{"id":118242,"date":"2020-09-02T13:00:20","date_gmt":"2020-09-02T20:00:20","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=118242"},"modified":"2020-09-02T12:21:10","modified_gmt":"2020-09-02T19:21:10","slug":"zero-trust-for-iot","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2020\/09\/zero-trust-for-iot\/","title":{"rendered":"4 Best Practices for Zero Trust for IoT"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The Zero Trust security model is designed to encompass the expanding boundaries of an organization\u2019s network. Rooted in the principle of \u201cnever trust, always verify,\u201d it grants controlled access to authorized users and devices only on the basis of whether each can strictly authenticate their identity in order to be granted the privilege.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Above that, <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-a-zero-trust-architecture\"><span style=\"font-weight: 400;\">Zero Trust<\/span><\/a><span style=\"font-weight: 400;\"> requires that user and device access privilege be continuously verified even after authentication. Privileged access to the organization\u2019s resources is limited to only those resources that the user and device absolutely need to perform their function. A user is not entitled to unrestricted access privileges, and the same goes for the device. <\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For these reasons, the identity awareness and application layer (<\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/05\/network-layers-not-created-equal\/\"><span style=\"font-weight: 400;\">Layer 7<\/span><\/a><span style=\"font-weight: 400;\">) control of every user and device becomes one of many critical factors in perpetuating the Zero Trust security model.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2>The Challenge Behind Implementing Zero Trust for IoT Devices<\/h2>\n<p><span style=\"font-weight: 400;\">I\u2019ve alluded to users and their IT devices in relation to Zero Trust. Now let\u2019s talk about IoT devices in a similar yet somewhat divergent context. When it comes to unmanaged IoT devices tethered to an organization\u2019s network, most enterprises find it difficult to adhere to standard <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/zero-trust\"><span style=\"font-weight: 400;\">Zero Trust principles<\/span><\/a><span style=\"font-weight: 400;\">. Why is this?<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is because, unlike users and their standard IT devices, IoT devices create a massive visibility challenge. As IoT picks up steam, for most enterprises undertaking IoT deployments, obtaining identity awareness of every such device connecting itself to the network is a problem. One of the main reasons for this is that <\/span><span style=\"font-weight: 400;\">most IoT devices don't support traditional enterprise authentication and authorization processes such as 802.1X or Single-Sign-On.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Approaches based on device fingerprinting don\u2019t work for IoT devices because of the sheer variety in operating protocols and standards. Besides, IoT devices <\/span><span style=\"font-weight: 400;\">are rarely assigned a unique hardware identifier (unlike IT devices) as a result of being manufactured in batches. <\/span><span style=\"font-weight: 400;\">Given this, most of these devices remain undiscovered and unaccounted for in an IT team\u2019s device inventory.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Since IoT devices are ultimately designed to connect to the wireless network, once connected, they roam and remain interspersed alongside IT devices, freely enjoying unfettered network access while remaining out of sight of vulnerability scans. As a result, these devices reduce risk levels to the lowest common denominator and greatly widen the threat surface, making the network gravely susceptible to lateral exploits.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2>Implementing Zero Trust for IoT Environments With Palo Alto Networks IoT Security<\/h2>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/iot-security\"><span style=\"font-weight: 400;\">Palo Alto Networks IoT Security<\/span><\/a> <span style=\"font-weight: 400;\">brings IoT devices into the fold of a Zero Trust security model by implementing four best practices that <\/span><span style=\"font-weight: 400;\">minimize IoT security risks and keep your network safe from cyber attacks. <\/span><span style=\"font-weight: 400;\">The cloud-delivered security service can be enabled on any of our Next Generation Firewalls for current customers, or delivered as a complete solution for non-Palo Alto Networks customers<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h6>1. Our IoT Security makes enhanced visibility the foundation of your Zero Trust strategy for IoT security.<\/h6>\n<p><span style=\"font-weight: 400;\">You can\u2019t secure what you can\u2019t see.To <\/span><span style=\"font-weight: 400;\">extend the principles of Zero Trust, it is important to first go beyond users and standard IT devices to include all unmanaged IoT devices in the network. Our<\/span><span style=\"font-weight: 400;\"> agentless IoT security solution bypasses standard signature-based approaches to discover every connected IoT device in the network, including the never-seen-before ones that IT teams are unaware of. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Our <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/06\/network-iot-security\/\"><span style=\"font-weight: 400;\">IoT Security<\/span><\/a><span style=\"font-weight: 400;\"> accurately matches each device\u2019s IP address with its type, vendor and model to <\/span><span style=\"font-weight: 400;\">surface a bundle of additional essential device attributes that completely profile the device. <\/span><span style=\"font-weight: 400;\">Accurate and granular device classification is a necessary prerequisite to <\/span><span style=\"font-weight: 400;\">differentiating unmanaged IoT devices from managed IT assets. Doing that enables<\/span><span style=\"font-weight: 400;\"> enforcement of Zero Trust-driven security policies that only allow approved traffic in your IoT environment.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h6>2. Our IoT Security continuously audits and validates devices against behavior anomalies and risk scores.<\/h6>\n<p><span style=\"font-weight: 400;\">A core principle behind<\/span><span style=\"font-weight: 400;\"> Zero Trust is that no devices \u2013 whether identified inside or outside the network \u2013 should be granted access to <\/span><span style=\"font-weight: 400;\">other devices and applications <\/span><span style=\"font-weight: 400;\">until assessed for risk and approved within the set parameters of normal behavior. