on the WAN they are authorized to access without having any visibility or access to anything else.
How IoT tunneling enhances network security
To minimize the risk of an attack, organizations should create a network environment that aids in the protection of their IoT devices.
With the right solution in place, businesses can create secure tunnels for their IoT routers for locked-down communication, minimizing the risk of a lateral attack. By switching from a VPN to a network built on zero trust principles, such as Cradlepoint’s NetCloud Exchange (NCX) Secure Connect, organizations can easily deploy and scale secure zero trust tunnels for IoT routers, enabling end-to-end encrypted communications.