FEATURE
detection and response by focusing
on attacker behaviours rather than
focusing on identifying previous known
threats. Such an automated approach
leaves no security blinds spots, even in
IoT heavy enterprises.
SCOTT GORDON, (CISSP) CMO,
PULSE SECURE
To balance the embrace of IoT and its
inherent risk, enterprises and CISOs
should consider multiple preventive
measures to safely connect IoT to the
network and its critical resources.
They first need to take a cautious
approach, carefully researching and
profiling the devices they plan to onboard
before they fully commit to them.
www.intelligentciso.com
|
Issue 18
You must be able to
see and track every
endpoint and device
on the network in
order to protect it.
Visibility and control over those devices
is paramount. You must be able to see
and track every endpoint and device
on the network in order to protect it.
Implement strong network segmentation
so that IoT devices remain in their own
realm, separated from other IoT classes
and certainly separated from critical
information systems. This means that if a
breach ever comes via an IoT device, the
threat is contained and cannot spread
laterally to other, more critical parts of
the network.
Automating the onboarding of IoT
devices within a zero trust model brings
many benefits. It allows devices to be
authenticated, classified and dynamically
placed in their respective network realm,
with their respective access profiles.
This makes life easier for security staff
who are already understaffed and
inundated with administrative tasks.
From a higher-level perspective, it means
that security policies are always enforced,
providing continuous compliance, making
security audits more bearable. u
39