Securing IoT, step by step

March 2019 Infrastructure, Information Security

In collaboration with other members of the Industrial Internet Consortium (IIC), Kaspersky Lab experts have formulated the Security Maturity Model (SMM) Practitioner’s Guide. This helps IoT operators define the level of security maturity they need to achieve based on their security goals and objectives, as well their appetite for risk.

The SMM builds on concepts identified in the ‘IIC Industrial Internet Security Framework’ published in 2016. The SMM is the first of its kind, discussing the newly established security maturity approach for IoT. The model identifies a security framework for IoT stakeholders based on their security levels and assesses the maturity of an organisation’s IoT systems by looking at governance, technology, and system management. Other models may address a particular industry, such as IoT but not security, or security but not IoT. The SMM covers all these aspects and highlights elements of existing models, where appropriate, to note existing work and avoid duplication.

The guidance has been made with variety of IoT stakeholders in mind. It is not only security experts who place great emphasis on enhancing the security of the infrastructure that connects information systems to physical objects, but also industrial facility operators, developers of special-purpose software, owners of relevant businesses, and regulatory authorities. Therefore, the IoT SMM, unlike usual regulator standards and requirements, takes into account the interests and security needs of all organisations and individuals involved in, and managing, IoT operations.

In addition, the practitioner’s guide contains three case studies that help IoT stakeholders to apply the Security Maturity Model. These include a smarter data-driven bottling line, an automotive gateway supporting OTA updates, and security cameras used in residential settings.

The guide helps IoT operators understand their now-state, their goal-state, and what steps they need to take to get to their goal. After assessing these, and over time, organisations may improve their security state by continuing to make assessments of their IoT system, and by making improvements based on the 36 listed parameters, up to their required level.

“The prioritisation of security measures, goal setting, and the development of a strategy for making a system “secure enough” is an objective that affects organisations’ long-term economic planning, along with investment, the choice of insurance program, or any other task with conflicting stimuli. The modern approach to such tasks includes the use of the so-called ‘nudge’ — the creation of a choice architecture that supports efficient decision-making in a certain area. The IoT SMM is a framework for such a choice architecture (nudge) in the field of IoT information security. It enables actors to take the first step (and then the second, the third, etc.) on the path toward a secure system, be it a large-scale manufacturing facility or a fitness bracelet,” says Ekaterina Rudina, senior system analyst at Kaspersky Lab ICS CERT.

The group of experts has been working on the project for almost two years: at the beginning of 2017, the Security Applicability team that focuses on the use of security practices in real-life IoT applications within the IIC started exploring a maturity model. The SMM Practitioner’s Guide is a companion piece to the ‘IoT SMM: Description and Intended Use White Paper’, which was issued earlier in 2018.

The full Security Maturity Model (SMM) Practitioner’s Guide can be found here.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New commercial and technical appointments at Veeam
News & Events Infrastructure
Veeam Software has announced two senior appointments in its South African business as it continues to invest in local market growth and partner and customer engagement.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.