Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Leadership and ManagementLogical Security

Reinforcing identity in IoT: A vital best practice

By Jim Taylor
network security
April 6, 2022

In the minute it takes to read this paragraph, hundreds of smart devices will connect to the internet for the first time. In 2017, McKinsey estimated that 127 Internet of Things (IoT) devices came online every second, and GSMA expects a total of 23.3 billion IoT devices by 2025.

Last year, hackers tried to change the concentration of sodium hydroxide in Oldsmar, Florida’s drinking water. The Colonial Pipeline ransomware attack resulted in "panic buying." Any cyberweapons initially targeting Ukraine "may impact organizations both within and beyond the region," per CISA. In 2015, hackers remotely disabled a jeep’s brakes; that year, a Ford GT had more lines of code than a F-22 Raptor fighter jet or a Boeing 787.

More devices are coming online every second, and many control or connect to vital infrastructure. World governments saw a 1,885% increase in ransomware attacks in 2021. 

Given these trends and the ongoing crisis in Ukraine, it’s more important than ever that security experts take a holistic view of security, which means revisiting and reinforcing something that has tended to be forgotten or missed altogether – IoT security. 

Managing identity and access control

Security professionals have a lot of catching up to do. In the past, security experts tracked three main types of users: (1) physical users, or real-world, carbon-based humans; (2) silicon users, which include physical hardware like a smartphone, printer, laptop or any other tangible device; and (3) digital users, which include the service accounts that link all three.

Good security practice says that an account is an account, no matter who or what is using it. Organizations need authentication to verify an account is what it claims to be and attestation to control what it can do. 

The reality is that, while security professionals have long been aware of these three categories, to date they’ve focused most of their attention on physical users. If Paula is joining an organization’s finance team on Monday, then the security team needed to make sure that she had the resources she needed to do her job. They also ran attestation on Paula’s account: what did she have access to? Why did she need it? And what was she using it for? 

Prioritizing human users was an understandable choice when information technology (IT) teams were charged with protecting LaserJets and employee laptops — why bother running attestation on service or machine accounts? What’s the worst that could happen? 

The answer is plenty. Security leaders must evolve our thinking now that machines can change the chemical composition of drinking water. 

The rise of machine identities

Our choice to focus on human users has led to far too many ungoverned accounts, significant blind spots in silicon and digital account security, and major vulnerabilities for cybercriminals to exploit. 

The growth of 5G internet is creating an explosion of IoT devices accessing the network. Security leaders don’t spend nearly enough time thinking about what those devices are tracking, who they’re sharing that information with, or how that information can be used.

Security professionals have also tended to overlook service accounts. If a machine was talking to another machine, then they tended to trust them to run as admin profiles with limited oversight. Security teams even maintained static, hard-coded passwords for service accounts that tended to be easily accessible (and sometimes even stored in an unencrypted text file). 

Service accounts were already over-provisioned before smart devices changed the nature of tech stacks; today, they remain vulnerable to cyberattacks. Like poisonous mushrooms, service accounts have been growing in the dark. One report indicates that organizations have five times as many service accounts as they have employees. 

Machine or service accounts can’t skate by anymore. An account is an account — and it needs to be secured accordingly. Security leaders should move to least privilege with every account and ensure they only have the necessary entitlements to perform their role. Cybersecurity teams must also perform regular attestation on service and machine accounts so they know what machines are doing with their access and why they need it.

Securing IoT infrastructure also means moving toward zero trust with every account — service and machine users can’t get a free pass any longer. Organizations can move closer to zero trust by implementing smarter security infrastructure that can learn from context, baseline what "normal" looks like for a machine or service account, and flag significant deviations, like when a municipal machine based in Florida begins interacting with accounts in a foreign country and outside of normal business hours. 

Cybersecurity teams already have the framework they need to secure IoT. Security leaders just need to implement it at scale and as quickly as possible.

KEYWORDS: access control cyber security threat identity (ID) management Internet of Things (IoT) IoT Security network monitoring

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jim Taylor is the Chief Product Officer of SecurID.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Lynn Mattice

    What is a Best Practice, and Should You Deploy Them?

    See More
  • computer-code.jpg

    8 identity management best practices to have in place

    See More
  • Identity Theft, Financial Security and Best Practices in 2011

    See More

Related Products

See More Products
  • SSCP.jpg

    SSCP Systems Security Certified Practitioner Practice Exams

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing