Secure your IoT: Why Insider Threat Detection is Vital

2023-07-26 21:01:13
关注



Cyberattacks on the Internet of Things (IoT) devices can have dire consequences. Unlike most cyber incidents, attacks on IoT can have potentially catastrophic impacts on the physical world. When we think about threats to IoT devices, we typically consider external threats: distributed denial of service (DDoS) attacks, brute force attacks, botnets, and so on. But the greatest threats to IoT devices often come from inside the targeted organization.


“Unlike most cyber incidents, attacks on IoT can have potentially catastrophic impacts on the physical world.”


This article will explore why insider threats pose such a threat to IoT devices and what organizations can do to detect and prevent them.

What is an Insider Threat?

An insider threat is a current or former employee, business partner, contractor, or any other legitimate personnel that intentionally or unintentionally exposes their organization’s sensitive data or facilitates a cyberattack.

What is the Internet of Things?

IoT is an umbrella term that refers to all internet-connected physical devices, vehicles, appliances, and other “things” that developers embed with sensors, software, and network connectivity which allow them to collect and exchange data.

IoT allows devices to gather data through their sensors and share it with other devices and systems, creating an information network that improves their capabilities and functionality. IoT aims to improve automation, efficiency, and convenience across all sectors, from smart homes to the remote monitoring of manufacturing processes.

In a smart home, for example, IoT devices such as thermostats, lighting systems, and security cameras are often interconnected and controlled through a central hub, allowing homeowners to manage their home’s temperature, lighting, and security from anywhere, at any time.

Insider Threats to the Internet of Things

Insider threats to IoT are a bigger problem than ever. Remote working has resulted in a dramatically expanded attack surface and staff accessing sensitive systems and information from home. It’s no longer enough to protect an organization’s perimeter because the perimeter no longer exists.

Remote working is a significant contributor to the rise of insider threats. Early this year, 74 percent of organizations reported an increase in insider attacks. This increase is perhaps unsurprising; detached from their colleagues and company HQ, it’s not only easier for employees to access and exfiltrate sensitive information than ever before but also to justify their actions, viewing their organization as a faceless behemoth rather than a community.

Similarly, employees are more dissatisfied than ever. Inflation means salaries don’t go as far as they used to, wealth inequality results in more staff resenting their employers, and the constant threat of redundancy has left a bad taste in many employees’ mouths. Considering personal gain and revenge are two critical motivators for insider threats, it’s no wonder that they are on the rise.

Detecting and Preventing Insider Threats to the Internet of Things

Detecting and preventing insider threats requires organizations to implement a comprehensive security policy that includes security awareness training, user and entity behavior analytics (UEBA), and data loss prevention (DLP) solutions. Let’s dive deeper into those three essentials to understand better how they prevent insider threats.

First, security awareness training empowers staff to identify and prevent insider threats. Regular, role-specific training reduces the risk of falling for a social engineering scam and becoming an accidental insider threat. It also increases the likelihood of them identifying possible intentional insider threats.

UEBA solutions leverage advanced algorithms and machine learning (ML) technologies to detect user and entity behavior abnormalities. By collecting baseline data establishing normal behavior, UEBA solutions automatically detect and flag deviations that could indicate a potential insider threat. For example, suppose a user attempts to access sensitive files outside their jurisdiction, work hours, and usual location. In that case, UEBA solutions alert the security team, who will then investigate further.

Security teams can also utilize UEBA solutions to assign users risk scores, which indicate how likely an employee is to become an insider threat. These risk scores are developed over time, leveraging the collected data to determine what normal behavior looks like for a user and how often they deviate from that norm. The more often a user exhibits suspicious behavior, the higher their risk score, thus allowing security teams to prioritize investigations should an incident occur.

Finally, DLP solutions prevent data loss by integrating with core system infrastructure at the endpoint layer; for example, a device’s operating system or browser. By integrating in this way, DLP solutions monitor data ingress and egress on the device without having to decrypt traffic, thus leaving the machine to perform content inspection. Moreover, DLP solutions monitor file operations at the endpoint and cloud layers, using collected metadata to provide security teams with context about what data is business-critical or at the most risk of exposure, allowing them to prioritize security efforts.

However, organizations must keep in mind that not every solution will suit their needs. It’s important to evaluate solutions according to your specific requirements.

Insider threats are one of the most significant dangers to IoT. Their insight and access to an organization’s most sensitive information put them in a unique position to compromise them, and an increasingly turbulent global economy is motivating more people to become insider threats. Organizations should implement security awareness training, UEBA tools, and DLP solutions to protect their IoT from insider threats.