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">This principle applies perfectly to IoT devices since they have limited, stable and predictable behaviors by nature.<\/span> <span style=\"font-weight: 400;\">Once identified, every IoT device should be verified against baselined behaviors before being granted access to other devices and applications in the network. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Our ML-based IoT Security <\/span><span style=\"font-weight: 400;\">automatically ascertains the device's identity and verifies \"normal behaviors.\" Once \"normal behaviors\" are determined, the solution kicks in anomaly detection to uncover and prioritize any potential deviation from the baseline.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h6>3. Our IoT Security microsegments IoT devices from IT devices to reduce the attack surface and risk radius of lateral exploits.<\/h6>\n<p><b><b><span style=\"font-weight: 400;\">A Next-Generation Firewall enables microsegmentation of network perimeters and acts as border control within your organization. Our IoT Security takes a device profile-based microsegmentation approach that considers a number of factors (including device type, function, mission criticality and threat level) to enable sequestration. This significantly reduces the potential impact of cross-infection between IT and IoT devices. Seamlessly implemented on your Next-Generation Firewall, this approach restricts lateral movement between IT and IoT devices. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Partitioning away IoT devices ensures they have least-privileged access and connect to only required applications. It keeps them <\/span><span style=\"font-weight: 400;\">quarantined from guest and business networks, and minimizes operational downtime in <\/span><span style=\"font-weight: 400;\">critical IoT infrastructures<\/span><span style=\"font-weight: 400;\"> by mitigating incompatibility issues cropping up between systems. <\/span><\/b><\/b><\/p>\n<p>&nbsp;<\/p>\n<h6>4. Our IoT Security automates Zero Trust policy enforcement using machine learning and Device-ID on the Next-Generation Firewall.<\/h6>\n<p>Zero Trust begins with \u201cdeny all.\u201d Zero Trust policies are then built and defined at Layer 7, based only on what is allowed. Next-Generation Firewalls utilize the concept of positive enablement, which makes Zero Trust-driven security policies easier to write.<\/p>\n<p>Instead of manually translating normal versus suspicious device behavior into policies for enforcement, our IoT Security automatically generates and enforces Zero Trust policies using machine learning on your firewall. Our machine learning establishes a baseline of Layer 7 IoT device behaviors \u2013 for instance, application and network topology behaviors \u2013 discerning what is normal for a single device in order to make recommendations for device-level policies consistent with Zero Trust architecture.<\/p>\n<p>The new Device-ID policy construct then tracks an individual device across your network, providing detailed information as context within the <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/06\/network-pan-os-10-0\/\">ML-Powered NGFW<\/a> for any alert or incident that may occur \u2013 regardless of changes to the device\u2019s IP address or location. Policy rules and Layer 7 controls are automatically updated as the location and identified risks change.<\/p>\n<p>&nbsp;<\/p>\n<h2>Zero Trust Throughout Your Infrastructure<\/h2>\n<p>In the past, securing users, applications and devices identifiable inside the network perimeter was the obvious thing to do. The explosion of unmanaged IoT devices in enterprises with their ever-expanding network security perimeter sets a new paradigm. It is imperative for enterprises to now embrace a new approach to IoT security modeled steadfastly on Zero Trust best practices.<\/p>\n<p>IoT security is one component of an enterprise Zero Trust strategy. Be sure to check out the rest of the blogs in our <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/zero-trust-throughout-your-infrastructure\/\">Zero Trust Throughout Your Infrastructure<\/a> series. Or you can watch as Palo Alto Networks Founder and CTO Nir Zuk explains how it all fits together in this video.<\/p>\n<p><div class=\"styleIt\" style=\"width:560px;height:315px;\"><lite-youtube videoid=\"zzZ4q9DSnbg\" ><\/lite-youtube><\/div><\/p>\n<p><span style=\"font-weight: 400;\">To learn more on how you can put an IoT security lifecycle approach into action to secure your IoT investments, reference our <\/span><a href=\"https:\/\/start.paloaltonetworks.com\/5-must-haves-iot-security.html\"><span style=\"font-weight: 400;\">buyer's guide on IoT Security<\/span><\/a> <span style=\"font-weight: 400;\">or <\/span><a href=\"https:\/\/start.paloaltonetworks.com\/iot-security-demo\"><span style=\"font-weight: 400;\">request a demo<\/span><\/a><span style=\"font-weight: 400;\"> to see first hand how the solution delivers visibility and protection in the IoT security lifecycle.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">This post is part of a series covering \u201c<\/span><\/i><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/zero-trust-throughout-your-infrastructure\/\"><i><span style=\"font-weight: 400;\">Zero Trust Throughout Your Infrastructure<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">.\u201d<\/span><\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With an expanding network edge comes increased cyber risk from IoT. Enterprises can adopt best practices that implement Zero Trust for IoT devices.<\/p>\n","protected":false},"author":391,"featured_media":117896,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6765],"tags":[510,4321,6305],"coauthors":[4243],"class_list":["post-118242","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-enterprise","tag-iot","tag-machine-learning","tag-zerotrust","net_sec_category-iot-security"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/08\/Server-room-blog.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/118242","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/391"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=118242"}],"version-history":[{"count":8,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/118242\/revisions"}],"predecessor-version":[{"id":118251,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/118242\/revisions\/118251"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/117896"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=118242"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=118242"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=118242"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=118242"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}