Intelligent CISO Issue 30 | Page 38

A unified strategy that addresses both the cloud and IoT using advanced threat intelligence and automation is vital .
When an IoT device is compromised , your public and private clouds are at risk and this can eventually affect your core network and even your customers .
FEATURE

A unified strategy that addresses both the cloud and IoT using advanced threat intelligence and automation is vital .

security measures and an inability to be updated even when network managers identify a vulnerability .
IoT and the cloud : A uniquely challenging combination
Every IoT device is potentially another cloud connection and every connection to the network represents yet another security vulnerability . So , what does this mean for your organisation ?
As you develop new IoT assets and move to the cloud , your security strategies for both need to be in sync with one another . When an IoT device is compromised , your public and private clouds are at risk and this can eventually affect your core network and even your customers .
How to secure IoT and cloud connections
There are six key considerations when it comes to securing IoT and cloud environments :
1 . Robust vulnerability management . Understanding what is on your network and the potential threats they pose is critical . Keeping track of your IoT devices ensures they can be updated with security patches ( where possible ), properly segmented and isolated , or protected using effective proximity controls that can offer defence in the case of an attack .
2 . Compensating controls . By implementing proper controls , security teams can mitigate risks posed by those devices that can ’ t be updated . Proximity devices , including firewall and IPS systems , should be leveraged to ensure the inspection of data moving between IoT devices and the cloud . Additionally , behaviour-based detection can be used to identify traffic discrepancies , such as the communication between botnet command and control centres .
3 . Encryption . This practice should be leveraged where possible to ensure the confidentiality and integrity of data .

When an IoT device is compromised , your public and private clouds are at risk and this can eventually affect your core network and even your customers .

4 . Hardened security at the cloud edge . Not all IoT environments are secure , so hardening the cloud network is essential . In addition to other mitigation efforts , avoiding DDoS attacks and malware is also a matter of inspecting traffic at the cloud edge .
5 . Integration and automation . The policies that govern security tools and the collection of security event data need to exist within the same management platform . This will
38 Issue 30 | www . intelligentciso . com