参考译文
保护您的物联网:为何内部威胁检测至关重要
物联网(IoT)设备受到网络攻击可能会带来严重后果。与大多数网络事件不同,对物联网的攻击可能会对物理世界造成潜在的灾难性影响。当我们想到物联网设备的威胁时,通常考虑的是外部威胁:分布式拒绝服务(DDoS)攻击、暴力破解攻击、僵尸网络等等。但物联网设备面临的最大威胁往往来自目标组织的内部。“与大多数网络事件不同,对物联网的攻击可能会对物理世界造成潜在的灾难性影响。”本文将探讨为什么内部威胁对物联网设备构成如此之大的威胁,以及组织可以采取哪些措施来检测和防范这些威胁。什么是内部威胁? 内部威胁指的是当前或前任员工、商业合作伙伴、承包商,或其他合法人员,他们有意或无意地泄露组织的敏感数据,或协助实施网络攻击。什么是物联网? 物联网是一个总称,指的是所有连接互联网的物理设备、车辆、电器和其他“物”,开发者将传感器、软件和网络连接功能嵌入其中,使其能够收集和交换数据。物联网允许设备通过传感器收集数据,并与其他设备和系统共享数据,从而建立一个信息网络,提升设备的功能和性能。物联网的目标是改善各个领域的自动化、效率和便捷性,从智能家居到制造过程的远程监控。例如,在智能家居中,恒温器、照明系统和安防摄像头等物联网设备通常相互连接,并通过一个中央控制中心进行控制,使房主可以随时随地管理家中的温度、照明和安全。物联网的内部威胁 物联网的内部威胁比以往任何时候都更加严重。远程办公导致攻击面大大扩展,员工可以在家中访问敏感系统和信息。仅仅保护组织的边界已经不再足够,因为边界本身已经不复存在。远程办公是内部威胁激增的一个重要原因。今年年初,74%的组织报告称内部攻击有所增加。这一增长并不令人意外:员工远离同事和公司总部后,不仅更容易接触到和泄露敏感信息,也更容易为自己的行为找借口,将组织视为一个冷漠的庞然大物,而不是一个社区。同样,员工的不满情绪也达到了历史新高。通胀导致薪资的实际购买力下降,财富不平等引发更多员工对雇主的怨恨,而裁员的持续威胁也让许多员工感到不安。考虑到个人利益和报复是内部威胁的两大主要动机,内部威胁的激增也就不足为奇了。检测和防范物联网的内部威胁 检测和防范内部威胁需要组织实施全面的安全政策,包括安全意识培训、用户与实体行为分析(UEBA)以及数据丢失防护(DLP)解决方案。让我们深入了解这三项关键措施,以更好地理解它们如何帮助防止内部威胁。首先,安全意识培训使员工能够识别并防范内部威胁。定期、基于角色的培训可以降低员工受到社会工程攻击的风险,并避免成为无意的内部威胁。它还增加了员工识别有意内部威胁的可能性。UEBA解决方案利用先进的算法和机器学习(ML)技术,检测用户和实体行为的异常。通过收集基础数据以建立正常行为的基线,UEBA解决方案可以自动检测并标记可能表明潜在内部威胁的异常行为。例如,如果某个用户试图在非授权时间、非工作时间、非通常地点访问敏感文件,UEBA解决方案将向安全部门发出警报,以便进一步调查。安全团队还可以利用UEBA解决方案为用户分配风险评分,以评估员工成为内部威胁的可能性。这些风险评分是随着时间的推移逐步建立的,通过收集的数据来判断用户的正常行为模式及其偏离该模式的频率。用户表现出可疑行为的频率越高,其风险评分就越高,从而使安全团队在发生事件时能够优先进行调查。最后,DLP解决方案通过在终端层(如设备的操作系统或浏览器)与核心系统基础设施集成来防止数据泄露。以这种方式集成,DLP解决方案可以监控设备的数据流入和流出,而无需解密流量,从而将内容检查工作留给设备本身。此外,DLP解决方案还监控终端和云端的文件操作,通过收集的元数据为安全团队提供关于哪些数据是商业关键数据或最容易暴露的信息,从而帮助他们优先安排安全工作。然而,组织需要注意的是,并非每种解决方案都适合他们的需求。重要的是根据具体需求来评估解决方案。内部威胁是物联网面临的最严重威胁之一。由于他们对组织最敏感信息的洞察和访问权限,他们处于独特的位置,可以破坏这些信息,而日益动荡的全球经济正在促使更多人成为内部威胁。组织应实施安全意识培训、UEBA工具和DLP解决方案,以保护其物联网设备免受内部威胁。
您觉得本篇内容如何
评分

评论

您需要登录才可以回复|注册

提交评论

广告

iotforall

这家伙很懒,什么描述也没留下

关注

点击进入下一篇

数字原生时代,看华为终端云服务如何深度用云

提取码
复制提取码
点击跳转至百度网盘