Strategic Principles For Securing The Internet of Things (Iot)
Strategic Principles For Securing The Internet of Things (Iot)
STRATEGIC
PRINCIPLES FOR
SECURING THE
INTERNET OF THINGS
(IoT)
Version 1.0
November 15, 2016
INTRODUCTION
AND OVERVIEW
The IoT ecosystem introduces risks that include malicious actors manipulating the flow of
information to and from network-connected devices or tampering with devices themselves,
which can lead to the theft of sensitive data and loss of consumer privacy, interruption of
business operations, slowdown of internet functionality through large-scale distributed denial-of-
service attacks, and potential disruptions to critical infrastructure.
Last year, in a cyber attack that temporarily disabled the power grid in parts of Ukraine, the
world saw the critical consequences that can result from failures in connected systems.
Because our nation is now dependent on properly functioning networks to drive so many life-
sustaining activities, IoT security is now a matter of homeland security.
1 In this context, the term IoT refers to the connection of systems and devices with primarily physical purposes (e.g.
sensing, heating/cooling, lighting, motor actuation, transportation) to information networks (including the Internet) via
interoperable protocols, often built into embedded systems.
2 of 17
It is imperative that government and industry work together, quickly, to ensure the IoT
ecosystem is built on a foundation that is trustworthy and secure. In 2014, the President’s
National Security Telecommunications Advisory Committee (NSTAC) highlighted the need for
urgent action.
IoT adoption will increase in both speed and scope, and [will] impact virtually all sectors of
our society. The Nation’s challenge is ensuring that the IoT’s adoption does not create
undue risk. Additionally…. there is a small—and rapidly closing—window to ensure that
IoT is adopted in a way that maximizes security and minimizes risk. If the country fails to
do so, it will be coping with the consequences for generations. 2
The time to address IoT security is right now. This document sets the stage for engagement
with the public and private sectors on these key issues. It is a first step to motivate and frame
conversations about positive measures for IoT security among IoT developers, manufacturers,
service providers, and the users who purchase and deploy the devices, services, and systems.
The following principles and suggested practices provide a strategic focus on security and
enhance the trust framework that underpins the IoT ecosystem.
The following principles, set forth in the next section, offer stakeholders a way to organize their
thinking about how to address these IoT security challenges:
2National Security Telecommunications Advisory Committee Report to the President on the Internet of Things,
November 19, 2014.
3 of 17
Prioritize Security Measures According to Potential Impact
As with all cybersecurity efforts, IoT risk mitigation is a constantly evolving, shared responsibility
between government and the private sector. Companies and consumers are generally
responsible for making their own decisions about the security features of the products they
make or buy. The role of government, outside of certain specific regulatory contexts and law
enforcement activities, is to provide tools and resources so companies, consumers, and other
stakeholders can make informed decisions about IoT security.
3 consider the security of the functions offered by those IoT devices, as well
as the underlying security of the infrastructure enabling these services;
and
4 of 17
STRATEGIC PRINCIPLES
FOR SECURING IOT
The principles set forth below are designed to improve security of IoT across the full
range of design, manufacturing, and deployment activities. Widespread adoption of
these strategic principles and the associated suggested practices would dramatically
improve the security posture of IoT. There is, however, no one-size-fits-all solution for
mitigating IoT security risks. Not all of the practices listed below will be equally relevant
across the diversity of IoT devices. These principles are intended to be adapted and
applied through a risk-based approach that takes into account relevant business
contexts, as well as the particular threats and consequences that may result from
incidents involving a network-connected device, system, or service.
