CSAResearch

Security Controls for the IoT
CSA is researching IoT security. We'd like to hear from our community regarding the topic of security controls for IoT.
John Yeoh
A2 One challenge with government regulation with IoT is the politics with international boundaries. Many IoT devices are manufactured in China for other Nation-state markets. Can this be properly regulated? #csaresearch #iot #iotsecurity
Shamun Mahmud
It's not like you can write an "Internet of Things Law". That said, it would take a combination of government, SDOs, and Industry to devise cohesive regulations. #CSAResearch @cloudsa

(edited)

Shamun Mahmud
By SDOs, I am referring to Standards Development Organizations such as ENISA, IEEE, NIST, ISO, etc. #NIST #IEEE #IoT #IOTsecurity #ISO #CSAResearch

(edited)

Sean Heide
Interesting concept however, why couldn't you write a "law", it would just standardize regulations regarding security features etc. Maybe that's needed for billions of devices. They did it for cars.
John Yeoh
Don't forget the #California IoT Cybersecurity Improvement Act of 2017. But I do think that industry organizations like @cloudsa has an opportunity to outline a security framework for IoT that can serve as a baseline for most Enterprises adopting IoT.
Shamun Mahmud
@HeideSean A regulatory framework isn’t well defined and Government agencies will likely need to work together as cases arise that expose the potential downsides of widespread connectivity. This is where orgs such as @cloudsa can bridge the gap #CSAResearch

(edited)

Doug Egan
Agreed. I believe South Carolina privacy law requires all IoT *manufacturers* build-in security to all IoT devices. Enforcement will be difficult. #CSAResearch
Sean Heide
@FLDougEgan I agree, putting security features into these devices does not mean continuous practice necessarily. When you say build in, is this things such as firewalls, password encryption etc?
ramon
Manufacturing of IoT devices in China and @huawei devices must compliance with common criteria CC and GDPR EU to market in CE stamp
Doug Egan
@HeideSean I will need to re-visit the legislation to be sure of the details Sean. I will post the details soon. #CSAResearch
Doug Egan
@HeideSean The #CCPA requires manufacturers of devices to embed “reasonable” security features, focusing entirely on password authentication. #CSAResearch
Doug Egan
What about other threats to IoT devices? IMHO automatic firmware updates should also be required.
ramon
Remember the mandatory of PbD & Default in IoT Devices design phase. #CSAResearch
John Furrier
This was very telling at AWS the impact to security is interesting  https://video.cube365.net/c/910400 
CloudSecurityAlliance
Q1 Why should we care about IoT Security? Is it that different than current security measures? #CSAResearch
Shamun Mahmud
with the IoT, we need to ensure that not just anyone can access our data. IoT devices generate lots of personal data. Including Personally Identifiable Information (PII) like name, address, passwords, and even location. #CSAResearch
ramon
Medical devices the confidentiality PII is High
Sean Heide
@ramoncod That is one of the biggest risks with moving forward with medical devices in my opinion. There is SO much information for a single person.
ramon
@HeideSean of course 🧐 Completely agree
ramon
All IoT medical devices with (PHI & PII) must be out. Be careful with the use of @apple like a medical devices and connect to Big data without compliance with HIPAA.
CloudSecurityAlliance
Thanks everyone in #CSAResearch for joining. Until next time!
CloudSecurityAlliance
Q6 What can we learn from and improve for Industrial Control Systems and the IoT?

(edited)

John Yeoh
A5 If you think about transportation, utilities, and hospitals on the smart grid, I wouldn't want to be caught in a nation-state war without securing these major infrastructures. Catastrophic consequences! #csaresearch #iot #iotsecurity
Sean Heide
completely agree
CloudSecurityAlliance
Q5 How does IoT security fit into Smart Cities?
Sean Heide
A lot of the application protocols that run these cities and devices are insecure by design. Meaning M2M that utilize all of these devices within a smart city as well as large scale have possible flaws that could create a larger risk.
John Yeoh
A4 We see connected vehicles taking advantage of this space. Real-time analytics at the edge has processing value. Also can offer cost saving from your service provider. #csaresearch #iot #iotsecurity
John Yeoh
Is anyone working at the #fogcomputing layer for IoT? When cloud connectivity and latency is an issue. There is still opportunity for better interoperability at this layer into multiple service platforms. #csaresearch #iot #iotsecurity
ramon

with @commmaritimehub infrastructure the latency is very low at the sea, into 200 NM. We have had a good experience with. #csaresearch
CloudSecurityAlliance
Q4 What concerns and opportunities are there in the “Fog” or edge layer for IoT devices?
Sean Heide
The edge is still just geographically located servers for these devices. With that said, with the proximity to a multitude of devices, security responses may have to act more diligently and be in place.