Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Leadership and ManagementLogical Security

Reinforcing identity in IoT: A vital best practice

By Jim Taylor
network security
April 6, 2022

In the minute it takes to read this paragraph, hundreds of smart devices will connect to the internet for the first time. In 2017, McKinsey estimated that 127 Internet of Things (IoT) devices came online every second, and GSMA expects a total of 23.3 billion IoT devices by 2025.

Last year, hackers tried to change the concentration of sodium hydroxide in Oldsmar, Florida’s drinking water. The Colonial Pipeline ransomware attack resulted in "panic buying." Any cyberweapons initially targeting Ukraine "may impact organizations both within and beyond the region," per CISA. In 2015, hackers remotely disabled a jeep’s brakes; that year, a Ford GT had more lines of code than a F-22 Raptor fighter jet or a Boeing 787.

More devices are coming online every second, and many control or connect to vital infrastructure. World governments saw a 1,885% increase in ransomware attacks in 2021. 

Given these trends and the ongoing crisis in Ukraine, it’s more important than ever that security experts take a holistic view of security, which means revisiting and reinforcing something that has tended to be forgotten or missed altogether – IoT security. 

Managing identity and access control

Security professionals have a lot of catching up to do. In the past, security experts tracked three main types of users: (1) physical users, or real-world, carbon-based humans; (2) silicon users, which include physical hardware like a smartphone, printer, laptop or any other tangible device; and (3) digital users, which include the service accounts that link all three.

Good security practice says that an account is an account, no matter who or what is using it. Organizations need authentication to verify an account is what it claims to be and attestation to control what it can do. 

The reality is that, while security professionals have long been aware of these three categories, to date they’ve focused most of their attention on physical users. If Paula is joining an organization’s finance team on Monday, then the security team needed to make sure that she had the resources she needed to do her job. They also ran attestation on Paula’s account: what did she have access to? Why did she need it? And what was she using it for? 

Prioritizing human users was an understandable choice when information technology (IT) teams were charged with protecting LaserJets and employee laptops — why bother running attestation on service or machine accounts? What’s the worst that could happen? 

The answer is plenty. Security leaders must evolve our thinking now that machines can change the chemical composition of drinking water. 

The rise of machine identities

Our choice to focus on human users has led to far too many ungoverned accounts, significant blind spots in silicon and digital account security, and major vulnerabilities for cybercriminals to exploit. 

The growth of 5G internet is creating an explosion of IoT devices accessing the network. Security leaders don’t spend nearly enough time thinking about what those devices are tracking, who they’re sharing that information with, or how that information can be used.

Security professionals have also tended to overlook service accounts. If a machine was talking to another machine, then they tended to trust them to run as admin profiles with limited oversight. Security teams even maintained static, hard-coded passwords for service accounts that tended to be easily accessible (and sometimes even stored in an unencrypted text file). 

Service accounts were already over-provisioned before smart devices changed the nature of tech stacks; today, they remain vulnerable to cyberattacks. Like poisonous mushrooms, service accounts have been growing in the dark. One report indicates that organizations have five times as many service accounts as they have employees. 

Machine or service accounts can’t skate by anymore. An account is an account — and it needs to be secured accordingly. Security leaders should move to least privilege with every account and ensure they only have the necessary entitlements to perform their role. Cybersecurity teams must also perform regular attestation on service and machine accounts so they know what machines are doing with their access and why they need it.

Securing IoT infrastructure also means moving toward zero trust with every account — service and machine users can’t get a free pass any longer. Organizations can move closer to zero trust by implementing smarter security infrastructure that can learn from context, baseline what "normal" looks like for a machine or service account, and flag significant deviations, like when a municipal machine based in Florida begins interacting with accounts in a foreign country and outside of normal business hours. 

Cybersecurity teams already have the framework they need to secure IoT. Security leaders just need to implement it at scale and as quickly as possible.

KEYWORDS: access control cyber security threat identity (ID) management Internet of Things (IoT) IoT Security network monitoring

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jim Taylor is the Chief Product Officer of SecurID.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

American flag

ICE Acting Director Todd Lyons to Resign

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • Lynn Mattice

    What is a Best Practice, and Should You Deploy Them?

    See More
  • computer-code.jpg

    8 identity management best practices to have in place

    See More
  • Identity Theft, Financial Security and Best Practices in 2011

    See More

Related Products

See More Products
  • SSCP.jpg

    SSCP Systems Security Certified Practitioner Practice Exams

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing