Welcome

Welcome! There is an explosion of unmanaged and IoT devices used across business today — from manufacturing to healthcare to retail and more. Unfortunately, these were not designed with security in mind, can’t host an agent, and are hard to upgrade — creating a new, expanding attack surface.
In a study of 403 enterprise decision-makers commissioned by Armis, Forrester Consulting found that 67% have experienced some sort of security incidents associated with IoT use and, as a result, have suffered consequences ranging from data and intellectual property leaks, to reduced revenues and equipment downtime.
How prepared is your organization to manage the risks associated with unmanaged and IoT devices?
The assessment will yield customized results and recommendations based on your responses and should take no more than 2 or 3 minutes to complete.
Defining an Unmanaged/IoT Device
Defining an Unmanaged/IoT Device

For the following assessment, Forrester defines "unmanaged and/or IoT device" as a system that can communicate with other devices and systems in your organization, process and transmit information, has an operating system and task-specific application(s) (no matter how simple), and cannot accommodate traditional security or management agents. This includes devices such as:
-
Office devices and peripherals – Printers, VoIP phones, smart TVs, kiosks, Bluetooth keyboards, etc.
-
Building automation – HVAC systems, physical security systems, lighting systems, security cameras, conference room reservation systems, vending machines, etc.
-
Personal or consumer devices – Smartphones, tablets, smart watches, digital assistants, etc.
-
Industry-specific devices – Industrial control systems (PLCs, HMIs, robotic arms, etc.), medical devices (patient monitoring systems, mobile imaging systems, infusion pumps, etc.), retail (barcode scanners, POS system, loss prevention, etc.), warehouse (inventory systems).
-
IT & network infrastructure – Access points/wireless LAN controllers, routers, switches, firewalls, IoT gateways, etc.
Questions
Questions
Questions
Questions
Results Overview
Based on your responses to the survey questions, your organization’s IoT security level is .
Organizations at that level do not have full visibility on the unmanaged and IoT devices connecting to their enterprise network and lack effective tools and processes to protect their organizations. To build the foundation of a comprehensive IoT security strategy, they need to map their IoT surface attack and assess their organization’s specific IoT use cases and security requirements.
In this nascent stage, what are some best practices you need to be aware of?
At that intermediate level, unmanaged and IoT device security controls and tools are in place but blind spots still exist. As threats keep evolving, companies need to pursue their investments in unmanaged and IoT device security solutions while building cross-organizational collaboration. Improving organizational readiness to mitigate external and insider threats – malicious or accidental –require them to know how their unmanaged and IoT device deployment is evolving, and assess the need for an updated unmanaged and IoT device security strategy.
What can you do to elevate your unmanaged and IoT device security program?
Organizations at that level have a well-structured approach to unmanaged and IoT devices security with controls, processes, and tools in pace. To keep pace with evolving threats and protect their organizations and customers, these companies must retain their security talents, continue to internally communicate the criticality of unmanaged and IoT device security, and develop a comprehensive unmanaged and IoT device security architecture that protects all devices and all other components that interact with the data.
How should you continue to manage your unmanaged and IoT device security program?



Recommendations
Overall Score Total: Exposed
Know-how: Exposed
-
Develop a security strategy specific to IoT. The scale and heterogeneity of unmanaged and IoT devices mean that these technologies carry significant security risks. Leverage internal and external expertise to get yourself familiar with specific vulnerabilities associated with these devices (e.g, volume of data, lack of visibility, physical and digital threats). Building a security strategy addressing these specificities and taking pre-emptive measures when deploying new devices will help making sure that access to your IoT devices, and IoT networks, is secure.
-
Invest in solutions that provide visibility. You cannot secure things if you don’t know they exist. Visibility solutions help you complete a thorough inventory of all devices connected to your network, and then use that information to build policies and implement controls to ensure devices are appropriately monitored and secured.
