The first step is admission, so let me say it now: I was wrong!
I have been looking at the obstacles for adoption of IoT, and one of them has been security. If you are part of this industry you have heard the joke. “IoT; the S is for security”. Candidly this joke upsets me – tremendously.
In the article about industrial controls I talked briefly about the computer worm Stuxnet. Kim Setter from Wired magazine covers it well with “Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon” . While the system originally targeted Siemens Industrial Controls via Microsoft Windows computers specifically in Iran’s nuclear program, the ability to penetrate industrial controls was not known for at least five years.
As Richard Soley of the Industrial Internet Consortiums conveys, there are two kinds of companies “those that know they have been hacked, and those that do not.” This is the real problem for IoT. It’s not a place where people work and live. Things only tell you they are in trouble if you design for it. For more than 40 years we have not designed for systems to tell us everything including security.
Now with all this said, where is my error? The answer is in my projection where the solution can be found.
I believe the answer to managing a legacy problem can be solved by networking, and my thought process was that this would be done by IT.
Candidly, I showed my age. Twenty years ago when I left the large organizations, IT was a strategic asset and had a lot of command and control. One more aspect (victim?) of digital transformation is IT. In today’s market place, IT is an expense line, not an asset.
In the past month I have talked to third-party maintenance firms, staff augmentation companies (including Crossfire Consulting, my parent company), and of course cloud providers. Now in theory the chief information security officer can be the hope for a network security solution.
Ken Briodagh advocates that the problem needs to be solved in the hardware. Recently I spoke with Dipti Vanchani, vice president and general manager of the Internet of Things Group at Intel Corp. Intel and others have enabled identity in the silica with their Enhanced Privacy ID, eliminating a lot of opportunity for human error and deliberate malice. In effect security is becoming integrated in the operations.
The reason I wanted to solve this at the network layer is because operationally IoT is in lots of different areas within a corporation: buildings, manufacturing, retail, and supply chain.
Edited by Ken Briodagh