Chapter 2. Planning for IoT Security

Securing the Internet of Things poses new challenges to organizations, but as with any system that needs to be secured, certain practical steps can be leveraged. This chapter outlines key considerations to explore as part of a security strategy for IoT.

The Attack Continuum

Before we examine the security implications and requirements for an IoT system, some important points need to be considered.

The first consideration is that security is clearly not a one-off incident; it is a continuum, with before, during, and after phases (see Figure 2-1) and can occur in any area of the IoT system.

An Attack Continuum for the IoT system is shown.

Get Orchestrating and Automating Security for the Internet of Things: Delivering Advanced Security Capabilities from Edge to Cloud for IoT now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.