Incorporate Security
at the Design Phase
Security should be evaluated as an integral
component of any network-connected device. While What are the potential impacts
there are exceptions, in too many cases economic of not building security in
drivers or lack of awareness of the risks cause during design?
businesses to push devices to market with little
regard for their security. Building security in at the Failing to design and implement
design phase reduces potential disruptions and adequate security measures
avoids the much more difficult and expensive could be damaging to the
endeavor of attempting to add security to products manufacturer in terms of financial
after they have been developed and deployed. By costs, reputational costs, or
focusing on security as a feature of network- product recall costs. While there
connected devices, manufacturers and service is not yet an established body of
providers also have the opportunity for market case law addressing IoT context,
differentiation. The practices below are some of the traditional tort principles of
most effective ways to account for security in the product liability can be expected
earliest phases of design, development, and to apply.
production.
SUGGESTED PRACTICES:
Enable security by default through unique, hard to crack default user names and
passwords. User names and passwords for IoT devices supplied by the manufacturer are
5 of 17
often never changed by the user and are easily cracked. Botnets operate by continuously
scanning for IoT devices that are protected by known factory default user names and
passwords. Strong security controls should be something the industrial consumer has to
deliberately disable rather than deliberately enable.
Build the device using the most recent operating system that is technically viable and
economically feasible. Many IoT devices use Linux operating systems, but may not use
the most up-to-date operating system. Using the current operating system ensures that
known vulnerabilities will have been mitigated.
Use hardware that incorporates security features to strengthen the protection and
integrity of the device. For example, use computer chips that integrate security at the
transistor level, embedded in the processor, and provide encryption and anonymity.
6 of 17
Promote Security Updates and
FOCUS ON: NTIA Multi-
Vulnerability Management
Stakeholder Process on Patching
Even when security is included at the design and Updating
stage, vulnerabilities may be discovered in
products after they have been deployed. These The National Telecommunications
flaws can be mitigated through patching, security and Information Administration
updates, and vulnerability management (NTIA) has convened a multi-
strategies. In designing these strategies, stakeholder process concerning the
developers should consider the implications of a “Internet of Things Upgradability and
device failure, the durability of the associated Patching” to bring stakeholders
product, and the anticipated cost of repair. In the together to share the range of views
absence of the ability to deploy security updates, on security upgradability and
manufacturers may be faced with the decision patching, and to establish more
between costly recalls and leaving devices with concrete goals for industry-wide
known vulnerabilities in circulation. adoption.
SUGGESTED PRACTICES:
Consider ways in which to secure the device over network connections or through
automated means. Ideally, patches would be applied automatically and leverage
cryptographic integrity and authenticity protections to more quickly address vulnerabilities.
7 of 17
Develop an end-of-life strategy for IoT products. Not all IoT devices will be indefinitely
patchable and updateable. Developers should consider product sunset issues ahead of
time and communicate to manufacturers and consumers expectations regarding the device
and the risks of using a device beyond its usability date.
8 of 17
Build on
FOCUS ON: NIST Cybersecurity Risk Management
Recognized Framework
Security Practices
The National Institute of Standards and Technology
Many tested practices used
(NIST) published a framework for cybersecurity risk
in traditional IT and network
management that has been widely adopted by private
security can be applied to
industry, integrated across sectors, and within
IoT. These approaches can organizations. The framework is widely recognized as a
help identify vulnerabilities, comprehensive touchstone for organizational cyber risk
detect irregularities, respond
management https://www.nist.gov/cyberframework. While
to potential incidents, and
not specific to IoT, the risk framework provides a starting
recover from damage or
point for considering risks and best practices.
disruption to IoT devices.
SUGGESTED PRACTICES:
Start with basic software security and cybersecurity practices and apply them to the
IoT ecosystem in flexible, adaptive, and innovative ways.
9 of 17
Prioritize Security
Measures According to
Should IoT security measures focus on the
Potential Impact IoT device?
