• Home
  • Industries
    • Defense
    • Financial
    • Healthcare
  • Services
    • Advisory & Consultation
    • Policy & Plan Development
    • Risk Assessment
    • Incident Response Plans (IRP)
    • Disaster Recovery Plans & Exercises
    • Penetration Testing & Vulnerability Assessment
    • Instructor-Led Training
    • Supply Chain & Third Party Risk Management
    • V-ISO Virtual Information Security Officer
  • CMMC
    • Authorized Certification Assessment (C3PAO)
    • CMMC Readiness Assessment
    • V-ISO Virtual Information Security Officer (CMMC)
    • Instructor-Led Training (ATP)
    • CMMC Explained
  • Training
  • Catapult®
    • About Security Catapult®
    • Security Catapult® Sign Up
    • Security Catapult® Log In
  • About
    • About Us
    • The Monarch ISC Team
    • Monarch Blog
    • Events
  • Home
  • Industries
    • Defense
    • Financial
    • Healthcare
  • Services
    • Advisory & Consultation
    • Policy & Plan Development
    • Risk Assessment
    • Incident Response Plans (IRP)
    • Disaster Recovery Plans & Exercises
    • Penetration Testing & Vulnerability Assessment
    • Instructor-Led Training
    • Supply Chain & Third Party Risk Management
    • V-ISO Virtual Information Security Officer
  • CMMC
    • Authorized Certification Assessment (C3PAO)
    • CMMC Readiness Assessment
    • V-ISO Virtual Information Security Officer (CMMC)
    • Instructor-Led Training (ATP)
    • CMMC Explained
  • Training
  • Catapult®
    • About Security Catapult®
    • Security Catapult® Sign Up
    • Security Catapult® Log In
  • About
    • About Us
    • The Monarch ISC Team
    • Monarch Blog
    • Events
Contact Us
Contact Us
Thought Leadership

Zero Trust in The Business of IoT

By John Rogers 

Convenience and the drive to automate industrial control has guided the continued development of the Internet of Things (IoT). This vast universe of devices, from home weather stations and wireless routers to massive industrial control systems, such as HVAC and automated manufacturing equipment. Connected devices aim to improve efficiency, business performance, optimize decision-making, and more. These improvements, however, come with their own set of critical security concerns. Many of these issues have been realized in some of the biggest breach events of the last decade. Can you say Target refrigeration hack? If not provided with the same level of care as traditional IT infrastructure, severe risks are presented. These devices can and do offer “soft targets” for attackers. The “userless” nature of these platforms can obfuscate, undermine, and directly lead to the compromise of critical business processes.

Why Connected Devices?

Investment in IoT benefits business by creating value with little interpersonal conflict. Overall ease of install and use with home-based IoT makes these devices alluring. The same is true in a small office. Once IoT is operating in a large multi-location enterprise, things become much more complex. The real challenge here is similar to securing any technology, in its configuration and ongoing management. These devices require monitoring and diligent adherence to security update and patching regimens.

This can be cumbersome in the workplace. Fueled by environments with heterogenous systems, or simply put, the presence of various manufacturers creates an unwelcomed burden. The various contexts in which these devices are found can directly correlate to the number of makers. IoT can be found throughout an organization and present at many layers. This is further exasperated if consumer-ready devices are also present e.g., smart thermostats, lightbulbs, (and devices employees might discreetly bring in for individual/personal use).

These blended systems are attractive to attackers as any vulnerability in any one device can bring about a business disruption: the classic example being an aquarium heater within a casino providing a pathway to high roller databases, or in the case of the aforementioned Target breach, where an HVAC compromise led to the theft of 125 million consumer credit cards. Even as much as an active factory default password can present a risk or vulnerability for an organization. This is even scarier to imagine when the IoT and physical world overlap: self-driving vehicles, production line equipment, air quality monitoring, etc.

Managing IoT Risks

To manage these risks a multi-faceted approach is best. The first step is to govern the existence and operations of connected devices (you cannot manage what you do not know). Next, eliminate all default administrator credentials and device names. Security updates for each device must be performed, including end of life planning. Finally, the approach of IoT security management must be modernized. IoT devices should no longer be dealt with in a perimeter-based approach, but rather a Zero Trust model. In addition to other security basics, IoT considerations should include:

  • Policy – set expectations and keep management accountable. Does the organization have a policy for IoT management?
  • Identity Authentication – register and inventory all devices with renewable credentials. Does a record of this device exist?  Are the passwords changed regularly?
  • Network Segregation & Least Privilege – devices need only the level of access needed to accomplish their individual specific goals. Does the refrigerator need communicate with computers and devices on my internal network? Have I segregated this industrial IoT from business-critical information systems that may process, store, or transmit sensitive or legally protected information?
  • Device Monitoring – diagnostically evaluate security configurations, assess for vulnerabilities, insecure passwords, or anomaly based behavioral alerts. Can you determine each device’s adherence to policy or hardening guidelines?
  • Centralized and Continuous Updating – configure a centralized management solution to deploy security updates and patches accordingly, whenever feasible. Can you manage each and every single device manually? Is that the best use of a salary?
  • Be Aware – engage in manufacturer alerts, subscribe to active resources, stay informed of IoT news. You do this elsewhere, what’s one more blog or mailing to follow?


IoTZero Trust

What is the CMMC?
Previous Article
CMMC 2.0 Framework
5 Observations About CMMC 2.0
Next Article

Upcoming Events

September 22 - September 26

CMMC Certified Professional Class (CCP)+

  • Learn More
October 14 - October 17

CMMC Certified Assessor Class (CCA)

  • Learn More
View Calendar

Contact The Monarch ISC Team

Your Security,
Our Commitment

At Monarch ISC, we assess your cybersecurity challenges, develop trusted strategies, and implement solutions efficiently. We help secure your business and ensure readiness against cybersecurity threats and CMMC audits with minimal operational disruption.

CAICO ATP LOGO
CYBER AB BADGE
CYBER AB Badge

Services

  • Advisory & Consultation
  • Policy & Plan Development
  • Risk Assessments
  • Incident Response Plans (IRP)
  • Disaster Recovery Plans & Exercises
  • Penetration Testing & Vulnerability Assessment
  • Instructor-Led Training
  • Supply Chain / Third Party Management
  • Monarch ISC V-ISO

Industries

  • Defense
  • Financial
  • Healthcare

CCA & CCP Training

CMMC

  • Authorized Certification Assessment (C3PAO)
  • Readiness Assessment
  • CMMC V-ISO
  • Instructor Lead Training (ATP)
  • CMMC Explained

About Us

  • Meet the Monarch Team
  • About Us
  • Blog
  • Events

Catapult®

  • Security Catapult® Log in
  • Security Catapult® About
  • Security Catapult® Sign Up

Contact Us

  • info@monarchisc.com
  • 22 Free Street
    Ste. 300
    Portland, ME 04101
  • 207 808 0472
  • LinkedIn
Ⓒ 2025 All rights reserved. Monarch ISC | Privacy Policy

Contact the Monarch ISC Team

207.808.0472

info@monarchisc.com

Click Here to Get Started With Catapult® Free

207.808.0472

info@monarchisc.com