classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


Securing IoT, step by step
March 2019, IT infrastructure, Cyber Security

In collaboration with other members of the Industrial Internet Consortium (IIC), Kaspersky Lab experts have formulated the Security Maturity Model (SMM) Practitioner’s Guide. This helps IoT operators define the level of security maturity they need to achieve based on their security goals and objectives, as well their appetite for risk.

The SMM builds on concepts identified in the ‘IIC Industrial Internet Security Framework’ published in 2016. The SMM is the first of its kind, discussing the newly established security maturity approach for IoT. The model identifies a security framework for IoT stakeholders based on their security levels and assesses the maturity of an organisation’s IoT systems by looking at governance, technology, and system management. Other models may address a particular industry, such as IoT but not security, or security but not IoT. The SMM covers all these aspects and highlights elements of existing models, where appropriate, to note existing work and avoid duplication.

The guidance has been made with variety of IoT stakeholders in mind. It is not only security experts who place great emphasis on enhancing the security of the infrastructure that connects information systems to physical objects, but also industrial facility operators, developers of special-purpose software, owners of relevant businesses, and regulatory authorities. Therefore, the IoT SMM, unlike usual regulator standards and requirements, takes into account the interests and security needs of all organisations and individuals involved in, and managing, IoT operations.

In addition, the practitioner’s guide contains three case studies that help IoT stakeholders to apply the Security Maturity Model. These include a smarter data-driven bottling line, an automotive gateway supporting OTA updates, and security cameras used in residential settings.

The guide helps IoT operators understand their now-state, their goal-state, and what steps they need to take to get to their goal. After assessing these, and over time, organisations may improve their security state by continuing to make assessments of their IoT system, and by making improvements based on the 36 listed parameters, up to their required level.

“The prioritisation of security measures, goal setting, and the development of a strategy for making a system “secure enough” is an objective that affects organisations’ long-term economic planning, along with investment, the choice of insurance program, or any other task with conflicting stimuli. The modern approach to such tasks includes the use of the so-called ‘nudge’ — the creation of a choice architecture that supports efficient decision-making in a certain area. The IoT SMM is a framework for such a choice architecture (nudge) in the field of IoT information security. It enables actors to take the first step (and then the second, the third, etc.) on the path toward a secure system, be it a large-scale manufacturing facility or a fitness bracelet,” says Ekaterina Rudina, senior system analyst at Kaspersky Lab ICS CERT.

The group of experts has been working on the project for almost two years: at the beginning of 2017, the Security Applicability team that focuses on the use of security practices in real-life IoT applications within the IIC started exploring a maturity model. The SMM Practitioner’s Guide is a companion piece to the ‘IoT SMM: Description and Intended Use White Paper’, which was issued earlier in 2018.

The full Security Maturity Model (SMM) Practitioner’s Guide can be found here.


  Share via Twitter   Share via LinkedIn      

Further reading:

  • 2019 Internet of Things (IoT) Barometer
    March 2019, This Week's Editor's Pick, Integrated Solutions, IT infrastructure
    A majority of businesses that use IoT technology agree that it has either disrupted their industry or will do so in the next five years.
  • Halt, who goes there?
    March 2019, Technews Publishing, Wolfpack Information Risk, This Week's Editor's Pick, Cyber Security
    As long as organisations treat their physical and cyber domains as separate, there is little hope of securing either one.
  • IoT is convergence in action
    March 2019, Gijima Electronic and Security Systems (GESS), NEC XON, Technews Publishing, Axiz, G4S South Africa, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure
    The Internet of Things gains more than enough attention these days, but the IoT demonstrates the reality of the convergence between the physical and cyber worlds, and physical security is part of it.
  • Stop hacking of access control ­systems
    March 2019, This Week's Editor's Pick, Access Control & Identity Management, Cyber Security
    Think someone hacking your access control system not a big deal? Scott Lindley suggests that you think again.
  • New cybersecurity pavilion for Securex 2019
    March 2019, Securex South Africa , This Week's Editor's Pick, Cyber Security, News, Conferences & Events, Training & Education
    Securex South Africa 2019 has announced that 4Sight Technologies, a subsidiary of an international holdings company focusing on investing in Industry 4.0 companies, has signed on as the official sponsor ...
  • Managed IT security solution
    March 2019, Cyber Security, IT infrastructure, Products
    The LanDynamix fully managed IT security stack ensures that all the main attack vectors typically used by hackers to breach a network are protected and proactively monitored.
  • Top five security trends to look out for in 2019
    March 2019, Genetec, CCTV, Surveillance & Remote Monitoring, Cyber Security
    From the continued focus on cybersecurity to the acquisition of global players, Genetec highlights the top five security trends to look forward to in 2019.
  • The legalities of the digital signature
    March 2019, This Week's Editor's Pick, Cyber Security, Security Services & Risk Management
    Electronic signatures and digital signatures differ significantly; it is critical that organisations recognise the legal implications of the electronic signature and the risk of fraud.
  • Security on a chip
    March 2019, News, IT infrastructure
    New converged solution by G+D Mobile Security integrates SIM and other security applications on a single chip.
  • Intelligent storage solutions
    March 2019, IT infrastructure
    New, intelligent storage strategies vital as tighter data security regulations put pressure on businesses.
  • As-a-Service solutions boost information security
    March 2019, IT infrastructure
    The emerging concept of Everything-as-a-Service (XaaS) makes advanced technologies and solutions more cost effective and available to a broader spectrum of business.
  • 2019 cybersecurity crystal ball
    February 2019, Wolfpack Information Risk, This Week's Editor's Pick, Cyber Security
    Craig Rosewarne, MD of Wolfpack Information Risk says the cyber landscape will be more volatile and dangerous in 2019, are we ready?

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.