IoT Solutions Security and Privacy
When comparing all aspects of an IoT (Internet of Things) solutions, it is clear that security tops the list. In society, there is a great deal of fear surrounding the perception that IoT systems are easily hackable. To an extent, this fear is justifiable as the consequences of hacked IoT devices and services can often be life-threatening.
In relation to security, the other concern for IoT solutions is privacy. In IoT solutions, security and privacy go hand in hand. This means that whilst we are analysing and validating the security requirements, we also consider the privacy requirements.
Some IoT solutions could be compared to unchartered waters. As IoT solution architects, we need to understand the security pain points in these dangerous zones. The main reason for this prerequisite is that IoT is an emerging field; hence, there are still loopholes that should be systematically identified and addressed.
Therefore, we need to start asking powerful and open-ended questions to understand the security issues, risks, concerns, constraints and dependencies. At a high level, we may start posing the questions as to ‘What are the security pain points in this solution?’, ‘What are the new technologies that may create risks?’ and ‘How can we address the identified risks?’ among many more exploratory questions.
Of course, by asking many more questions, we prompt our minds to find effective resolutions for each concern. As IoT solution architects, we usually cover the breadth rather than depth in developing solutions, like any aspect of the solution, it is essential to have a security subject matter expert on hand to help delve into the details of security risks, issues, dependencies and constraints. These consulting subject matter experts can help validate our solution proposals. Therefore, it is highly recommended that the security subject matter experts review the security architecture of the solution and give their approval.
In addition to the security subject matter expert, the solutions are also reviewed by a security governance body in an organisation. The members of the governance body may review various aspects of the security, such as identity management, authorisation, encryption and so on. Then, it is the IoT Solution Architect’s role to ensure the recommended security actions fit into the overall solution. As you may have guessed, specialists of a specific domain are often unaware of the other domains and the overall solution. Understanding the importance of this point is critical as architects often make the assumption that subject matter experts in security know every aspect of the systems or solutions.
As IoT lead solution architects, we need to analyse and define the key security threats. Then, we need to propose solutions to address those threats in the Security Model of the IoT solution. These points in each solution building block need to be carefully reviewed by the security subject matter experts and peer-reviewed by other solution architects in the program or organisation who understand the security landscape for applications, middleware, data, hosting infrastructure, databases, network, storage and all other aspects of the solution.
IoT Security and privacy requirements need to be analysed using reliable trust and assurance frameworks. These requirements need to consider the privacy laws in the geographies of the solutions that are developed. These requirements may not use traditional security controls. These requirements may have been developed in agility and may differ, state to state, country to country, and continent to continent.
As a critical point, I delve into details for the security aspect of IoT in my recent book titled "A Practical Guide for IoT Solution Architects: Architecting secure, agile, economical, highly available, well-performing IoT Ecosystems". You can find my updates by following my author profile on Amazon.
In relation to security, the other concern for IoT solutions is privacy. In IoT solutions, security and privacy go hand in hand. This means that whilst we are analysing and validating the security requirements, we also consider the privacy requirements.
Some IoT solutions could be compared to unchartered waters. As IoT solution architects, we need to understand the security pain points in these dangerous zones. The main reason for this prerequisite is that IoT is an emerging field; hence, there are still loopholes that should be systematically identified and addressed.
Therefore, we need to start asking powerful and open-ended questions to understand the security issues, risks, concerns, constraints and dependencies. At a high level, we may start posing the questions as to ‘What are the security pain points in this solution?’, ‘What are the new technologies that may create risks?’ and ‘How can we address the identified risks?’ among many more exploratory questions.
Of course, by asking many more questions, we prompt our minds to find effective resolutions for each concern. As IoT solution architects, we usually cover the breadth rather than depth in developing solutions, like any aspect of the solution, it is essential to have a security subject matter expert on hand to help delve into the details of security risks, issues, dependencies and constraints. These consulting subject matter experts can help validate our solution proposals. Therefore, it is highly recommended that the security subject matter experts review the security architecture of the solution and give their approval.
In addition to the security subject matter expert, the solutions are also reviewed by a security governance body in an organisation. The members of the governance body may review various aspects of the security, such as identity management, authorisation, encryption and so on. Then, it is the IoT Solution Architect’s role to ensure the recommended security actions fit into the overall solution. As you may have guessed, specialists of a specific domain are often unaware of the other domains and the overall solution. Understanding the importance of this point is critical as architects often make the assumption that subject matter experts in security know every aspect of the systems or solutions.
As IoT lead solution architects, we need to analyse and define the key security threats. Then, we need to propose solutions to address those threats in the Security Model of the IoT solution. These points in each solution building block need to be carefully reviewed by the security subject matter experts and peer-reviewed by other solution architects in the program or organisation who understand the security landscape for applications, middleware, data, hosting infrastructure, databases, network, storage and all other aspects of the solution.
IoT Security and privacy requirements need to be analysed using reliable trust and assurance frameworks. These requirements need to consider the privacy laws in the geographies of the solutions that are developed. These requirements may not use traditional security controls. These requirements may have been developed in agility and may differ, state to state, country to country, and continent to continent.
As a critical point, I delve into details for the security aspect of IoT in my recent book titled "A Practical Guide for IoT Solution Architects: Architecting secure, agile, economical, highly available, well-performing IoT Ecosystems". You can find my updates by following my author profile on Amazon.
Published on August 25, 2019 19:43
No comments have been added yet.
Updates from Dr Mehmet Yildiz
Dr Mehmet Yildiz is a postdoctoral researcher in cognitive science and technologist who has worked as a Distinguished Enterprise Architect certified by the Open Group on multi-billion dollar enterpris
Dr Mehmet Yildiz is a postdoctoral researcher in cognitive science and technologist who has worked as a Distinguished Enterprise Architect certified by the Open Group on multi-billion dollar enterprise projects. Over the last 42 years, he has worked as a senior inventor and executive consultant in the IT industry, leading complex enterprise projects for large corporate organizations like IBM, Siemens, and Microsoft. As the owner and chief editor of 17 prominent publications on Medium and Substack, he has built a thriving community of over 36,000 writers and 300,000+ readers, supporting them in their creative journeys.
Owning multiple newsletters on Substack, he gained over 130,000+ subscribers. In his recent bestselling book Substack Mastery, Dr. Yildiz distills decades of knowledge into actionable insights, offering writers practical strategies to succeed in today’s competitive digital landscape. He can be contacted through his website: https://digitalmehmet.com/
...more
Owning multiple newsletters on Substack, he gained over 130,000+ subscribers. In his recent bestselling book Substack Mastery, Dr. Yildiz distills decades of knowledge into actionable insights, offering writers practical strategies to succeed in today’s competitive digital landscape. He can be contacted through his website: https://digitalmehmet.com/
...more
- Mehmet Yildiz's profile
- 57 followers