People: Exposed
-
Develop a security talent recruitment program. In a security staffing shortage environment, you need to redefine your recruitment criteria to attract talents. Best practices include committing to inclusive hiring practices, reducing the number of required skills on requisitions, and establishing or taking advantage of apprenticeship programs.
-
Start by defining ownership of the identity policies of IoT devices (e.g., which devices can connect to what network, which users are allowed to access them).This should be done in partnership with legal and business departments to ensure compliance with local data regulations, raise awareness, and build cross-organizational collaboration.
Technology: Exposed
-
Look at a mix of vendors and solutions. Existing comprehensive security solutions are not always relevant when introducing new technologies such as IoT. Therefore, protecting your organization and keeping up with the growth of unmanaged and IoT devices connecting to enterprise networks requires you to look at a mix of vendors and solutions. Start by assessing your organization’s specific IoT use cases and security requirements. And when evaluating vendors, maintain a flexible modular security architecture and minimize risk of lock-in to specific proprietary solutions.
-
Encrypt sensitive IoT data by default. Once you've identified your most sensitive data, the best way to protect it is to obfuscate it. Obfuscating data through encryption, tokenization, and other methods renders the data useless to cybercriminals who want to sell it on the underground market. Existing comprehensive security solutions are not always relevant when introducing new technologies such as IoT. Therefore, protecting your organization and keeping up with the growth of unmanaged and IoT devices connecting to enterprise networks requires you to look at a mix of vendors and solutions. Start by assessing your organization’s specific IoT use cases and security requirements. And when evaluating vendors, maintain a flexible modular security architecture and minimize risk of lock-in to specific proprietary solutions.
Process: Exposed
-
Map your IoT attack surface, and forecast and document the most probable, highest-impact IoT security scenarios. Having a plan in place and holding simulation exercises will help gauge organization’s readiness to handle an IoT breach and enable your organization to do so in a way that do not impact customers.
-
Build an effective patch management process. Assess how patching can be supported and the implications on the hardware design and user experience. Processes like firmware upgrades may confuse end users and increase support costs, which means that robust testing is needed before any patch/upgrade is rolled out to end users. You also need to ensure that it's impossible to disable patching, as this is a technique that hackers will leverage.
-
Develop strong data privacy requirements. As unmanaged and IoT devices generate important volume of data requiring privacy protection, you need to put in place strong privacy controls, especially for data that needs to be shared with a wide range of business leaders, employees, and partners. Assess how devices generate data and how data is stored in the cloud, and even consider reducing device functionality based on the user's selected privacy permissions.
Overall Score Total: Partially secured
Know-how: Partially secured
-
Prepare the wider organization for the possibility of IoT security breach. It’s not enough for only security teams to be aware of the security risks of unmanaged and IoT devices. Pursue your efforts in training the wider organization on the importance of IoT security, how to spot anomalies in IoT devices, and what to do when they suspect a breach.
-
Review current visibility. Make sure there are no blind spots. Because of their scale and diversity, it is common for unknown, unmanaged, and IoT devices to sneak on to your enterprise network. Maintaining a regularly updated inventory of unmanaged and IoT devices that are connected to your network will help you keep a grasp on how your IoT deployment is evolving, and help you better assess the need for an updated IoT security strategy.
People: Partially secured
-
Develop unique compensation structures for security pros. Security talent is in demand, so use compensation bands that make sense based on the market demand for the position. Consider emphasizing vacation time, learning, and flexible work arrangements for security pros. This lets your organization appeal to the more financially minded candidates, those interested in quality of life, and those seeking roles that offer long-term growth.
-
Build cross-organizational collaboration to ensure IoT security success. Look at creating an IoT security governance board to ensure the alignment of security and business objectives and provide leverage and backing to initiatives that support or implement those objectives. With a clear security ownership structure in place, you will be better prepared to implement risk-appropriate security controls into your IoT deployments.