Risk models differ substantially across
the IoT ecosystem. For example, Since the purpose of all IoT processes is to
industrial consumers (such as nuclear take in information at a physical point and
reactor owners and operators) will have motivate a decision based on that information
different considerations than a retail (sometimes with physical consequences),
consumer. The consequences of a security measures can focus on one or more
security failure across different parts of the IoT process. As noted earlier, the
customers will also vary significantly. risks to IoT begin with the specific device, but
Focusing on the potential are certainly not limited to it. Developers,
consequences of disruption, breach, or manufacturers, and service providers should
malicious activity across the consumer consider specific risks to the IoT device as well
spectrum is therefore critical in as process and service, and make decisions
determining where particular security based on relative impact to all three as to where
efforts should be directed, and who is the most robust measures should be applied.
best able to mitigate significant
consequences.
SUGGESTED PRACTICES:
Know a device’s intended use and environment, where possible. This awareness helps
developers and manufacturers consider the technical characteristics of the IoT device,
how the device may operate, and the security measures that may be necessary.
Perform a “red-teaming” exercise, where developers actively try to bypass the security
measures needed at the application, network, data, or physical layers. The resulting
analysis and mitigation planning should help prioritize decisions on where and how to
incorporate additional security measures.
Identify and authenticate the devices connected to the network, especially for
industrial consumers and business networks. Applying authentication measures for known
devices and services allows the industrial consumer to control those devices and services
that are within their organizational frameworks.
10 of 17
Promote Transparency
across IoT
Where possible, developers and manufacturers need to know their supply chain, namely,
whether there are any associated vulnerabilities with the software and hardware components
provided by vendors outside their organization. Reliance on the many low-cost, easily
accessible software and hardware solutions used in IoT can make this challenging. Because
developers and manufactures rely on outside sources for low-cost, easily accessible software
and hardware solutions, they may not be able to accurately assess the level of security built into
component parts when developing and deploying network-connected devices. Furthermore,
since many IoT devices leverage open source packages, developers and manufacturers many
not be able to identify the sources of these component parts.
Increased awareness could help manufacturers and industrial consumers identify where and
how to apply security measures or build in redundancies. Depending on the risk profile of the
product in question, developers, manufacturers, and service providers will be better equipped to
appropriately mitigate threats and vulnerabilities as expeditiously as possible, whether through
patching, product recall, or consumer advisory.
SUGGESTED PRACTICES:
Conduct end-to-end risk assessments that account for both internal and third party
vendor risks, where possible. Developers and manufacturers should include vendors and
suppliers in the risk assessment process, which will create transparency and enable them
to gain awareness of potential third-party vulnerabilities and promote trust and
transparency. Security should be readdressed on an ongoing basis as the component in
the supply chain is replaced, removed or upgraded.
Consider developing and employing a software bill of materials that can be used as a
means of building shared trust among vendors and manufacturers. Developers and
manufacturers should consider providing a list of known hardware and software
components in the device package in a manner which is mindful of the need to protect
intellectual property issues. A list can serve as valuable tool for others in the IoT
ecosystem to understand and manage their risk and patch any vulnerabilities immediately
following any incident.
11 of 17
Connect Carefully
Does every networked device
and Deliberately need continuous, automated
IoT consumers, particularly in the industrial connection to the Internet?
context, should deliberately consider whether
continuous connectivity is needed given the use of In 2015, the Federal Trade
the IoT device and the risks associated with its Commission published a guide
disruption. IoT consumers can also help contain called “Start with Security: A Guide
the potential threats posed by network connectivity for Businesses” to help them
by connecting carefully and deliberately, and determine this very question. While
weighing the risks of a potential breach or failure it may be convenient to have
of an IoT device against the costs of limiting continuous network access, it may
connectivity to the Internet. not be necessary for the purpose of
the device – and systems; for
In the current networked environment, it is likely example, nuclear reactors, where a
that any given IoT device may be disrupted during continuous connection to the
its lifecycle. IoT developers, manufacturers, and internet opens up the opportunity
consumers should consider how a disruption will for an intrusion of potentially
impact the IoT device’s primary function and enormous consequences.
business operations following the disruption.
SUGGESTED PRACTICES:
Advise IoT consumers on the intended purpose of any network connections. Direct
internet connections may not be needed to operate critical functions of an IoT device,
particularly in the industrial setting. Information about the nature and purpose of
connections can inform consumer decisions.
Make intentional connections. There are instances when it is in the consumer’s interest
not to connect directly to the Internet, but instead to a local network that can aggregate
and evaluate any critical information. For example, Industrial Control Systems (ICS)
should be protected through defense in depth principles as published by https://ics-
cert.us-cert.gov/recommended_practices.
12 of 17
CONCLUSION
Our nation cannot afford a generation of IoT devices deployed with little consideration
for security. The consequences are too high given the potential for harm to our critical
infrastructure, our personal privacy, and our economy.
As DHS issues these principles, we recognize the efforts underway by our colleagues at other
federal agencies, and the work of private sector entities to advance architectures and institute
practices to address the security of the IoT. This document is a first step to strengthen those
efforts by articulating overarching security principles. But next steps will surely be required.
DHS identifies four lines of effort that should be undertaken across government and industry to
fortify the security of the IoT.
13 of 17
how tort liability, cyber insurance, legislation, regulation, voluntary
certification management, standards-settings initiatives, voluntary
industry-level initiatives, and other mechanisms could improve
security while still encouraging economic activity and
groundbreaking innovation. Going forward, DHS will convene with
partners to discuss these critical matters and solicit ideas and
feedback.
DHS looks forward to these next collaborative steps. Together, we can, and must, address
these complex challenges. By doing so, we will ensure that our network-connected future is not
only innovative, but also secure and built to last.
14 of 17
APPENDIX: GUIDANCE AND
ADDITIONAL RESOURCES
The principles in this document have been developed based on information gathered from
industry reports, and through discussions with private industry, trade associations, non-
governmental entities, and Federal partners, especially with NIST and NTIA.
• NTIA
1. Notice and Request for Comments on the Benefits, Challenges, and Potential
Roles for the Government in Fostering the Advancement of the Internet of Things
a) Comments
2. Green Paper – Cybersecurity, Innovation and the Internet Economy, 2011
3. New Insights into the Emerging Internet of Things
4. Remarks of Deputy Assistant Secretary Simpson at Fostering the Advancement
of the Internet of Things Workshop, 9/9/2016
a) Announcement for Fostering the Advancement of the Internet of Things
Workshop
5. Internet Policy Task Force resource/review/cataloging of the benefits, challenges,
and potential roles for the government in fostering the advancement of the
Internet of Things.
• NIST
1. Cybersecurity Framework
2. Cyber-Physical Systems (CPS) Program
a) CPS Public Working Group (PWG) draft Cyber-Physical Systems (CPS)
Framework Release 1.0
o Comments accepted through 9/2/2015
15 of 17
3. Smart-Grid Program
4. International Technical Working Group on IoT-Enabled Smart City Framework
5. NIST Special Publication (SP) 800-183, Network of Things, 7/28/2016.
a) NIST news release
External Sources
The list of additional resources is provided solely as a reference and does not constitute an
endorsement by the Department of Homeland Security (DHS). DHS does not endorse any
commercial product, service, or enterprise.
• Atlantic Council
1. Smart Homes and the Internet of Things –
http://www.atlanticcouncil.org/publications/issue-briefs/smart-homes-and-the-
internet-of-things
• I Am The Cavalry
1. Five Star Automotive Cyber Safety Framework – https://iamthecavalry.org/5star
2. Hippocratic Oath for Connected Medical Devices – https://iamthecavalry.org/oath
• Online Trust Alliance
1. Consumer Best Practices
• Industrial Internet Consortium: http://www.iiconsortium.org/IISF.htm
• Open Web Application Security Project (OWASP)
16 of 17
1. Internet of Things Project
https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project
2. Internet of Things Security Guidance
https://www.owasp.org/index.php/IoT_Security_Guidance
• Safecode.org relevant industry best practices www.safecode.org
• AT&T
1. Exploring IoT Security
• Symantec
1. An Internet of Things Reference Architecture
17 of 17