The Internet of Things: How do you "on-board" devices?
Last Updated: 2014-07-14 09:43:31 UTC
by Johannes Ullrich (Version: 1)
Certified pre-pw0ned devices are nothing new. We talked years ago about USB picture frames that came with malware pre-installed. But for the most part, the malware was added to the device accidentally, or for example by customers who later returned the device just to have it resold without adequately resetting/wiping the device.
But more recently, more evidence emerged that everything from network gear  to inventory scanners  may be infected deliberately in order to penetrate otherwise hard to reach networks. Typically, there is little a customer can do to verify that a device is not infected. Standard practices, like malware scanners and verifying installed software doesn't always work if you don't have "shell access" or the ability to install software on the device.
This leaves careful network monitoring as one option to detect and disrupt command and control channels used by these devices. However, in order to do so accurately, it is important to characterize "normal" network traffic from the device, which can be challenging in particular if the device connects to cloud services for updates or intentional data exchange.
The large number of these devices entering our networks asks for a scalable solution. We can't add security devices and personal proportional to the number of devices deployed. The security features included in these devices (host based firewalls, encryption technologies, ability to manage and limit installed software/"apps") varies widely and frequently there are no enterprise configuration tools available.
What kind of network segmentation and on-boarding procedure do you apply to new devices introduced into the network?
I am considering creating a second WiFi network (my router can support 2 plus a guest network) for my IOT devices and using my primary network for my computers and laptops. At least this way, if someone hacks an IOT device, they won't be able to sniff my "normal" internet activity... banking... email... etc.
Establishing a network baseline and monitoring for odd activity is a great thing to do, but I think creating a second network for less secure devices and less critical/sensitive traffic is a good idea as well.
Jul 14th 2014
8 years ago
Jul 16th 2014
8 years ago