Technology: Partially secured
-
Get help from experts to mitigate external and insider threats (malicious or accidental). Partner with solution providers to enhance your security posture and help remediate incidents. Select vendors and put in place policies and processes that will help you gain full visibility on prevented and detected attacks and help you identify undetected attacks. Given that further vendor consolidation is highly likely, a modular architecture also better positions you to respond to changes in the vendor landscape with minimal disruption.
-
Communicate that there may be other valid, nonsecurity reasons for enabling patching (such as allowing a performance update). Also, if your architecture relies on digital certificates, don't rely on self-signed certificates; ensure that the certificates are issued from a trusted third-party certificate authority.
Process: Partially secured
-
Strengthen identity and authentication controls. Besides changing default passwords, consider dynamic passwords and other authentication means (e.g., biometrics) to further strengthen the security controls on devices. Evaluate authentication alternatives from fingerprint, face, and voice biometrics to determine how such approaches can be used in ways that minimize customer friction. This will help address security issue for endpoint devices having factory-default passwords.
-
Aggressively archive and defensibly delete IoT data. Organizations should more aggressively archive and defensibly delete data according to a well-documented retention policy that accounts for compliance, legal, and business requirements.
Overall Score Total: Secured
Know-how: Secured
-
Internally communicate the criticality of IoT security to improve organizational readiness (for instance when conducting simulation of IoT security breaches). It’s not enough for only security teams to be aware of the security risks of unmanaged and IoT devices. Pursue your efforts in training the wider organization on the importance of IoT security, how to spot anomalies in IoT devices, and what to do when they suspect a breach.
-
Do not underestimate customer data privacy concerns. As the scale and distributed nature of the data collected by unmanaged and IoT devices keeps growing, stay abreast of relevant legal and regulatory requirements to ensure compliancy of your IoT device's data collection practices and use.
People: Secured
-
Retain your security talents. As security talent is in demand, focus on retaining your talents by establishing and publicizing succession plans for security teams, letting security staff members build and experiment, and using formal job sharing and rotation programs to broaden your team's skills.
-
Remember that security requires insights, not just a collection of data. Strengthen security event data collection and normalization capabilities and skills to be able to search through enormous data sets. That will further help identify potential IoT security events and identify and escalate issues.
Technology: Secured
-
Build a comprehensive IoT security architecture that protects the IoT device and all other components that interact with the data. Most IoT deployments will require multiple layers of security across devices and networks to mitigate overall IoT security risks.
-
Ensure your patching approach is accompanied by a robust management console that can monitor health and status of all devices in production and flag or alert security analysts of devices missing the latest patch. And remember that a compromised device that you can't patch will remain a compromised device.
Process: Secured
-
Strengthen your identity controls. While you may have developed lifecycle processes at the device level, make sure you are also managing the identifies of the users who are interacting with these devices, especially when different users of the same device may have different levels of authorization. You also need to talk with your business counterparts to understand how to deal with scenarios such as change in device ownership, either in aftermarket or when a consumer returns a registered device to a manufacturer.
-
Apply a Zero Trust architecture. Knowing that you can't maintain an effectively secure perimeter, adopt a Zero Trust approach for your organization’s network, devices, and data, making security ubiquitous throughout, not just at the perimeter. Implementing Zero Trust security controls includes segmenting devices based on risk, inspecting network traffic data as it flows between segments, and requiring authentication into the network.
View your detailed results
Next Steps
Armis is the first agentless, enterprise-class security platform to address the new threat landscape of unmanaged and IoT devices. It discovers devices on and off the network, continuously analyzes endpoint behavior to identify risks and attacks, and protects critical information and systems by identifying suspicious or malicious devices and quarantining them. Connect with an Armis expert today to learn how to detect and mitigate IoT threats.
Methodology
Methodology, Disclaimers and Disclosures
Methodology
Methodology
In this study, Forrester conducted an online survey of 403 decision-makers responsible for IoT security in their organizations. The study was completed in July 2019.
Disclaimer
Although great care has been taken to ensure the accuracy and completeness of this assessment, Forcepoint and Forrester are unable to accept any legal responsibility for any actions taken on the basis of the information contained herein.